October is recognized globally as Cybersecurity Awareness Month. Initiated by the Department of Homeland Security, Cybersecurity Awareness Month is commemorating its 16th year as an annual campaign. Supporters of this great initiative engage in activities to raise awareness around the importance of cybersecurity by educating businesses and consumers on industry trends, cybersecurity threats, and best practices.

Are You #CyberAware?

Review Herjavec Group’s Cybersecurity Awareness Quiz and Correct Answers Below

Which of these groups exploits cyber vulnerabilities?

(A) Criminals

(B) Governments

(C) Hacktivists

(D) All of the above


What is the biggest threat to an organization’s cybersecurity and corporate network?

(A) Insider threat

(B) Nation-state hackers

(C) Ransomware

(D) Phishing emails


Which of the following should be the first step in developing a cybersecurity plan?

(A) Perform a technical vulnerabilities assessment

(B) Analyze the current business strategy

(C) Establish your crown jewels

(D) Implement a cybersecurity awareness training program for employees


What is the role of senior management to establish a strong cybersecurity awareness program?

(A) Conduct regular social engineering tests internally and share results

(B) Lead from the top down

(C) Have open lines of communication between the IT team and C-level executives

(D) All of the above


What are the three most common controls used to protect the availability of information?

(A) Redundancy, backups and access controls.

(B) Encryption, file permissions and access controls.

(C) Access controls, logging and digital signatures.

(D) Hashes, logging and backups.


The term “cybersecurity” can be best defined as:

(A) The process by which an organization manages cybersecurity risk to an acceptable level

(B) The protection of information from unauthorized access or disclosure

(C) The protection of paper documents, digital and intellectual property, and verbal or visual communications

(D) Protecting information assets by addressing threats to information that is processed, stored or transported by interworked information systems


Which of the following are strong passwords according to the University Information Security Policy? (select all that apply) *

(A) Herjavec

(B) $jelF2bb

(C) %4Btv 

(D)  Sammy9

(E)  rumples


While Jack was away on vacation, one of his customers had a crisis. As Jack was unable to attend to the matter, he gave John access to his computer to solve the issue. One year later, John was fired so he used the access to upload confidential information to a private server. Who is responsible for this breach?

(A) Jack

(B) John

(C) Both

(D) Neither


You came across a website that looks exactly like Paypal but it has a different domain which you have never heard of. What is the best course of action?

(A) Hack the website and post it on social media.

(B) If you can’t hack the website yourself, launch DDoS (Distributed Denial of Service) attacks into that website with the help of your friends and then post it on Facebook or Twitter.

(C) Do not login and report it as a phishing page to Google Safe Browsing Team.

(D) Just ignore that website and login to https://facebook.com


The first step in Security Awareness is being able to ________ a security threat.

(A) Avoid

(B) Recognize

(C) Challenge

(D) Log


Define ‘backdoor’.

(A) It blocks access when being hacked

(B) It’s the most secure part of a computer

(C) It’s a way of bypassing security on a system

(D) It’s another way of logging into your computer


In 2016, the Mirai botnet used hundreds of IoT devices to attack Dyn, a domain registration services provider. What kind of an attack was used by the botnet?

(A) Brute force penetration

(B) Denial of Service (DOS)

(C) Distributed Denial of Service (DDoS)

(D) None of the above


According to Gartner, which of the following will represent the largest area of privacy risk for organizations by 2020?

(A) Backup and archiving of personal data

(B) Failing to be compliant with GDPR

(C) Adoption of public blockchain

(D) All of the above


What does DoS stand for?

(A) Direct opening slate

(B) Denial of service

(C) Direct operating system

(D) Drop offshore secure


Which of the following is an example of biometric security?

(A) Fingerprint

(B) Facial ID

(C) Passphrase

(D) A and C

(E) A and B