Information Security Awareness Quiz
19 community-sourced questions and answers. Free — no login.
What keeps your computer, phone, and tablet the safest?
Keeping the operating system (OS) or virus scanning up-to-date.
From the following selections, which is the strongest password?
Az5@an?D
Malware can be disguised as,
All of the above. Friendly software like an antivirus program. Random hardware such as a flash drive. Pop-ups, windows, and toolbars.
Business sensitive and confidential information are,
Treated the same, but are different types of information.
When getting or using information from different areas/departments,
Respect that areas/departments rules and procedures.
How should you determine if a link in an email is phishing?
Hover over the link to see where it connects.
How often should passwords be changed?
Every 90 days.
What is an example of confidential information?
Medical record.
What is an example of business sensitive information?
Employment information.
What can result from not correctly using, accessing, sharing, and protecting electronic information?
All of the above. Law violations. Policy violations. Confidentiality breeches.
If you have questions about Information Security concerns, the best contact is:
b) The Information Security Department
Who can you share your HonorHealth user name and password with?
c) No one
What is a key characteristic of a phishing e-mail?
d) All of the above
Which of the following statements is not true?
d) Users are not accountable for access to confidential information through their user name and password.
A recent information security risk to health care providers is called "phishing". Phishing occurs when:
b) A cyber-criminal tries to obtain a person's username or password by appearing to be a legitimate person or organization.
How do you encrypt an e-mail communication?
b) Type the words [ENCRYPT] anywhere in the Subject line of the e-mail.
Which of the following is a good information security practice?
d) Logging off of a computer before leaving it unattended
Phishing could result in:
d) All of the above
Which of the following is a good way to protect from a phishing attempt:
d) All of the above.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials