Skip to main content
Kari’s Law Update- Are you Compliant?
Navigation
Intelesys
IT for Public Sector
Contact Us
Home
Phone
Systems
Column 1
Mitel
Phones
Unified Messaging
Mobile / Collaboration
Training Videos / Guides
Premise/Cloud/Private Cloud
Peripherals
How to purchase?
Column 2
Hosted / Cloud
Leading Cloud Providers
What's the right solution?
Dialtone
Financing
Tips for a Successful Implementation
Column 3
Advanced Apps
Call Center / IVR
Call Analytics
Call Recording
CRM Integration
Emergency Notification System (ENS)
Mobile / Collaboration
Product Highlight
IT
Solutions
Column 1
Technical Services
Full or partial Outsourcing
Project Services & Management
Assessment Services
Network Performance
Security & Exposure
VoIP Readiness
Wireless Heatmap & Interference Study
Column 2
Products
Servers & Storage
Backup & Disaster Recovery
Data Theft & Ransomware Protection
Switches & Routers
Wireless Networking
Network Design
Cabling & Infrastructure
VoIP (Voice Over IP)
Carrier Services
Column 3
Staff Education
Email
Web browsing
Vendors
Government
Column 1
Technology Managed
Software
Hardware
Asset Management
Strategy Development
Purchase Options and Vehicles
Column 2
Outsourced Service Options
Fully Outsourcing IT
Project Basis / Partial Outsourcing
Virtual IT Director
Column 3
Security
Data Protection
Redundancy and Continuity
Cyber EOC
Government Resources and Support
Education
Column 1
Teacher / Parent Communication
Controlling the Classroom
Controlling the cell phone number
Mass Communication
Attendance Made Easy
Column 2
Campus Safety
Incident Alerting
Panic Buttons
Column 3
Purchase Vehicles and Options
Request for Proposal / Quote
Piggyback and K-12 Leases
Make Investments not Expenses
K-20 Resources and Support
About
Us
Column 1
Corporate History
Referral Program
Case Studies
Product Highlight
Column 2
Events
Intelesys GovEd Conferences
MISAC
CITE (Formerly CETPA)
Community Events
Column 3
Client Resources
Client Portal Login
Remote Technical Support
Report a Problem
Service Order Survey
Technology Training
Cyber Security Test
Instructional Guides/Videos
Additional Resources
Network Login Form
Search form
Search Website
Cyber Security Test
Please complete the information and answer all questions, you will not be penalized for incorrect answers. Good Luck!
You must have JavaScript enabled to use this form.
Network login name
*
Password (Case sensitive)
*
Email
*
1. Clicking links in your email are safe if you know the user that sent them
*
True
False
2. Flash drives received at trade shows are a great way to copy and save files
*
True
False
3. Even if a sender's email address looks correct, the email may not be legitimate?
*
True
False
4. Microsoft files such as word documents and spreadsheets are usually harmless to open since they are developed by Microsoft
*
True
False
5. Phishing emails are obvious and less than 10% of people even open them
*
True
False
6. Phishing emails will often
*
Smell like old bait
Contain grammar errors and spelling mistakes
Have colorful graphics
7. Public Wi-Fi is safe as long as you use a password
*
True
False
8. Reputable websites can sometimes have malicious content on them that will infect your computer
*
True
False
9. Social engineering is best described as
*
Using a dating site to attract users
Using normal interactions that seem harmless to gain information
Malware developed by internet hobbyists
10. Two factor authentications helps make your computing experience more secure
*
True
False
11. What is a great way to avoid Malware?
*
Open spam message only at night
Do not open files you are not expecting
Empty your recycle bin weekly
Clean your computer monitor daily
12. Which is not true about phishing?
*
It is designed to set a trap
It is done through email
It always originates overseas
It relies on users to engage with the content
13. Which of the following is not a good source for smart phone applications?
*
Google Play
Apple Store
Jim's discount apps
14. Which of the following is not a network threat?
*
Malware
Social Engineering
Computer games
Phishing
15. Which of the following is not a way malware can get on your pc?
*
Clicking malicious links in email
Hooking up a bad printer
Plugging in an unknown flash drive
Downloading malware masquerading as other software
16. Why would you want to lie on security questions?
*
If you make a mistake it is harder to find you
It is none of the company’s business who you are
Truthful answers can often be found on social media putting an account at risk
I feel this class will make me more aware of cyber threats in my position
*
Yes
No
I would recommend this class to a peer / colleague
*
Yes
No
Comments
Client Resources
Client Portal Login
Remote Technical Support
Report a Problem
Service Order Survey
Technology Training
Instructional Videos
Additional Resources
Mitel Product Guides
Miscellaneous Resources
Cyber Security Test
Network login request
Project Survey
Project Survey