Security Awareness Flashcards

Objective 5.6: Given a scenario, you must be able to implement security awareness practices

1
Q

You are a cybersecurity analyst at a large organization. During a routine review of employee activity logs, you notice that an employee, James, has been logging into the system outside of regular working hours and copying large amounts of sensitive data onto an external storage device. What is the most appropriate course of action?

A) Immediately terminate James’ access and notify law enforcement.
B) Report the behavior to the security team and initiate an insider threat investigation.
C) Confront James directly and ask why he is copying sensitive data.
D) Ignore the activity as it may be part of his routine work responsibilities.

A

✅ Correct Answer: B) Report the behavior to the security team and initiate an insider threat investigation.
📌 Explanation:

A) Immediately terminating James’ access and notifying law enforcement is excessive without proper evidence.
C) Directly confronting James could alert him and cause data destruction or retaliation.
D) Ignoring the activity could result in a serious security breach, as unauthorized data access should always be investigated.
B) Reporting the anomaly ensures a structured investigation while protecting the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your company recently conducted financial wellness assessments for employees. During this process, Sarah, a database administrator, disclosed to a coworker that she is under significant financial strain due to medical expenses. At the same time, you notice Sarah has been accessing customer financial records more frequently than her job requires. What should your organization do next?

A) Launch an investigation to determine if Sarah is misusing her access.
B) Immediately revoke Sarah’s access to customer financial records.
C) Ignore it, as financial struggles are a personal issue and not a security concern.
D) Publicly question Sarah about her financial issues to gauge her reaction.

A

✅ Correct Answer: A) Launch an investigation to determine if Sarah is misusing her access.
📌 Explanation:

B) Immediately revoking Sarah’s access may be unjustified without evidence.
C) Ignoring financial stress is risky because it is a known factor in insider threats.
D) Publicly questioning Sarah would be unethical and could violate employee privacy.
A) Conducting an investigation ensures the situation is evaluated fairly before taking any actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your organization conducts routine security awareness training. During a discussion, an employee notices that a coworker, Michael, who earns a modest salary, recently purchased a luxury car and a high-end apartment in an expensive area. The employee expresses concerns about potential illicit activity. How should your organization respond?

A) Immediately fire Michael for suspicious financial activity.
B) Discreetly investigate Michael’s financial background to rule out illicit activities.
C) Ignore the report, as employees have the right to personal privacy.
D) Publicly question Michael about how he can afford these luxuries.

A

✅ Correct Answer: B) Discreetly investigate Michael’s financial background to rule out illicit activities.
📌 Explanation:

A) Firing Michael immediately would be unjustified without evidence.
C) Ignoring the report disregards a potential insider threat.
D) Publicly questioning Michael could be invasive, unethical, and damage morale.
B) Conducting a discreet investigation ensures fairness while identifying potential security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your organization has a wellness program aimed at supporting employees. One of your team members, John, has recently exhibited signs of emotional distress. He has been giving away personal belongings, making concerning statements, and appears disengaged at work. As a security professional, what should you do?

A) Report John’s behavior to HR and security for intervention.
B) Ignore the situation because it’s a personal issue.
C) Immediately terminate John’s employment for being a potential risk.
D) Send an anonymous email to management warning about John’s behavior.

A

✅ Correct Answer: A) Report John’s behavior to HR and security for intervention.
📌 Explanation:

B) Ignoring his behavior could allow security risks to escalate.
C) Terminating employment immediately is extreme and lacks justification.
D) Sending an anonymous report lacks transparency and may not result in appropriate action.
A) Reporting to HR and security ensures John gets the support he needs while mitigating risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To proactively address insider threats, your company is implementing a new security awareness training program. Which of the following best practices should be included?

A) Encourage employees to report suspicious behavior without fear of retaliation.
B) Enforce strict monitoring of all employees, regardless of risk level.
C) Mandate that all employees undergo financial background checks.
D) Publicly post a list of employees who are considered security risks.

