Please complete the following quiz as a knowledge check to verify completion of the PEI IT Security Awareness Webinar.

Once you complete the quiz, be sure to print your results page and save with your other PEI contract documents. Under your PEI contract, it is your organization's responsibility to provide documentation of training completion for contract compliance and monitoring purposes.

Question Title

* 1. Please enter your contact information so we can record your score and completion.

Question Title

* 2. You get out of your car in the office parking lot and find a flash drive lying on the pavement. It's labeled "Payroll 3rd Qtr." What should you do with it?

Question Title

* 3. You receive an email stating that you have been opted in to a company-wide blood-drive and are asked to click on a link to confirm your participation. Which of the following is the biggest red flag? Choose the answer you feel best applies.

Question Title

* 4. What is the key thing to remember when you are asked to download a file?

Question Title

* 5. Each of the images below are a screenshot of an email. After reviewing the emails, select the one that you think contains the most phishing red flags. (You may need to use your browser's zoom functionality to read the messages)

Question Title

* 6. Below are three transcripts of phone messages. After reading all of the messages, select the one you think contains the most vishing red flags.

Question Title

* 7. The images below are three different text messages you received. After reviewing all three messages, select the one that you think contains the most smishing red flags. (You may need to use your browser's zoom functionality to read the messages)

Question Title

* 8. Tailgating is a form of what type of attack?

Question Title

* 9. Hackers most likely have information about you that they use to make their con more convincing. They gain this information through:

Question Title

* 10. What is the most likely to be  a possible physical attack?

Question Title

* 11. Hackers know that most attacks require you to do this for them to work:

Question Title

* 12. The art of manipulating, influencing, or deceiving you into taking some action that isn't in the best interest of you or your organization is:

Question Title

* 13. Which of the following is an example of PII?

Question Title

* 14. Which of the following is a valid reason why you should take care to protect and safely handle sensitive information?

Question Title

* 15. You find a thumb drive in the men's room with a label "Layoffs for third quarter". What type of attack does this represent?

Question Title

* 16. You receive a text message from your bank asking you to click on the link provided to activate your new credit card. What type of attack does this represent?

Question Title

* 17. You receive an email from your bank telling you that your password has expired. It asks you to click on the link to reset it. What type of attack does this represent?

Question Title

* 18. You receive an email that looks like it's coming from your college alumni association asking you to download the new calendar. But you know the calendar is on their website, not in a pdf. What type of attack does this represent?

Question Title

* 19. You receive a voicemail that sounds like it's from your customer support for your cell phone provider asking you to call them back to avoid having your service interupted. What type of attack does this represent?

Question Title

* 20. You've received a text from your banking asking you to call the number provided to verify recent charges. Which scenario reflects the most secure approach?

Question Title

* 21. Which of the following is LEAST likely to be the start of a social engineering attack?

T