ABCD
1
2
QuestionChoiceScore
3
What do you do when you have an update pending on your company device?I do it the first chance I get.4
4
5
If your company were to suffer a ransomware attack, how quickly would you be able to recover data?In less than 24 hours.5
6
7
Among the passwords below, which is the most secure option?1a2b3c4d5e6f0
8
9
In what currency do cybercriminals demand data ransom after a ransomware attack?Real0
10
11
Ransomware is usually delivered to users via email with malicious attachments. Which extensions below are the most dangerous?.exe; .js; .zip5
12
13
Which Wi-Fi standard is considered the most secure?WPA0
14
15
What kind of malware allows the cybercriminal to control the computer remotely?Worm0
16
17
Which of the malware below hijacks your browser and directs you to third-party websites?Adware0
18
19
What security risks are minimized when you use a VPN in your company?Use of untrusted Wi-Fi, such as public Wi-Fi5
20
21
Does your company have a digital security strategy against phishing?Yes, we have procedures to prevent phishing in the business.5
22
23
Does your business have active and licensed security systems?Yes, we have antivirus and firewall.5
24
25
Are your employees trained and educated on the importance of preventing cyber attacks?No, and we do not plan to carry out this type of training.0
26
27
Do you or your employees work in public places such as airports or coffee shops?Yes0
28
29
Do you use a VPN network in your business?Yes5
30
31
Which businesses are most likely to suffer a ransomware attack?Large companies.0
32
33
Is your company backup protected by multi-factor authentication?Yes5
34
35
Score39
36
Result TypeLow Score
37