A

✅ Correct Answer: A) Encourage employees to report suspicious behavior without fear of retaliation.
📌 Explanation:

B) Strictly monitoring all employees may create an environment of mistrust.
C) Mandatory financial background checks may violate privacy rights.
D) Publicly listing security risks is unethical and could harm employee morale.
A) Encouraging employees to report threats fosters a security-conscious culture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your organization has implemented user activity monitoring tools to detect insider threats. However, some employees are concerned about privacy violations. What is the best way to address these concerns?

A) Clearly communicate the purpose and scope of monitoring while balancing privacy rights.
B) Tell employees that their privacy does not matter when security is at risk.
C) Stop all monitoring activities to respect employee privacy.
D) Conduct monitoring in secret without informing employees to avoid resistance.

A

✅ Correct Answer: A) Clearly communicate the purpose and scope of monitoring while balancing privacy rights.
📌 Explanation:

B) Telling employees privacy does not matter could create a hostile work environment.
C) Stopping monitoring entirely could lead to security breaches.
D) Secret monitoring is unethical and may violate privacy laws.
A) Transparency helps employees understand the necessity of monitoring while maintaining trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During a security audit, you notice that an employee, Alex, has been accessing sensitive financial data that is unrelated to his role. What is the best next step?

A) Immediately revoke Alex’s access and fire him.
B) Investigate whether Alex’s access is authorized and necessary for his job.
C) Ignore the activity because Alex has not caused any known damage.
D) Publicly question Alex about why he is looking at financial data.

A

✅ Correct Answer: B) Investigate whether Alex’s access is authorized and necessary for his job.
📌 Explanation:

A) Immediately firing Alex is excessive without evidence.
C) Ignoring the activity disregards a potential insider threat.
D) Publicly questioning Alex is unprofessional and could escalate the situation.
B) Investigating first ensures that actions are justified before revoking access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sarah works in the finance department of a large corporation and struggles to remember her passwords for multiple work-related accounts. She decides to write them down in a notebook for convenience. What would be a more secure alternative?

A) Store passwords in a password manager with a strong master password.
B) Keep all passwords written in a notebook stored in a locked drawer.
C) Use the same password for all accounts so she only has to remember one.
D) Save passwords in a text document on her work computer.

A

✅ Correct Answer: A) Store passwords in a password manager with a strong master password.
📌 Explanation:

A (Correct): A password manager securely stores multiple credentials and requires only one master password, reducing security risks.
B (Incorrect): While a locked drawer adds physical security, it does not protect against theft, loss, or unauthorized access.
C (Incorrect): Reusing passwords across multiple sites is highly insecure and increases vulnerability to credential stuffing attacks.
D (Incorrect): Storing passwords in an unprotected text file exposes them to unauthorized access, malware, or accidental leaks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

John frequently uses the same password across multiple websites, including his personal email, banking account, and a social media platform. What is the biggest risk of this practice?

A) If one account is compromised, attackers can access multiple accounts using the same password.
B) Websites may require different password formats, making it harder to remember one password.
C) John may forget his single password and be locked out of all accounts.
D) His passwords could be too strong, making it difficult for him to log in without assistance.

A

✅ Correct Answer: A) If one account is compromised, attackers can access multiple accounts using the same password.
📌 Explanation:

A (Correct): Reusing passwords means a breach on one website exposes all accounts using the same password, enabling credential stuffing attacks.
B (Incorrect): Different password formats are an inconvenience but do not pose the biggest risk compared to password reuse.
C (Incorrect): Forgetting a password can be resolved with password recovery, but using weak or reused passwords leads to security breaches.
D (Incorrect): Having strong passwords is beneficial, and using a password manager can prevent login difficulties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

David is setting up his online banking account and needs a way to store his credentials securely. He is considering using either his web browser’s built-in password manager or a third-party solution. Which of the following best explains why a third-party password manager might be a better choice?

A) Third-party password managers offer cross-platform compatibility and additional security features.
B) Browser-based password managers are unreliable and do not work on most websites.
C) Third-party password managers are always free, making them a more cost-effective option.
D) Browser-based managers do not support encryption, making stored passwords easy to steal.

