JOIN OUR TEAM

Cybersecurity Quiz: How Cyber-Savvy Are You?


Chera Pupi
Author: Chera Pupi Date: 07/23/2020

According to a study by IBM, 95% of cyber security breaches happen because of human error. Unlike the movies, hackers can't just sneak into most computer networks and install their malicious code. In the real world, cybercriminals try to exploit human nature to trick people into turning over data or credentials right without having to write a single line of a code. The good news is that if human error is eliminated, most cyber breaches would never occur.

Take our cybersecurity quiz to find out if you have what it takes to defend your organization against the threat of a cyberattack. 

QUESTION 1

You get an email that appears to be from Microsoft asking you to click a link and enter your login credentials. This could be an example of:

  1. Nothing to worry about
  2. Phishing
  3. Typical communication from Microsoft

Answer: Phishing

Phishing tries to steal sensitive information such as usernames, passwords, and credit card details by impersonating a trustworthy person or company. It can be carried out via email, phone call, or even instant message. A phishing message often directs you to enter details into a fake website whose look and feel are almost identical to the legitimate one. The fake website may also infect your device with malware.

Learn more about phishing.


QUESTION 2

If you want to remove as many cyber risks as possible from your network, you should start:

  1. Hardening
  2. Patching
  3. Throwing your hands up in despair

 

Answer: Hardening

Hardening a system reduces security risk by eliminating potential attack vectors and making the system’s attack surface as small as possible. By removing unneeded programs, accounts, functions, applications, access, and the like, attackers have fewer opportunities to gain a foothold in your network. In short, a hardened system is a more secure system.


QUESTION 3

You just received a phone call from someone saying they’re your boss’s boss. They sound very stressed and need you to send them an account number – even though it’s not something you’d typically be asked to do. What’s going on here?

  1. A legitimate request from your boss
  2. Your coworkers playing a prank on you
  3. Social engineering

 

Answer: Social Engineering

Hackers use social engineering to manipulate people into giving up confidential information, such as a password or bank account number. Common examples of social engineering include emails that sound legitimate asking you to click a link, download a file, or enter your login credentials.


QUESTION 4

The operating system on your computer is a couple versions old and hasn’t been updated since its installation. Your OS software needs to be:

  1. Uninstalled and reinstalled
  2. Patched
  3. Ignored

 

Answer: Patched

Patching is the process of updating software to the latest version. It’s essential for removing bugs that hackers can exploit to slip into your system.


QUESTION 5

You’re doing some work at the local library. They have free Wi-Fi, but you know it’s not wise to trust public Wi-Fi. What’s the safest, most private way to connect to the internet?

  1. VPN
  2. Proxy
  3. Tor (The Onion Router)

 

Answer: Virtual Private Network (VPN)

VPN connects you to the internet via an encrypted tunnel. This ensures your online privacy and protects your sensitive data. A VPN is often used to create secure connections to public Wi-Fi, hide IP addresses, and keep your browsing private.

Congratulations – you made it to the end! How’d you do? If you’re feeling a little disappointed in your results, don’t worry. The experts at Elevity can keep your organization at the cutting edge of cybersecurity. If you would like to see how your company does on a real world cybersecurity test, contact us today for a free assessment or take our Cybersecurity Risk Assessment.

 

Cybersecurity Tips for Employees Infographic CTA

Leave a Comment

Written by Chera Pupi

Chera Pupi is the Managed IT Sales Manager for Elevity. She is a veteran Managed IT services sales expert, named to The Cannata Report’s Young Influencer List in 2018. Before joining GFC and Elevity, Chera helped Continuum and its partners improve sales performance through cybersecurity and sales training, new product launches, and the development of collaborative action plans.

Need More Information?

We’re ready – and eager – to help you solve your technology challenges.