Question Title

* 1. What is your name? (First, Last)

Question Title

* 2. What is your location?

Question Title

* 3. What is your role/job title/department?

Question Title

* 4. What day(s) of the week are the most common times for attacks to occur?

Question Title

* 5. Using the same password for all of your accounts is the best way to protect yourself against a personal cyber attack

Question Title

* 6. We've all received emails like the one below. Name 2 things about this image that indicate the sender is not actually Maureen.
maureen

Question Title

* 7. The main purpose of these attacks is to deploy [a] to get into computers and servers to encrypt data and hold it hostage.

Question Title

* 8. The main purpose of these attacks is to deploy ------------------   to get into computers and servers to encrypt data and hold it hostage.

Question Title

* 9. Which of the following is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts of attacks?

Question Title

* 10. Our best deterrent to cyber attacks are staff themselves!

Question Title

* 11. How would you rate the relevance of this material to your day-to-day job?

Question Title

* 12. Did you learn anything about the position/topic that you didn’t know prior to this?

Question Title

* 13. How would you rate the relevance of this material to your day-to-day job?

Question Title

* 14. Have you gained any new knowledge? If yes, please specify!

Question Title

* 15. What kind of content would you like to see in the future to help improve your day-to-day work life? Check all that apply:

Question Title

* 16. If you selected other material that you would like to see in the future, please be specific:

Question Title

* 17. Was there anything unclear in the material that you would like your manager or the Frontier-U team to expand on?

T