A

✅ Correct Answer: A) Third-party password managers offer cross-platform compatibility and additional security features.
📌 Explanation:

A (Correct): Third-party password managers (e.g., Bitwarden, Dashlane, LastPass, OnePass) provide stronger encryption, cross-device syncing, and better security policies.
B (Incorrect): Browser-based password managers work well but may lack advanced security features found in third-party solutions.
C (Incorrect): Many third-party password managers offer free versions, but premium features often require payment.
D (Incorrect): Most modern browsers encrypt stored passwords, but third-party managers typically provide stronger encryption and additional security layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maria is an IT administrator managing numerous accounts for her company. She wants to improve security while simplifying login processes. What is the best way for her to achieve this?

A) Store all her passwords in a password manager with strong encryption.
B) Write her passwords in a personal notebook and store it at her desk.
C) Use simple passwords that are easy to remember and type.
D) Store login details in a spreadsheet protected by a password.

A

✅ Correct Answer: A) Store all her passwords in a password manager with strong encryption.
📌 Explanation:

A (Correct): Password managers encrypt and securely store passwords, preventing password reuse and simplifying access.
B (Incorrect): A notebook can be lost or stolen, leading to a security breach.
C (Incorrect): Simple passwords increase vulnerability to attacks like brute force and dictionary attacks.
D (Incorrect): Storing passwords in a spreadsheet is risky since it can be accessed if the main system is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cybersecurity team detects that one of the company’s employees has had their login credentials exposed in a data breach. What is the best immediate action to take?

A) Require the employee to change their password immediately and enable multi-factor authentication (MFA).
B) Temporarily suspend the employee’s account and conduct a full security audit before allowing them access again.
C) Advise the employee to keep using the compromised password for consistency but be extra cautious.
D) Do nothing—since it was a one-time breach, it’s unlikely to be exploited again.

A

✅ Correct Answer: A) Require the employee to change their password immediately and enable multi-factor authentication (MFA).
📌 Explanation:

A (Correct): Changing the password prevents attackers from using the stolen credentials, and enabling MFA adds an extra layer of security.
B (Incorrect): Conducting an audit is good, but immediate action (password reset + MFA) is needed first to prevent unauthorized access.
C (Incorrect): Reusing a compromised password increases the risk of credential stuffing attacks.
D (Incorrect): A data breach should never be ignored, as attackers often sell or exploit leaked credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your company recently hired a new security guard who is responsible for monitoring access to the building. One day, a well-dressed individual approaches the door and tells the guard that they forgot their access badge at home but need to enter immediately for an urgent meeting. The guard considers allowing them in. What is the best course of action?

A) Allow the individual entry based on their appearance and urgency.
B) Deny access and immediately report the individual as a potential intruder.
C) Politely ask the individual to contact their supervisor or an authorized employee to verify their identity.
D) Let the individual in but follow them to ensure they don’t access restricted areas.

A

✅ Correct Answer: C) Politely ask the individual to contact their supervisor or an authorized employee to verify their identity.
📌 Explanation:

A) Incorrect: Social engineers often exploit urgency and authority to bypass security controls (e.g., tailgating or piggybacking). Allowing access without verification creates a security risk.
B) Incorrect: Denying access is necessary, but immediately reporting without verification could cause unnecessary panic. Verification should come first.
C) Correct: The best course of action is to require verification from an authorized source before granting access.
D) Incorrect: Following them does not prevent a security breach, as they may still access restricted areas once inside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are working remotely from a coffee shop and logging into your company’s internal system. You notice someone sitting behind you looking at your screen. What should you do to prevent potential shoulder surfing?

A) Turn your screen away or use a privacy screen filter.
B) Continue working and ignore the person since they may not be looking at your screen intentionally.
C) Politely confront the person and ask them to move away.
D) Log out of the system and stop working altogether.

A

✅ Correct Answer: A) Turn your screen away or use a privacy screen filter.
📌 Explanation:

A) Correct: A privacy screen filter limits visibility to the direct user and turning the screen away reduces exposure to prying eyes.
B) Incorrect: Ignoring the situation increases the risk of sensitive information being compromised.
C) Incorrect: Confronting someone may escalate the situation unnecessarily.
D) Incorrect: Logging out is not a long-term solution. Instead, adjusting screen positioning or using privacy tools provides better protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

During a business trip, you and a colleague are discussing an upcoming company project in a hotel lobby. A stranger sitting nearby seems to be listening. What is the best course of action?

