IT Security Awareness Program Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Infosecure
I
Infosecure
Community Contributor
Quizzes Created: 1 | Total Attempts: 619
| Attempts: 619 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. What does it mean if your computer slows down, displays repeated error messages, serves up a lot of pop-up ads and appears to send email messages you didn’t write?

Explanation

If your computer slows down, displays repeated error messages, serves up a lot of pop-up ads, and appears to send email messages you didn't write, it suggests that you have spyware. Spyware is a type of malicious software that secretly gathers information about a user's activities without their knowledge and can cause various issues on the infected computer, such as decreased performance, error messages, intrusive ads, and unauthorized email sending.

Submit
Please wait...
About This Quiz
IT SecurITy Awareness Program Quiz - Quiz

This quiz represents one of the many activities for the IT Security Awareness Program launch at Cave Hill Campus

2. You’re in the library studying alone with your laptop when you have to go and look for a book. What’s your best course of action?

Explanation

The best course of action is to secure the laptop with a security cable to the table. This ensures that the laptop is not easily accessible to potential thieves while you are away.

Submit
3. Which of the following actions should you always take after you’ve finished using your online account?

Explanation

After finishing using your online account, it is important to click on the log out or log off button on the website. This action ensures that you are securely ending your session and preventing unauthorized access to your account. It is not recommended to minimize the browser window or set your browser to remember your username and password, as this can leave your account vulnerable to misuse. Shutting down and rebooting your computer is not necessary after using your online account.

Submit
4. A pop-up ad appears on your computer screen offering an anti-spyware product. What’s your best course of action?

Explanation

It is best to close the window because pop-up ads offering anti-spyware products are often scams or malicious. Clicking on the link and providing credit card information can lead to identity theft or the installation of actual spyware. It is safer to obtain spyware protection software from a trusted provider that you are familiar with and can verify its legitimacy.

Submit
5. You suspect that your Campus password has been compromised. What should you do?

Explanation

If you suspect that your Campus password has been compromised, the best course of action is to change your password using SSRPM (Self-Service Reset Password Management). This tool allows you to reset your password without the need for assistance from IT support. By changing your password, you can prevent unauthorized access to your account and protect your personal information. Contacting the police station or getting rid of your computer are not necessary steps in this situation, and calling your parents would not directly address the password compromise.

Submit
6. What is “phishing”?

Explanation

Phishing refers to the act of sending spoofed emails and creating fraudulent websites with the intention of tricking individuals into revealing their personal financial information, such as credit card numbers, account usernames, and passwords. This is done by making the emails and websites appear legitimate and trustworthy, leading the recipients to unknowingly disclose their sensitive data. Phishing is a form of cybercrime aimed at identity theft and financial fraud.

Submit
7. You just changed your Cave Hill password. Do you:

Explanation

Committing the password to memory is the best option because it ensures the password remains secure and cannot be easily accessed by others. Writing the password on a sticky note and attaching it to the monitor or hiding it under the keyboard would make it easily visible and accessible to anyone who comes across it. Saving the password on a removable hard drive or USB drive also poses a security risk as it can be lost or stolen. Therefore, memorizing the password is the most secure and recommended option.

Submit
8. You work for an organization with an excellent information technology department. The HelpDesk sends you an email warning of a security breach and asks you to confirm your password be entering it into a secure website. What do you do?

Explanation

The correct answer is to not share your password or any other personal information and to report the incident to the HelpDesk. This is because sharing your password or personal information can put your account and sensitive data at risk. It is important to be cautious of phishing attempts, where attackers impersonate legitimate organizations to trick individuals into revealing their credentials. Instead of entering your password on the website, it is advisable to report the incident to the HelpDesk, who can verify the authenticity of the email and take appropriate actions to address the security breach.

Submit
9. What type of free downloaded software may include spyware?

Explanation

Free downloaded software such as electronic games, screensavers, and toolbars can include spyware. Spyware is often bundled with these types of software and installed without the user's knowledge or consent. Even anti-spyware software can sometimes include spyware, although it is less common. Therefore, all of the options mentioned in the question can potentially include spyware.

Submit
10. Which of the following is not a UWI Cave Hill ICT Policy?

Explanation

The correct answer is "Mobile Phone Policy" because the question asks for a policy that is not related to UWI Cave Hill's ICT policies. The other options, ICT Security Policy, Email and Messaging Services Policy, and Acceptable Use Policy, all pertain to ICT and technology usage within the institution. However, a Mobile Phone Policy may not specifically fall under the category of ICT policy, as it could be considered more of a general policy that applies to all aspects of the institution's operations.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 25, 2011
    Quiz Created by
    Infosecure
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What does it mean if your computer slows down, ...
You’re in the library studying alone with your ...
Which of the following actions should you always ...
A pop-up ad appears on your computer screen ...
You suspect that your Campus password has been ...
What is “phishing”?
You just changed your Cave Hill password. Do you:
You work for an organization with an excellent ...
What type of free downloaded software may include spyware?
Which of the following is not a UWI Cave Hill ICT Policy?
Alert!

Advertisement