Answer a series of 12 questions based on the information you have already learnt.
0 of 12 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Time has elapsed
Your answers have now been transferred to your Mentor who will assess and get back to you with feedback.
1) Define the term “cyber-security threat”
This response will be reviewed and graded after submission.
2) What is malware?
This response will be reviewed and graded after submission.
3) List 3 ways that malware can infect your computer.
This response will be reviewed and graded after submission.
4) List 3 actions that you can take to protect against malware.
This response will be reviewed and graded after submission.
5) True or false. If you receive an invoice for payment from a supplier with new payment information, you should trust this information as it comes from a familiar email address.
This response will be reviewed and graded after submission.
6) True or false. If business data becomes encrypted by ransomware, you should pay the ransom to have the data decrypted.
This response will be reviewed and graded after submission.
7) Why is it important to review business cyber-security policies and procedures?
This response will be reviewed and graded after submission.
8) Consider your current workplace. Identify 3 potential cyber-security threats relevant to your workplace and state what action you would take to report each threat.
This response will be reviewed and graded after submission.
9) What is the name of the government body to which Notifiable Data Breaches are reported?
This response will be reviewed and graded after submission.
10) Within what timeframe must Notifiable Data Breaches be reported?
This response will be reviewed and graded after submission.
11) What is the primary purpose of a post cyber attack incident review?
This response will be reviewed and graded after submission.
12) Describe one way that staff could contribute to a post-cyber attack incident review.
This response will be reviewed and graded after submission.