A) Lower your voice and continue the discussion as planned.
B) Switch to an encrypted messaging app to communicate instead.
C) Move to a private, soundproof location before continuing the discussion.
D) Confront the stranger and ask if they are eavesdropping.

A

✅ Correct Answer: C) Move to a private, soundproof location before continuing the discussion.
📌 Explanation:

A) Incorrect: Lowering your voice helps but does not fully protect against eavesdropping.
B) Incorrect: Secure messaging apps work for text communication but do not protect verbal conversations.
C) Correct: Moving to a private area eliminates the risk of an unauthorized person overhearing sensitive details.
D) Incorrect: Confronting the individual is unnecessary and could lead to unwanted confrontation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company employee throws away printed reports containing financial data into a public trash bin instead of shredding them. How should the company prevent dumpster diving attacks in the future?

A) Instruct employees to shred sensitive documents before disposal.
B) Lock dumpsters inside a secure facility.
C) Encrypt all financial documents before printing.
D) Monitor trash bins with security cameras to detect unauthorized access.

A

✅ Correct Answer: A) Instruct employees to shred sensitive documents before disposal.
📌 Explanation:

A) Correct: Shredding sensitive documents ensures data cannot be recovered by attackers.
B) Incorrect: Locking dumpsters adds security, but not all organizations have secured disposal areas.
C) Incorrect: Encrypting files helps in digital security but does not prevent printed documents from being recovered.
D) Incorrect: Monitoring bins can help detect unauthorized access but does not stop the attack itself.

16
Q

You find a USB flash drive labeled “Employee Salaries 2024” in your company’s parking lot. What should you do?

A) Plug the USB into your computer to check its contents and determine its owner.
B) Hand it over to the IT department for security inspection.
C) Format the USB drive to remove any potential malware before using it.
D) Leave it where you found it in case the owner comes back for it.

A

✅ Correct Answer: B) Hand it over to the IT department for security inspection.
📌 Explanation:

A) Incorrect: Plugging in unknown USB devices can infect a computer with malware.
B) Correct: The safest course of action is to report it to IT so it can be analyzed securely.
C) Incorrect: Formatting does not guarantee the removal of malware that could auto-execute.
D) Incorrect: Leaving it increases the risk that someone else will pick it up and use it unsafely.

17
Q

While traveling, your phone battery is low, and you find a free public charging station at the airport. What is the safest way to charge your phone?

A) Use your own charging cable and AC adapter.
B) Use the provided charging cable but avoid logging into sensitive accounts.
C) Charge the phone only for a few minutes to minimize exposure.
D) Borrow a charging cable from another traveler.

A

✅ Correct Answer: A) Use your own charging cable and AC adapter.
📌 Explanation:

A) Correct: Using a personal charger and cable ensures you are not exposed to potential malware.
B) Incorrect: Malicious charging cables can install malware even if you don’t log in.
C) Incorrect: Even short exposure can compromise a device.
D) Incorrect: Borrowing a cable does not guarantee security unless it’s from a trusted source.

18
Q

You receive a phone call from someone claiming to be your company’s IT support. They insist that your account will be locked in 10 minutes unless you provide your login credentials immediately. What should you do?

A) Provide the credentials since it seems urgent.
B) Ask for the caller’s details and verify with IT before taking any action.
C) Hang up and ignore the call.
D) Share only your username but not your password.

A

✅ Correct Answer: B) Ask for the caller’s details and verify with IT before taking any action.
📌 Explanation:

A) Incorrect: Legitimate IT support will never ask for login credentials over the phone.
B) Correct: The best action is to independently verify the request with IT before responding.
C) Incorrect: Hanging up is good, but ignoring the issue completely may prevent security teams from identifying a phishing attempt.
D) Incorrect: Sharing even partial credentials can assist an attacker in compromising your account.

19
Q

You are a new employee at a cybersecurity firm and want to familiarize yourself with company policies. You come across a handbook and a policy document regarding data protection. How do these two documents differ?

