Through a number of questions people are challenged on their information technology related security knowledge