Information Security Online Quiz

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
By Maihua
M
Maihua
Community Contributor
Quizzes Created: 1 | Total Attempts: 7,982
| Attempts: 7,982 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. Because I work in a secure building, I can discuss confidential information in an open work area.

Explanation

Tip - if you need to discuss confidential information, consider doing so in a secure meeting room.

Submit
Please wait...
About This Quiz
Information Security Online Quiz - Quiz

How well do you understand information security? Try this information security test to check your knowledge. This informative quiz will help you test as well as learn new... see morefacts about information security. It is basically the state of being protected against the unauthorized use of information and the measures taken to achieve this. You can also challenge your peers on this quiz to see who scores better. All the best for a perfect score!
see less

2. Which of the following is a type of information security?

Explanation

All of the options listed (network security, cloud security, and application security) are types of information security. Network security focuses on protecting networks and their infrastructure from unauthorized access or attacks. Cloud security involves protecting data and applications that are stored in the cloud from breaches or data loss. Application security aims to secure software applications and prevent vulnerabilities that can be exploited by hackers. Therefore, all three options are valid types of information security measures.

Submit
3. The Information Security Policy and related policies only apply to electronic and hardcopy records and do not apply to verbal discussions

Explanation

The statement is false because Information Security Policy and related policies apply to both electronic and hardcopy records as well as verbal discussions. Verbal discussions can also involve sensitive information that needs to be protected, and therefore, should be subject to the same security measures and policies as other forms of records.

Submit
4. After finishing a meeting with a client at an external location, you make your way back to the office. You get on a tram that is half full of other commuters. Your mobile rings, and it is another one of your clients wants to discuss their case with you. What should you do?

Explanation

In this situation, the best course of action would be to inform the client that you will call them back once you return to the office. This is because discussing the case quietly with the client or answering their query while on the tram may compromise the confidentiality of the conversation. It is important to ensure that sensitive information is not overheard by others in a public setting. Therefore, it is best to wait until you are in a private and secure location before discussing the case further with the client.

Submit
5. You overhear a conversation where a co-worker reveals that he had looked up the name of a high school friend on a departmental database and proceeds to disclose some of his high school friend's personal information. What should you do?

Explanation

The Inappropriate Access to Personal Information Policy requires employees to report suspected instances where there may have been unauthorised access to personal information so that the Privacy Officer and other relevant staff can decide whether to notify an affected individual.

Submit
6. Which action below would breach the Clear Desk and Screen Policy?

Explanation

Leaving a departmental laptop on your desk when you are not using it or at the end of the day would breach the Clear Desk and Screen Policy. This policy requires employees to ensure that all sensitive information is securely stored and not left unattended. Leaving a laptop on the desk increases the risk of unauthorized access or theft of confidential data. Locking the computer when away from the desk and locking confidential information in a cabinet are both actions that align with the policy, as they help protect sensitive information from being accessed by unauthorized individuals.

Submit
7. A business unit's shared drive should allow all staff within that business unit to be able to access all records

Explanation

Consider whether access to particular records/folders should be restricted

Submit
8. Which of the following is not a threat to information security?

Explanation

While disasters, such as fires, floods, or earthquakes, can impact the availability and integrity of information, they are typically not considered intentional threats like eavesdropping, unchanged default passwords, or information leakage. Disasters are more often associated with business continuity and disaster recovery planning rather than direct information security threats.

Submit
9. Which information security technology is used to avoid browser-based hacking?

Explanation

Anti-malware tools in browsers are designed to detect and prevent malicious activities, including browser-based hacking attempts. These tools help protect users from various online threats such as malware, phishing, and other types of attacks that may target web browsers.

Submit
10. Compromising confidential information comes under _________

Explanation

Compromising confidential information is considered an attack. In the context of information security, an attack refers to any unauthorized action that seeks to exploit vulnerabilities in a system, network, or application. In this case, compromising confidential information involves an intentional and unauthorized attempt to access, disclose, or misuse sensitive data, which is considered an attack on the information's confidentiality. Security measures are implemented to prevent, detect, and respond to such attacks to safeguard the integrity, availability, and confidentiality of information.

Submit
View My Results
Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline (Updated): Nov 23, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 23, 2023
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Nov 12, 2008
    Quiz Created by
    Maihua
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Because I work in a secure building, I can discuss confidential...
Which of the following is a type of information security?
The Information Security Policy and related policies only apply to...
After finishing a meeting with a client at an external location, you...
You overhear a conversation where a co-worker reveals that he had...
Which action below would breach the Clear Desk and Screen Policy?
A business unit's shared drive should allow all staff within that...
Which of the following is not a threat to information security?
Which information security technology is used to avoid browser-based...
Compromising confidential information comes under _________
Alert!

Advertisement