An official website of the United States government
Translation Menu
- Español
Secondary Menu
- Report Fraud
- Sign Up for Consumer Alerts
- Search the Legal Library
Main Menu Mega
- Search
Translation Menu
- Español
Secondary Menu
- Report Fraud
- Sign Up for Consumer Alerts
- Search the Legal Library
- Enforcement
- Policy
- Advice and Guidance
- News and Events
- About the FTC
Enter Search Term(s):
Looking for legal documents or records? Search the Legal Library instead.
Breadcrumb
- Home
- Business Guidance
- Protecting Small Businesses
- Cybersecurity
Vea esta página en español
Cybersecurity Basics Quiz
Physical Security Quiz
Ransomware Quiz
Phishing Quiz
Tech Support Scams Quiz
Vendor Security Quiz
Secure Remote Access Quiz
Additional Resources
Check out these additional resources like downloadable guides
to test your cybersecurity know-how.
Guide for Employers
Start a Discussion
Cybersecurity Quizzes
Test Your Knowledge
Get the Materials
Download Materials
Order Free Publications
Cybersecurity Video Series
See All Topics
More FTC Small Business
Go to FTC.gov/SmallBusiness
Sign up to Receive the FTC Business Blog
Sign Up
Return to top
How well do you know the basics of cyber security? Take this 10-question quiz and test your general cyber security knowledge! Everyone in the organization.
the CIO or CISO executive. A specialized cyber security defense team. The
board of directors. Question Title
* 1. Cyber security protection of an organization is the responsibility of:
Question Title
* 2. Failure to comply with government regulations or laws for cyber security can lead to:
Loss of confidence in the organization.
Civil liability.
Criminal prosecution.
All of the above.
Question Title
* 3. Cyber security should be viewed as a risk management problem because:
It is less expensive than using specialized cyber workers.
Absolute protection cannot be guaranteed.
Both answers above.
None of the above.
Question Title
* 4. Which of the following is not considered a factor in determining cyber risk?
The likelihood of a threat happening
The vulnerability of the organization to the threat
The cost to mitigate or recover from the threat
The duration of the threat event
Question Title
* 5. Social engineering uses which aspects of human nature?
Trust manipulation
Desire to be helpful
Lack of understanding
All of the above
Question Title
* 6. Redundant computer servers would be an example of which type of security measure?
Detective
Corrective
Preventative
Deterrent
Question Title
* 7. To avoid , user input should not be put directly into a database.
Cross-site scripting
Buffer overflow.
SQL injection.
System shutdown.
Question Title
* 8. With regards to BYOD (Bring Your Own Device) it is usually safest and cost effective to:
Disallow BYOD altogether.
Allow BYOD in accordance with a specified policy.
Allow BYOD only if a Mobile Device Management (MDM) tool is available.
Limit BYOD to quarantined or isolated networks.
Question Title
* 9. Behavior-based intrusion detection is an improvement compared to rule-based because:
It decreases the number of false positives, especially early in deployment.
It examines all out-of-the-normal cases, not just ones specified in a script.
It requires establishing baseline behavior.
All of the above.
Question Title
* 10. Which of the following is true for an Advanced Persistent Threat (APT)?
They are easily detected by anti-virus software.
They seek targets of opportunity as opposed to specific organizations.
They evade detection by re-encrypting or repackaging their code.
All of the above.