Our Services › Cybersecurity Training

Security Awareness Quiz

Test your cybersecurity knowledge with these 10 questions. Read each question carefully, choose your answer, then click to reveal the correct answer and explanation. Share this quiz with your team to identify areas where additional training would help.

Question 1: Phishing Recognition

You receive an email from "IT Support" asking you to click a link and verify your password because your account will be locked in 24 hours. The email address is support@it-helpdesk-verify.com. What should you do?

  1. Click the link and enter your password to avoid being locked out
  2. Reply to the email asking if it is legitimate
  3. Do not click the link. Contact your IT department directly using a known phone number or email address to verify the request
  4. Forward the email to your coworkers to warn them
Show Answer

Correct answer: C

Never click links or enter credentials based on an email request, even if it appears to come from IT. Legitimate IT departments will not ask for your password via email. Contact IT directly through a known, trusted channel (phone, in-person, or an email address you already have) to verify whether the request is real. Do not reply to the suspicious email (option B) because you would be communicating with the attacker. Do not forward it to coworkers (option D) without IT guidance, as they might click the link.

Question 2: Password Security

Which of the following is the strongest password?

  1. P@ssw0rd!2024
  2. correct-horse-battery-staple
  3. J8#kL2$m
  4. admin123456
Show Answer

Correct answer: B

"correct-horse-battery-staple" is 28 characters long and extremely difficult to brute-force, even though it uses only lowercase letters and hyphens. Option A looks complex but is a common variation that appears in attacker dictionaries. Option C is only 8 characters and can be cracked relatively quickly despite its complexity. Option D is a trivially guessable password. Length beats complexity. A long passphrase made of random words is both stronger and easier to remember than a short, complex password.

Question 3: Physical Security

You are leaving your desk to attend a 30-minute meeting. What should you do with your computer?

  1. Leave it as-is since you will be back soon
  2. Lock the screen (Windows: Win+L, Mac: Ctrl+Command+Q)
  3. Shut down the computer completely
  4. Turn off the monitor but leave the computer unlocked
Show Answer

Correct answer: B

Lock your screen every time you leave your desk, even for a short time. It takes less than two seconds and prevents anyone from accessing your accounts, emails, or patient data while you are away. Shutting down (option C) is unnecessary for a short absence and wastes time. Turning off the monitor (option D) provides no security since anyone can turn it back on and access your unlocked session. An unlocked computer in a healthcare environment could lead to a HIPAA violation if unauthorized individuals view patient information on your screen.

Question 4: Social Engineering

Someone calls your office claiming to be from your EHR vendor's support team. They say they need your login credentials to fix a critical system issue. What should you do?

  1. Give them your credentials since they need to fix the system
  2. Give them only your username but not your password
  3. Hang up, look up the vendor's official support number, and call them back to verify the request
  4. Ask them to prove they are from the vendor by telling you your account details
Show Answer

Correct answer: C

Legitimate support teams will never ask for your password over the phone. This is a classic social engineering tactic called vishing (voice phishing). The correct response is to hang up and call the vendor's official support number, which you can find on their website or in your contract. Option B is also dangerous because giving out your username helps the attacker. Option D is a trap: attackers may have some of your account details already (from a previous breach or from publicly available information) and can use them to build false credibility.

Question 5: Data Handling

A coworker asks you to email a spreadsheet containing patient names, dates of birth, and appointment dates to their personal Gmail account so they can work from home this weekend. What should you do?

  1. Send it since they are a coworker and need it for work
  2. Send it but password-protect the file first
  3. Decline and explain that PHI cannot be sent to personal email accounts. Help them access the data through an approved secure method instead.
  4. Send it but delete the email after they confirm receipt
Show Answer

Correct answer: C

Patient names, dates of birth, and appointment dates are Protected Health Information (PHI) under HIPAA. PHI must never be sent to personal email accounts, regardless of who is requesting it. Personal email accounts are not covered by your organization's security controls or Business Associate Agreements. Password-protecting the file (option B) does not make it compliant. Deleting the email (option D) does not undo the exposure. Instead, help your coworker access the data through approved channels such as VPN, a secure remote desktop, or a company-managed cloud platform.

Question 6: USB Drive Safety

You find a USB drive in the parking lot with a label that says "Employee Salary Data 2025." What should you do?

