Security Awareness Quiz Name First Last Email How can you verify the legitimacy of an unexpected email from a known contact?(Required) Forward the email to colleagues for their opinion. Reply directly to the email asking if it’s legitimate. Click on any links to see where they lead. Check the sender’s email address carefully and contact the sender through a known, separate channel. What is a common sign of a phishing email or message?(Required) It comes from a well-known company’s official email address. It urges immediate action and includes suspicious links or attachments. It contains personalized information that only you would know. It thanks you for a recent purchase you actually made. Why is it important to use unique passwords for different accounts?(Required) To prevent a breach in one account from compromising others. Because using the same password is illegal. So you can easily remember them all. It isn’t important; password reuse is safe. How does enabling two-factor authentication enhance your account security?(Required) It allows you to use biometric data exclusively. It replaces the need for a password entirely. It adds an extra layer of security by requiring a second form of verification. It slows down the login process unnecessarily. What risks are associated with ignoring software and system updates?(Required) There are no risks; updates are purely cosmetic. Your device will operate faster without updates. You will void your software warranty. Missing critical security patches, increasing vulnerability to malware. What precaution should you take when connecting to public Wi-Fi networks?(Required) Use a VPN to encrypt your connection and avoid accessing sensitive information. Share your personal hotspot with others to stay safe. Always accept and install any prompts or updates from the network. Disable your antivirus software for better performance. Why is physical security important in protecting digital assets?(Required) To prevent unauthorized access to devices and sensitive information. To make your workspace look organized. It’s not important if you have strong passwords. So you can find your devices easily. What strategy do social engineers commonly use to manipulate individuals?(Required) They build trust through deception to extract confidential information. They always use malware to hack systems. They avoid direct contact to prevent suspicion. They offer you promotions for free products. How do regular data backups contribute to security and business continuity?(Required) They free up space on your primary device. They slow down your system performance. They are unnecessary if you have antivirus software. They ensure you have duplicates of files to recover from data loss incidents. What steps should you take if you suspect a security breach or incident?(Required) Ignore it until you receive an official notice. Immediately report it to the IT/security team and avoid unauthorized fixes. Discuss it with friends outside the organization for advice. Attempt to resolve it yourself to save time.