Now that you have finished reviewing all course material, it’s time to take the final exam for this course. In compliance with NASBA rules and regulations, you must score a 70% or higher on this final exam to earn CPE credits for this course. There is an unlimited amount of time available to take the final exam, and you have the option of taking the final exam as many times as needed to pass. Good luck!
Important – You cannot save your answers so please complete the exam before logging off the site. You will get unlimited attempts to pass this exam but the site will display the exam questions without any previous answers each time your re-attempt this exam. The CPE365 staff recommends downloading and printing the final exam PDF from the Course Materials lesson (the first lesson in every Self-Study course) and circling the correct answer as you run across them in the course reading material. This will make entering your answers into this final exam fast and less frustrating.
0 of 5 questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Unfortunately, your score did not meet the 70% minimum score needed to pass this course. Per the NASBA/AICPA standards for self-study, all participants are required to score a minimum of 70% to be awarded CPE credits. You get unlimited attempts to earn the required score.
Congratulations – You Passed the Course Exam. Click the “Continue” button to view your certificate of completion.
Which identify theft technique allow a criminal to obtain your name, address, account numbers and bank name from your trash?
Which identify theft technique allows a criminal to obtain your credit card information by simply making a withdrawal from an ATM machine?
What is the most important line of defense to protect computers from hackers and cybercriminals?
What type of information security mechanism add an extra security layer that requires entering a security code sent via text to a mobile phone?
What is the most important defense to protect computer data and network data from ransomware?