IT Security Awareness Program Quiz

10 Questions | Total Attempts: 444

SettingsSettingsSettings
IT SecurITy Awareness Program Quiz - Quiz

This quiz represents one of the many activities for the IT Security Awareness Program launch at Cave Hill Campus


Questions and Answers
  • 1. 
    What type of free downloaded software may include spyware?
    • A. 

      Electronic Games

    • B. 

      Screensavers and toolbars

    • C. 

      Anti-spyware software

    • D. 

      All of the above

  • 2. 
    What does it mean if your computer slows down, displays repeated error messages, serves up a lot of pop-up ads and appears to send email messages you didn’t write?
    • A. 

      You’ve got spyware

    • B. 

      The rubber band powering your machine broke

    • C. 

      Someone has been typing on your keyboard when you’re not looking

  • 3. 
    A pop-up ad appears on your computer screen offering an anti-spyware product. What’s your best course of action?
    • A. 

      Click on the link in the ad, provide your credit card information and buy the product

    • B. 

      Click on the link in the ad to learn more about the company and its products before you decide

    • C. 

      Close the window. If you want spyware protection software, you can get it from a provider you know and trust

  • 4. 
    What is “phishing”?
    • A. 

      Spoofed emails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords

    • B. 

      A type of computer virus

    • C. 

      An example of a strong password

    • D. 

      None of the above

  • 5. 
    You suspect that your Campus password has been compromised. What should you do?
    • A. 

      Contact the nearest police station

    • B. 

      Change our password using SSRPM

    • C. 

      Get rid of your computer

    • D. 

      Call your parents

  • 6. 
    Which of the following is not a UWI Cave Hill ICT Policy?
    • A. 

      Mobile Phone Policy

    • B. 

      ICT Security Policy

    • C. 

      Email and Messaging Services Policy

    • D. 

      Acceptable Use Policy

  • 7. 
    You just changed your Cave Hill password. Do you:
    • A. 

      Write the password on a sticky note and attach it to the monitor

    • B. 

      Commit the password to memory

    • C. 

      Save the password on a removable hard drive or USB drive

    • D. 

      Write the password on a sticky note and hide it under the keyboard

  • 8. 
    You’re in the library studying alone with your laptop when you have to go and look for a book. What’s your best course of action?
    • A. 

      Hide the laptop under the chair

    • B. 

      Secure the laptop with a security cable to the table

    • C. 

      Ask a stranger to look after the suitcase for you

    • D. 

      Leave it alone because you know that no-one will steal it

  • 9. 
    Which of the following actions should you always take after you’ve finished using your online account?
    • A. 

      Minimise the window of your Web browser program

    • B. 

      Shut down your computer, wait 30 seconds and then reboot

    • C. 

      Click on the log out or log off button on the website

    • D. 

      Set your browser to remember your username and password the next time you visit the site

  • 10. 
    You work for an organization with an excellent information technology department. The HelpDesk sends you an email warning of a security breach and asks you to confirm your password be entering it into a secure website. What do you do?
    • A. 

      Don’t share your password or any other personal information. Report the incident to the HelpDesk.

    • B. 

      Don’t enter your password on the website. Instead send your reply by email to the sender.

    • C. 

      Immediately enter your password on the website. You can always trust emails from your own organization.

Back to Top Back to top