A) A policy is a set of official rules that must be followed, while a handbook provides explanations and guidelines.
B) A handbook defines strict security rules, while a policy is more of a general guide for employees.
C) A policy and a handbook are the same; they both contain guidelines that are optional to follow.
D) A policy only applies to IT security, while a handbook covers all company policies.

A

✅ Correct Answer: A) A policy is a set of official rules that must be followed, while a handbook provides explanations and guidelines.
📌 Explanation:

A) (Correct) A policy establishes strict rules and must be followed, while a handbook provides explanations and best practices to help employees understand and implement policies.
B) (Incorrect) A policy is the set of rules, while a handbook is a guide—not the other way around.
C) (Incorrect) Policies must be followed; they are not optional. Handbooks provide guidance but also include policies.
D) (Incorrect) Policies apply to all areas, not just IT security. Handbooks cover policies across different business areas.

20
Q

You work for a financial institution that requires secure disposal of sensitive documents. Your company has a policy stating that sensitive financial records must be shredded before disposal. A colleague suggests throwing old reports in the recycling bin instead of using the shredder. What should you do?

A) Follow company policy and shred the documents to ensure proper disposal.
B) Place the documents in the recycling bin, as long as the bin is in a secure area.
C) Ignore the situation, as your colleague is responsible for handling the documents.
D) Contact HR and report your colleague for violating company policy.

A

✅ Correct Answer: A) Follow company policy and shred the documents to ensure proper disposal.
📌 Explanation:

A) (Correct) Policies on data disposal exist to prevent sensitive data leaks. Following policy guidelines ensures compliance.
B) (Incorrect) Placing sensitive documents in the recycling bin—even in a secure area—violates security policy. Recycling bins are not designed for classified disposal.
C) (Incorrect) Ignoring the situation risks a security breach; all employees are responsible for following security policies.
D) (Incorrect) While security concerns should be reported, HR is not the first step for handling policy violations—talk to your colleague first and ensure compliance.

21
Q

Your company allows remote work but has strict policies on handling sensitive information. You are working from home and need access to top-secret documents for a project. What should you do?

A) Check the company’s remote work policy before handling the documents.
B) Print the documents at home to review them later.
C) Send the documents to your personal email for easy access.
D) Save the files on a personal USB drive to transfer them later.

A

✅ Correct Answer: A) Check the company’s remote work policy before handling the documents.
📌 Explanation:

A) (Correct) Security policies outline what data can be accessed remotely. Always check policies first before handling sensitive information outside the office.
B) (Incorrect) Printing sensitive documents at home violates security policies and could lead to data breaches.
C) (Incorrect) Sending sensitive data to a personal email is a serious security risk and could violate company policy.
D) (Incorrect) Storing sensitive files on personal storage devices violates security protocols and could lead to a data breach.

22
Q

Your organization updates its security policies annually, but employees often overlook the updates. To ensure compliance, what is the best approach?

A) Require employees to review and acknowledge security policies whenever an update is made.
B) Send an email notification about updates and assume employees will read it.
C) Only update policies if there is a major security incident.
D) Make policies optional for employees unless they work in IT or cybersecurity.

A

✅ Correct Answer: A) Require employees to review and acknowledge security policies whenever an update is made.
📌 Explanation:

A) (Correct) Employees must be aware of and acknowledge policy updates to ensure compliance and security awareness.
B) (Incorrect) Email notifications alone are ineffective because employees may ignore or miss them.
C) (Incorrect) Policies should be updated regularly, not just after security incidents. Proactive updates prevent issues.
D) (Incorrect) Security policies apply to all employees, not just IT staff.

23
Q

An employee encounters a security issue that is not covered in the company handbook or policies. What should they do?

A) Report the situation to management or the security team for guidance.
B) Ignore the issue since there is no policy addressing it.
C) Create their own rule based on what seems logical.
D) Continue working and wait to see if the issue becomes a bigger problem.

A

✅ Correct Answer: A) Report the situation to management or the security team for guidance.
📌 Explanation:

A) (Correct) If policies do not cover a situation, employees should report it to management or security teams for guidance.
B) (Incorrect) Ignoring potential security issues increases risk and leaves vulnerabilities unaddressed.
C) (Incorrect) Employees should not create their own rules—policy decisions should be made at the organizational level.
D) (Incorrect) Waiting for an issue to escalate could worsen security risks. Reporting issues early prevents larger problems.

