IT Security Awareness Program Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Infosecure
I
Infosecure
Community Contributor
Quizzes Created: 1 | Total Attempts: 610
Questions: 10 | Attempts: 610

SettingsSettingsSettings
IT SecurITy Awareness Program Quiz - Quiz

This quiz represents one of the many activities for the IT Security Awareness Program launch at Cave Hill Campus


Questions and Answers
  • 1. 

    What type of free downloaded software may include spyware?

    • A.

      Electronic Games

    • B.

      Screensavers and toolbars

    • C.

      Anti-spyware software

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Free downloaded software such as electronic games, screensavers, and toolbars can include spyware. Spyware is often bundled with these types of software and installed without the user's knowledge or consent. Even anti-spyware software can sometimes include spyware, although it is less common. Therefore, all of the options mentioned in the question can potentially include spyware.

    Rate this question:

  • 2. 

    What does it mean if your computer slows down, displays repeated error messages, serves up a lot of pop-up ads and appears to send email messages you didn’t write?

    • A.

      You’ve got spyware

    • B.

      The rubber band powering your machine broke

    • C.

      Someone has been typing on your keyboard when you’re not looking

    Correct Answer
    A. You’ve got spyware
    Explanation
    If your computer slows down, displays repeated error messages, serves up a lot of pop-up ads, and appears to send email messages you didn't write, it suggests that you have spyware. Spyware is a type of malicious software that secretly gathers information about a user's activities without their knowledge and can cause various issues on the infected computer, such as decreased performance, error messages, intrusive ads, and unauthorized email sending.

    Rate this question:

  • 3. 

    A pop-up ad appears on your computer screen offering an anti-spyware product. What’s your best course of action?

    • A.

      Click on the link in the ad, provide your credit card information and buy the product

    • B.

      Click on the link in the ad to learn more about the company and its products before you decide

    • C.

      Close the window. If you want spyware protection software, you can get it from a provider you know and trust

    Correct Answer
    C. Close the window. If you want spyware protection software, you can get it from a provider you know and trust
    Explanation
    It is best to close the window because pop-up ads offering anti-spyware products are often scams or malicious. Clicking on the link and providing credit card information can lead to identity theft or the installation of actual spyware. It is safer to obtain spyware protection software from a trusted provider that you are familiar with and can verify its legitimacy.

    Rate this question:

  • 4. 

    What is “phishing”?

    • A.

      Spoofed emails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords

    • B.

      A type of computer virus

    • C.

      An example of a strong password

    • D.

      None of the above

    Correct Answer
    A. Spoofed emails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords
    Explanation
    Phishing refers to the act of sending spoofed emails and creating fraudulent websites with the intention of tricking individuals into revealing their personal financial information, such as credit card numbers, account usernames, and passwords. This is done by making the emails and websites appear legitimate and trustworthy, leading the recipients to unknowingly disclose their sensitive data. Phishing is a form of cybercrime aimed at identity theft and financial fraud.

    Rate this question:

  • 5. 

    You suspect that your Campus password has been compromised. What should you do?

    • A.

      Contact the nearest police station

    • B.

      Change our password using SSRPM

    • C.

      Get rid of your computer

    • D.

      Call your parents

    Correct Answer
    B. Change our password using SSRPM
    Explanation
    If you suspect that your Campus password has been compromised, the best course of action is to change your password using SSRPM (Self-Service Reset Password Management). This tool allows you to reset your password without the need for assistance from IT support. By changing your password, you can prevent unauthorized access to your account and protect your personal information. Contacting the police station or getting rid of your computer are not necessary steps in this situation, and calling your parents would not directly address the password compromise.

    Rate this question:

  • 6. 

    Which of the following is not a UWI Cave Hill ICT Policy?

    • A.

      Mobile Phone Policy

    • B.

      ICT Security Policy

    • C.

      Email and Messaging Services Policy

    • D.

      Acceptable Use Policy

    Correct Answer
    A. Mobile Phone Policy
    Explanation
    The correct answer is "Mobile Phone Policy" because the question asks for a policy that is not related to UWI Cave Hill's ICT policies. The other options, ICT Security Policy, Email and Messaging Services Policy, and Acceptable Use Policy, all pertain to ICT and technology usage within the institution. However, a Mobile Phone Policy may not specifically fall under the category of ICT policy, as it could be considered more of a general policy that applies to all aspects of the institution's operations.

    Rate this question:

  • 7. 

    You just changed your Cave Hill password. Do you:

    • A.

      Write the password on a sticky note and attach it to the monitor

    • B.

      Commit the password to memory

    • C.

      Save the password on a removable hard drive or USB drive

    • D.

      Write the password on a sticky note and hide it under the keyboard

    Correct Answer
    B. Commit the password to memory
    Explanation
    Committing the password to memory is the best option because it ensures the password remains secure and cannot be easily accessed by others. Writing the password on a sticky note and attaching it to the monitor or hiding it under the keyboard would make it easily visible and accessible to anyone who comes across it. Saving the password on a removable hard drive or USB drive also poses a security risk as it can be lost or stolen. Therefore, memorizing the password is the most secure and recommended option.

    Rate this question:

  • 8. 

    You’re in the library studying alone with your laptop when you have to go and look for a book. What’s your best course of action?

    • A.

      Hide the laptop under the chair

    • B.

      Secure the laptop with a security cable to the table

    • C.

      Ask a stranger to look after the suitcase for you

    • D.

      Leave it alone because you know that no-one will steal it

    Correct Answer
    B. Secure the laptop with a security cable to the table
    Explanation
    The best course of action is to secure the laptop with a security cable to the table. This ensures that the laptop is not easily accessible to potential thieves while you are away.

    Rate this question:

  • 9. 

    Which of the following actions should you always take after you’ve finished using your online account?

    • A.

      Minimise the window of your Web browser program

    • B.

      Shut down your computer, wait 30 seconds and then reboot

    • C.

      Click on the log out or log off button on the website

    • D.

      Set your browser to remember your username and password the next time you visit the site

    Correct Answer
    C. Click on the log out or log off button on the website
    Explanation
    After finishing using your online account, it is important to click on the log out or log off button on the website. This action ensures that you are securely ending your session and preventing unauthorized access to your account. It is not recommended to minimize the browser window or set your browser to remember your username and password, as this can leave your account vulnerable to misuse. Shutting down and rebooting your computer is not necessary after using your online account.

    Rate this question:

  • 10. 

    You work for an organization with an excellent information technology department. The HelpDesk sends you an email warning of a security breach and asks you to confirm your password be entering it into a secure website. What do you do?

    • A.

      Don’t share your password or any other personal information. Report the incident to the HelpDesk.

    • B.

      Don’t enter your password on the website. Instead send your reply by email to the sender.

    • C.

      Immediately enter your password on the website. You can always trust emails from your own organization.

    Correct Answer
    A. Don’t share your password or any other personal information. Report the incident to the HelpDesk.
    Explanation
    The correct answer is to not share your password or any other personal information and to report the incident to the HelpDesk. This is because sharing your password or personal information can put your account and sensitive data at risk. It is important to be cautious of phishing attempts, where attackers impersonate legitimate organizations to trick individuals into revealing their credentials. Instead of entering your password on the website, it is advisable to report the incident to the HelpDesk, who can verify the authenticity of the email and take appropriate actions to address the security breach.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 25, 2011
    Quiz Created by
    Infosecure
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.