Take Online Test

The ISC Project offers many structured training classes, both on-site and online.  To help identify which training classes would be best for you, we encourage you to take the short, multiple-choice test below.  Once you submit your answers, specific class recommendations will be presented.  Please note that, as information security threats change over time, your specific recommendations may not be comprehensive and should not be used as the only measurement of your information security needs.  Good luck!

1.What is backup?

Backup is the process of reformatting your hard drive after the computer gets infected with viruses

Backup is the activity of copying and storing data so that it is preserved in case of equipment failure or another disastrous event

I don’t know

2. Which location is best to store data backups?

Local drives such as external hard drives, USB flash drives, or servers

Cloud storage such as Google drive or SpiderOak

Both local and cloud storage

Neither, we should backup on the same hard drive that contains the original files

I don’t know

3. Should backup data be encrypted before storing it on the cloud (Dropbox, iShare, etc.)?

Yes, because encrypted data is protected from unauthorized access in transit and while it is stored

No, because the stored data is encrypted by default using the user’s private key

I don’t know

4. What is the purpose of a firewall?

It controls network traffic and determines, whether data should be allowed through, or not.

It’s a fireproof shield used by welders.

It’s a natural disaster.

It’s a piece of software that logs users’ keystrokes and sends to a remote location.

I don’t know.

5. Is it a good idea to download and install patches and updates for Windows?

Yes, they encrypt the hard drive and make you anonymous on the internet

Yes, they fix security vulnerabilities as well as buggy software and drivers

No, they make the computer slow and only add eyecandy

No, they install new malware and keyloggers

6. Which of the following techniques can help secure the information contained on a laptop?

Defragment your hard drive regularly

Do not save your files in the “My Documents” folder

Use hard drive encryption

Use protective scratch-resistant film on the screen

I don’t know

7. How do you secure a wireless (WiFi) network?

Place the WiFi router in a closet.

Change the default admin password

Configure WPA and turn off SSID Broadcasting

All the above

I don’t know

8. What is VPN?

Is a service that offers secure and encrypted connectivity over the Internet.

A new vehicle offered by BMW

The virtual police network used by the authorities

I don’t know

9. What are the advantages of a Trusted Network?

It is more secure and confidential because of strong firewalls

It is usually administered by an Administrator to ensure that private and secured data is not leaked

Access to it is limited

All of the above

10. What is the name of a common spyware tool that allows a third party to collect passwords on shared public computers?

Key Logger



I don’t know

11. What threat do you face when using your flash drive on somebody else’s computer?

Compressed Information


Flash Override

I don’t know

12. What common browser feature should you be aware of when entering your password on a shared computer?

Address bar

Saved passwords


I don’t know

13. If you use an old market phone (not a modern smart phone), can you be tracked?




14. When you send an SMS, who will be able to see it?

Just me and the recipient

Just the recipient

Myself, the recipient, the phone company, and anyone the phone company gives access to

I don’t Know

15.If a third party has access to your smart phone, and you had not encrypted data or assigned a password, what information would be available to that third party?



Call Log

All of the above

I don’t know

16. What is a SSL enabled (HTTPS) website?

A website that no one can access.

A website that uses SSL certificates to secure (encrypt) all communication between the website and the internet.

The secure system layer (SSL) used to authenticate transport sessions in the OSI model

I don’t know.

17. How do you avoid phishing websites?

By typing a trusted web address into the address bar of the Internet browser instead of clicking on links in an email or an instant message

By copying and pasting the web address directly into the Internet browser

I don’t know

18. Why is it important to enable the “private browsing” or “incognito” option when using an Internet browser on a public or shared computer?

Because a private session doesn’t ask for usernames.

It’s important because it doesn’t track the time you spend on Internet.

The web browser will erase all browsing information of the current internet session from the computer: including download lists, caches, browser history, forms, passwords and other temporary files.

I don’t know.

19. Of these WiFi authentication mechanisms, which is the most flexible in terms of user management?




I don't know

20. Which technology preserves the availability of data if half of the drives fail?



I don't know

21. Which of the following is an example of two-factor authentication?

Password and PIN

Username and password

Password and fingerprint

Fingerprint and retina scan

I don't know