24
Q

A system administrator missed an update memo regarding a new password complexity policy. As a result, they failed to implement the updated security settings on company servers. What could have prevented this issue?

A) Providing a one-page summary of critical changes along with the updated policy.
B) Sending an optional email about the changes and assuming employees will read it.
C) Waiting until a security breach happens before enforcing the new policy.
D) Leaving security updates to the discretion of each administrator.

A

✅ Correct Answer: A) Providing a one-page summary of critical changes along with the updated policy.
📌 Explanation:

A) (Correct) Summarizing major updates ensures that employees quickly understand critical changes and take action.
B) (Incorrect) Sending an optional email is ineffective since many employees may overlook it.
C) (Incorrect) Waiting for a breach before enforcing security changes is a reactive approach, which increases risk.
D) (Incorrect) Security updates must be standardized across the organization, not left to individual discretion.

25
Q

Scenario:
You are the IT security manager of a company that recently transitioned to a hybrid work model. One of your employees, Sarah, frequently connects to the company’s internal systems using public Wi-Fi at coffee shops. What is the BEST way to mitigate the security risks associated with her remote work habits?

A) Require Sarah to use a Virtual Private Network (VPN) when connecting to company systems.
B) Allow Sarah to continue using public Wi-Fi but ensure she changes her password frequently.
C) Advise Sarah to only work in locations that offer free Wi-Fi with a password.
D) Block Sarah’s access to company systems unless she is physically in the office.

A

✅ Correct Answer: A) Require Sarah to use a Virtual Private Network (VPN) when connecting to company systems.
📌 Explanation:

A) VPN encrypts all network traffic, making it difficult for attackers to intercept data on unsecured networks like public Wi-Fi. (Best option)
B) Changing passwords frequently does not protect against real-time eavesdropping on an unsecured network.
**C) Password-protected public Wi-Fi does not guarantee encryption or prevent attacks like man-in-the-middle attacks.
**D) Blocking access from remote locations defeats the purpose of a hybrid work model and is not practical.

26
Q

Scenario:
Mark, an employee at a financial firm, recently lost his company-issued laptop while traveling. The IT department is concerned about potential data leaks. What would have been the BEST preventative measure to protect the company’s sensitive information?

A) Require all company laptops to have full-disk encryption and remote wipe capability.
B) Ensure employees set strong login passwords on their devices.
C) Advise employees not to store sensitive company data on their laptops.
D) Disable Wi-Fi on all remote devices to prevent unauthorized access.

A

✅ Correct Answer: A) Require all company laptops to have full-disk encryption and remote wipe capability.
📌 Explanation:

A) Full-disk encryption ensures that even if a laptop is lost or stolen, the data remains protected. Remote wipe allows IT to erase data from the device remotely. (Best option)
B) A strong password alone does not prevent data from being accessed if the hard drive is removed and read externally.
**C) Advising employees not to store sensitive data is impractical since work files are often needed locally.
**D) Disabling Wi-Fi does not prevent unauthorized access to stored data.

27
Q

Scenario:
A company allows employees to use their personal devices (BYOD - Bring Your Own Device) for remote work. However, IT is concerned about security risks associated with unsecured personal laptops. What policy should the company enforce?

A) Mandate that all personal devices follow strict security measures, such as regular patching and security updates.
B) Allow employees to work on personal devices without restrictions to improve flexibility.
C) Require employees to only use web-based applications when working remotely.
D) Prohibit the use of personal devices for any company work.

A

✅ Correct Answer: A) Mandate that all personal devices follow strict security measures, such as regular patching and security updates.
📌 Explanation:

A) Enforcing security measures on BYOD devices (patching, antivirus, endpoint security) helps reduce risk while allowing flexibility. (Best option)
**B) Allowing unrestricted BYOD use creates security vulnerabilities (e.g., outdated software, malware risks).
**C) Web-based apps improve security, but they do not fully protect against keyloggers or other malware on personal devices.
**D) A full ban on personal devices may not be feasible for remote work environments.