  1. Plug it into your computer to see who it belongs to so you can return it
  2. Plug it into a computer that is not connected to the network
  3. Turn it in to IT or your manager without plugging it in to any device
  4. Throw it away to be safe
Show Answer

Correct answer: C

Dropping USB drives with enticing labels is a well-known attack technique called a USB drop attack (or baiting). The drive may contain malware that installs automatically when plugged in. The label "Employee Salary Data" is designed to exploit curiosity. Never plug in an unknown USB drive, even on an air-gapped computer (option B), as some malware can later transfer when the device reconnects. Do not throw it away (option D) because IT may want to analyze it to understand if the organization is being targeted. Turn it over to IT and let them handle it safely.

Question 7: Public Wi-Fi

You are at a coffee shop and need to check your work email. The coffee shop offers free Wi-Fi. What is the safest approach?

  1. Connect to the free Wi-Fi and check your email normally
  2. Connect to the free Wi-Fi and use your company VPN before accessing any work resources
  3. Use your phone's cellular hotspot instead of the public Wi-Fi
  4. Both B and C are acceptable approaches
Show Answer

Correct answer: D

Both options B and C are acceptable. A VPN encrypts all traffic between your device and your company's network, making it safe to use even on untrusted public Wi-Fi. Using your phone's cellular hotspot avoids the public network entirely, which is also secure. Option A is risky because public Wi-Fi can be monitored by attackers through man-in-the-middle attacks, or the entire network could be a fake "evil twin" set up by an attacker. The key principle: never access work resources on an untrusted network without a VPN.

Question 8: Reporting Incidents

You accidentally clicked a link in a suspicious email, but the page looked broken and nothing seemed to happen. What should you do?

  1. Nothing, since the page did not load properly and probably did not work
  2. Run antivirus software yourself and move on if it finds nothing
  3. Report it to IT immediately, even though nothing appeared to happen
  4. Wait and see if anything unusual happens over the next few days, then report it if needed
Show Answer

Correct answer: C

Report it immediately, regardless of what appeared to happen on screen. Malware can install silently in the background without any visible indication. A "broken" page may have successfully executed malicious code before showing the error. Waiting to see what happens (option D) gives the malware time to spread, exfiltrate data, or establish a persistent connection. Running antivirus yourself (option B) is helpful but not sufficient since you may not have the latest threat signatures, and IT needs to check other systems for signs of the same attack. Fast reporting is always the right call.

Question 9: Multi-Factor Authentication

You receive a push notification on your phone asking you to approve a login to your work account, but you are not currently trying to log in. What should you do?

  1. Approve it since it might be a system update
  2. Deny the request and immediately report it to IT
  3. Ignore it and it will time out on its own
  4. Approve it and then change your password
Show Answer

Correct answer: B

An unexpected MFA prompt means someone has your password and is actively trying to log in to your account right now. Deny the request immediately and report it to IT. Your password has been compromised and needs to be changed right away. Ignoring it (option C) is dangerous because attackers may send repeated prompts hoping you will eventually approve one out of frustration (this is called MFA fatigue or MFA bombing). Never approve an MFA request you did not initiate. Approving and then changing your password (option D) gives the attacker access to your account, even briefly.

Question 10: Secure Data Disposal

You need to dispose of an old office computer that previously stored patient records. What is the proper procedure?

  1. Delete all files, empty the Recycle Bin, and donate the computer
  2. Format the hard drive and sell the computer online
  3. Have IT perform a certified data wipe or physically destroy the hard drive, then document the disposal
  4. Remove the hard drive and throw it in the regular trash, then donate the computer
Show Answer

Correct answer: C

Deleting files and emptying the Recycle Bin (option A) does not actually remove the data. It only removes the references to the files, and the data can be recovered with freely available tools. Formatting (option B) is slightly better but still recoverable with specialized software. Throwing a hard drive in the trash (option D) is both insecure and often violates e-waste regulations. For devices that stored PHI, HIPAA requires that ePHI be rendered unrecoverable before disposal. This means either a certified multi-pass data wipe with a certificate of destruction, or physical destruction (degaussing, shredding, or drilling). Document the disposal for your compliance records.

How Did You Score?

Train your team with hands-on workshops

We offer interactive cybersecurity training with simulated phishing, real-world scenarios, and practical exercises tailored to your industry.

Book a Session