Question 1
Which of the following is an example of a secure way to respond to an email requesting personal information from an unknown sender?
Question 2
What is a recommended step to take if you receive a notification that your email account may have been compromised?
Question 3
Which of the following is a secure method to verify the legitimacy of a phone call from someone claiming to be from a financial institution?
Question 4
Which of the following is an important step to take after receiving a notification that your personal information was found on the dark web?
Question 5
Which of the following is a secure practice for protecting your personal information when using a public computer or shared device?