28
Q

Scenario:
Your company has a hybrid workforce, and some employees store work files only on their laptops. Recently, a ransomware attack encrypted several employees’ files, making them inaccessible. What is the BEST backup strategy to prevent permanent data loss?

A) Implement automated cloud backups to securely store work data offsite.
B) Require employees to manually copy files to external USB drives every week.
C) Advise employees to store files only on local device storage to maintain control.
D) Have employees print important documents for backup purposes.

A

✅ Correct Answer: A) Implement automated cloud backups to securely store work data offsite.
📌 Explanation:

A) Cloud backups ensure that work data is securely stored and can be restored if a ransomware attack occurs. (Best option)
B) USB backups are prone to loss or theft and may still be affected by ransomware if connected to an infected system.
**C) Local storage without backups increases the risk of permanent data loss.
**D) Printing documents is inefficient, insecure, and does not protect digital files.

29
Q

Scenario:
A multinational company is selecting a new collaboration platform for remote workers to share documents and conduct virtual meetings. Which feature is the MOST critical to ensure secure remote collaboration?

A) End-to-end encryption to protect shared documents and video calls.
B) A user-friendly interface that ensures employees find it easy to use.
C) Unlimited cloud storage for employees to store as many files as needed.
D) The ability to share files with external users without requiring authentication.

A

✅ Correct Answer: A) End-to-end encryption to protect shared documents and video calls.
📌 Explanation:

A) End-to-end encryption ensures that sensitive communications and files cannot be intercepted by attackers. (Best option)
B) A user-friendly interface is beneficial, but security should be the top priority.
**C) Unlimited cloud storage is useful, but it does not guarantee data protection.
**D) Allowing file sharing without authentication increases the risk of unauthorized access.

30
Q

Scenario:
An employee working remotely receives a suspicious email that claims to be from IT support and requests their login credentials. The employee is unsure whether the email is legitimate. What is the BEST course of action?

A) Report the email immediately to the cybersecurity team for investigation.
B) Reply to the email and ask the sender if they are really from IT support.
C) Click on the link in the email and check if the webpage looks legitimate.
D) Ignore the email, assuming it is just another spam message.

A

✅ Correct Answer: A) Report the email immediately to the cybersecurity team for investigation.
📌 Explanation:

A) Reporting suspicious emails helps the cybersecurity team analyze and mitigate potential phishing threats. (Best option)
**B) Replying to the sender could confirm to the attacker that the email account is active.
**C) Clicking on the link risks credential theft if it is a phishing attempt.
**D) Ignoring the email does not alert the company, leaving others at risk.

31
Q

Your company’s cybersecurity team conducts regular security audits for remote employees. What is the main reason for these audits?

A) To monitor and improve security policies based on identified risks.
B) To reduce employee workload by removing security controls.
C) To prevent employees from working outside the company’s office.
D) To eliminate all security vulnerabilities permanently.

A

✅ Correct Answer: A) To monitor and improve security policies based on identified risks.
📌 Explanation:

(A) Security audits help organizations identify risks, update security protocols, and improve overall security posture.
(B) Security audits do not remove security controls; instead, they enhance protections for remote work environments.
**(C) The purpose is to support secure remote work, not prevent it.
**(D) Security audits reduce risks but cannot eliminate all vulnerabilities permanently.

32
Q

Your company has recently experienced multiple security breaches due to employees failing to follow cybersecurity protocols. The executive leadership team decides to address this issue. As a security officer, what should be the first step in creating a strong culture of security?

A) Enforce strict punishments for any employee who violates security policies.
B) Require employees to complete an annual security training course.
C) Have executives actively promote security as a corporate responsibility, ensuring security values are communicated across all levels.
D) Install additional firewalls and encryption systems to enhance technical security measures.

A

✅ Correct Answer: C) Have executives actively promote security as a corporate responsibility, ensuring security values are communicated across all levels.
📌 Explanation:

C (Correct): A strong culture of security starts at the executive level through organizational change management (OCM). Leaders must set the tone and communicate security as a shared responsibility rather than a top-down mandate.
A (Incorrect): Enforcing strict punishments may lead to fear-based compliance rather than a true understanding of security best practices.
B (Incorrect): Training is important, but a one-time annual session is insufficient for embedding cybersecurity into the daily workflow.
D (Incorrect): Technical measures are essential but ineffective if employees do not follow security policies.

