Question 1
What makes a password strong?
Below is a complete list of real practice questions you may be asked during the Cybersecurity Awareness for Employees. Try answering each one yourself before checking your knowledge. If you find questions you don’t know, you can study them using our interactive spaced-repetition flashcards that repeat what you forget.
Study these questions using spaced-repetition flashcards that focus on the questions you miss.
Start studying free →First try to answer each question yourself. After attempting a few, practice recalling the answers using the interactive flashcard study mode . Actively recalling the answer before revealing it helps long-term memory much more than rereading a list.
What makes a password strong?
Why should you avoid reusing passwords?
What is multi-factor authentication (MFA)?
Which MFA method is usually safest?
What should you do if you suspect your password was exposed?
What is a passphrase?
Where should employees store passwords safely?
What is credential stuffing?
What is the safest way to share a password at work?
When should you lock your computer screen?
What is phishing?
What is a common goal of phishing emails?
What is social engineering?
Which is a red flag in an email?
What should you do if an email asks for your MFA code?
Turn these into interactive flashcards and track your progress automatically.
Practice with flashcards →What is a spear phishing attack?
What is CEO fraud (business email compromise)?
Why do scammers create urgency in messages?
What should you do if you clicked a suspicious link?
How can you verify a suspicious request from a coworker?
How can you safely check where a link goes?
What is a suspicious email attachment type?
What should you do with unexpected invoices or payment requests?
What is a common sign of a fake login page?
What should you do if an email seems to come from IT asking for your password?
What does it mean if an email address looks similar to a real one?
Why is replying to a phishing email risky?
What is the safest way to handle unknown links?
What is an example of a suspicious subject line?
What should you do with unexpected calendar invites?
Turn these into interactive flashcards and track your progress automatically.
Practice with flashcards →Why are software updates important?
What should you do if your device shows repeated security warnings?
What is malware?
What is ransomware?
What is the safest way to install software at work?
Why should you avoid using unknown USB drives?
What should you do if you lose a work device?
What is the risk of using personal apps on work devices?
What should you do before disposing of a work computer?
What does 'least privilege' mean?
Why is public Wi-Fi risky?
What is a safe way to use public Wi-Fi for work?
What is a VPN used for?
What should you do if you receive a work call in a public place?
What is shoulder surfing?
Turn these into interactive flashcards and track your progress automatically.
Practice with flashcards →What is confidential data?
What is personally identifiable information (PII)?
What is the safest way to share sensitive files?
Why should you avoid sending sensitive data by email?
What should you do before printing sensitive documents?
Why is reporting suspicious activity important?
What should you report to IT or security immediately?
What should you do if you accidentally sent sensitive data to the wrong person?
What should you do if you suspect your account was hacked?
What is an incident response plan?
What should you do if you receive an unexpected password reset email?
What is a password manager?
Why should you avoid saving passwords in your browser?
What is an MFA push notification scam?
What should you do if you get an MFA prompt you did not request?
Turn these into interactive flashcards and track your progress automatically.
Practice with flashcards →What is smishing?
What is vishing?
Why are unexpected gift card requests suspicious?
What is a common sign of an impersonation scam?
What should you do if a caller claims to be IT and asks for access?
What is a safe way to open an attachment you were expecting?
Why are QR codes sometimes risky?
What should you do before entering a password on a website?
What is a safe response to an email asking you to update payment details?
What is a lookalike domain?
Why should you avoid jailbreaking or rooting a work phone?
What is endpoint protection software?
Why should you restart your computer regularly?
What is the risk of using outdated software?
What should you do if you see a fake antivirus popup?
Turn these into interactive flashcards and track your progress automatically.
Practice with flashcards →What is a safe practice when working from home?
Why should you avoid sharing your work laptop with family members?
What should you do if your home Wi-Fi password is weak?
What is a rogue Wi-Fi hotspot?
What is a safe habit when traveling with a work device?
What should you do before sharing a file link with someone?
What is data minimization?
Why should you avoid copying sensitive data into chat apps?
What is the risk of using personal email for work files?
What should you do with sensitive documents you no longer need?
What details help IT investigate a suspicious email?
Why should you report incidents quickly even if unsure?
What should you do if you notice unusual account activity?
What is the safest action if you suspect malware on your device?
What should you do after reporting a security issue?
Memorizing questions isn’t enough. Our system repeats the questions you struggle with until you reliably remember them — the same learning method used by language apps.
This page provides the complete question reference. For real practice, use the flashcard training mode to test yourself until you can consistently answer correctly without looking.
Start studying now (free)