33
Q

Your company is designing a new security framework as part of its development phase. What is the most effective approach for ensuring a successful implementation?

A) Create security policies that focus solely on technical controls like firewalls and encryption.
B) Establish clear and actionable security policies, educate employees on threats, and provide guidelines for handling sensitive data.
C) Implement security policies without informing employees to test their ability to detect security threats independently.
D) Assign security responsibilities to the IT department only, since they have the technical knowledge.

A

✅ Correct Answer: B) Establish clear and actionable security policies, educate employees on threats, and provide guidelines for handling sensitive data.
📌 Explanation:

B (Correct): The development phase should include creating comprehensive security policies, employee training, and clear guidelines for handling threats such as phishing and social engineering.
A (Incorrect): Security isn’t just about technical controls; human factors are just as critical.
C (Incorrect): Keeping employees uninformed as a “test” may increase security risks instead of reducing them.
D (Incorrect): Security is a shared responsibility across the organization, not just for IT teams.

34
Q

Your company has developed new cybersecurity policies and is now in the execution phase. Which strategy will be most effective in ensuring that employees apply security principles in their daily work?

A) Conduct ongoing training and simulated attacks (e.g., phishing tests) to reinforce awareness.
B) Send an email containing a long document with security guidelines and expect employees to read and follow them.
C) Only provide training to employees working in high-risk roles like system administrators.
D) Assume that once policies are in place, employees will automatically adopt security best practices.

A

✅ Correct Answer: A) Conduct ongoing training and simulated attacks (e.g., phishing tests) to reinforce awareness.
📌 Explanation:

A (Correct): The execution phase requires continuous training and practical exercises (e.g., phishing simulations) to ensure employees retain cybersecurity knowledge.
B (Incorrect): Sending long documents is ineffective—interactive training is far more engaging and improves retention.
C (Incorrect): Security awareness is important for all employees, not just IT staff.
D (Incorrect): Simply implementing policies does not ensure compliance—active engagement is necessary.

35
Q

A junior employee receives a suspicious email that appears to be a phishing attempt. However, they hesitate to report it because they are afraid of getting blamed if it turns out to be a false alarm. How can your organization prevent this issue?

A) Require employees to only report security issues if they are 100% certain they are a real threat.
B) Encourage a blame-free reporting culture where employees feel safe reporting potential threats.
C) Enforce strict policies where any failure to report a security incident results in termination.
D) Restrict security reporting only to the IT team, so non-technical employees don’t need to be involved.

A

✅ Correct Answer: B) Encourage a blame-free reporting culture where employees feel safe reporting potential threats.
📌 Explanation:

B (Correct): Employees must feel safe to report incidents without fear of punishment. Encouraging a positive reporting culture ensures that potential threats are addressed quickly.
A (Incorrect): Employees should report any suspicious activity, even if they aren’t sure—it’s better to be safe than sorry.
C (Incorrect): Harsh punishments discourage reporting and create fear-based compliance, which harms security culture.
D (Incorrect): Security is everyone’s responsibility, not just the IT team’s.

36
Q

Your organization has recently updated its security policies, but some employees are still struggling to comply with new protocols. What is the best approach to improve adoption?

A) Analyze employee feedback and reported incidents, then refine training programs and update security procedures accordingly.
B) Assume that employees will eventually adjust over time, so no further action is needed.
C) Reduce the complexity of security protocols, even if it means lowering security standards.
D) Enforce a zero-tolerance policy, where employees who fail to comply with security rules are immediately terminated.

A

✅ Correct Answer: A) Analyze employee feedback and reported incidents, then refine training programs and update security procedures accordingly.
📌 Explanation:

A (Correct): Establishing feedback loops helps organizations improve security by analyzing challenges and making necessary adjustments.
B (Incorrect): Security requires continuous adaptation—assuming employees will adjust without support is ineffective.
C (Incorrect): Reducing security standards weakens overall protection instead of improving compliance.
D (Incorrect): Harsh punishments discourage open communication and lead to a toxic security culture.