It Security Quiz

36 Questions

Settings
Please wait...
It Security Quiz

You might be content in your general knowledge on the topic of IT security – don’t click on links sent to you from total strangers and don’t visit untrustworthy websites for downloads, and make sure you keep your security software up-to-date to avoid disaster – but how far does your knowledge on the topic actually go? Take this quiz and we’ll see how much you really know about keeping your computer safe.


Questions and Answers
  • 1. 
    Which one of the following describes spam?
    • A. 

      Gathering information about a person or organisation without their knowledge.

    • B. 

      Performing an unauthorised, usually malicious, action such as erasing files.

    • C. 

      Putting unnecessary load on the network by making copies of files.

    • D. 

      Sending unwanted bulk messages.

  • 2. 
    • A. 

      Anti-spam software.

    • B. 

      Anti-virus software.

    • C. 

      Anti-spyware software.

    • D. 

      PC diagnostic software.

  • 3. 
    • A. 

      Using only software that has been checked for viruses.

    • B. 

      Maintaining regularly updated anti-virus software.

    • C. 

      Opening only virus-checked file attachments from known sources.

    • D. 

      Using a USB Flash Drive from an unknown source to exchange data.

  • 4. 
    • A. 

      To protect your computer from all known viruses.

    • B. 

      To ensure the software identifies old viruses.

    • C. 

      To protect your computer from unwanted bulk messages.

    • D. 

      To prevent the spread of malicious programs on the Internet.

  • 5. 
    Which one of the following describes what you should do if you receivea chain letter email?
    • A. 

      Forward the email.

    • B. 

      Download it onto your system.

    • C. 

      Delete the email.

    • D. 

      Send a read receipt.

  • 6. 
    • A. 

      A skilled programmer who uses authorised access to exploit information available on a computer.

    • B. 

      A skilled programmer who secretly invades computers without authorisation.

    • C. 

      A skilled programmer who writes programs to train new employees.

    • D. 

      A skilled programmer who helps in the installation of new software for an organisation.

  • 7. 
    Which one of the following describes why firewalls are used?
    • A. 

      To prevent unauthorised access by incoming transmissions.

    • B. 

      To prevent destruction of a computer in the event of a fire.

    • C. 

      To enable easy downloading of data from web sites.

    • D. 

      To detect and disable viruses already on a computer.

  • 8. 
    • A. 

      An email from a friend you have not seen recently.

    • B. 

      An email with an attachment sent by a colleague using their personal email address.

    • C. 

      An email asking you to go to a website for a free computer scan.

    • D. 

      An email advertisement from a local shop you subscribe to.

  • 9. 
    • A. 

      To be aware of who is in the building.

    • B. 

      To check up on the time-keeping of users.

    • C. 

      To protect computers against unauthorised use.

    • D. 

      To enable a personalised greeting for each user.

  • 10. 
    Which one of the following statements about a password is TRUE?
    • A. 

      It must be changed only if it is compromised.

    • B. 

      It cannot contain special character symbols.

    • C. 

      It must be registered with the system administrator.

    • D. 

      It should be changed regularly.

  • 11. 
    Which one of the following should be used to change your password?
    • A. 

      Control Panel.

    • B. 

      Anti-virus software.

    • C. 

      Windows Firewall.

    • D. 

      Internet Explorer.

  • 12. 
    Which one of the following shows respect for confidentiality ofinformation?
    • A. 

      Discussing confidential information over the telephone.

    • B. 

      Disclosing confidential information only to authorised individuals.

    • C. 

      Uploading confidential information to a shared web site.

    • D. 

      Emailing confidential information to a colleague.

  • 13. 
    Which one of the following would be considered the BEST way to storea PIN number?
    • A. 

      Keep a written note of it with you bank cards.

    • B. 

      Store it on your computer.

    • C. 

      Memorise it.

    • D. 

      Keep a written note of it in your office drawer.

  • 14. 
    Which one of the following describes why users should lock theircomputer when leaving their desk?
    • A. 

      To prevent unauthorised access to data.

    • B. 

      To prevent a waste of electricity.

    • C. 

      To prevent data from getting corrupted.

    • D. 

      To prevent the computer from malfunctioning.

  • 15. 
    • A. 

      An email warning the recipient of a computer virus threat.

    • B. 

      An email directing the recipient to forward the email to friends.

    • C. 

      An email directing the recipient to enter personal details on a fake website.

    • D. 

      An email directing the recipient to download an attachment.

  • 16. 
    • A. 

      Using a screen name or nick name that cannot identify you.

    • B. 

      Meeting someone you met online face-to-face in the company of your parents.

    • C. 

      Keeping your social network profile private.

    • D. 

      Giving your home address to someone you met in a chat room.

  • 17. 
    • A. 

      A network where devices outside the network cannot see or communicate directly with computers on the network.

    • B. 

      A network where devices outside the network can see but cannot communicate directly with computers on the network.

    • C. 

      A network where devices outside the network can see and communicate directly with computers on the network.

    • D. 

      A network where devices outside the network cannot see but can communicate directly with computers on the network.

  • 18. 
    Which one of the following describes how confidential informationshould be sent using an unsecured network?
    • A. 

      In an unsigned email.

    • B. 

      In an encrypted format.

    • C. 

      In a compressed format.

    • D. 

      In an attachment.

  • 19. 
    • A. 

      They cannot be intercepted by unknown users.

    • B. 

      They limit accessibility to other users.

    • C. 

      They limit visibility to other users.

    • D. 

      They can be accessible to other users.

  • 20. 
    • A. 

      Disconnect the computer from the network.

    • B. 

      Complain to the System Administrator.

    • C. 

      Change the default WEP or WPA access key to one that only you know.

    • D. 

      Adjust the Internet security settings.

  • 21. 
    Which one of the following describes Bluetooth?
    • A. 

      Short-range wired protocol for exchanging data.

    • B. 

      Short-range wireless protocol for exchanging data.

    • C. 

      Long-range wireless protocol for exchanging data.

    • D. 

      Long-range wired protocol for exchanging data.

  • 22. 
    • A. 

      To increase the range of the device.

    • B. 

      To improve the quality of reception.

    • C. 

      To prevent the risk of unauthorised access.

    • D. 

      To reduce interference from other devices.

  • 23. 
    Which one of the following would result in the loss of contact details if itwere stolen?
    • A. 

      Printer.

    • B. 

      Mobile Phone.

    • C. 

      Modem.

    • D. 

      MP3.

  • 24. 
    Which one of the following should you do to ensure that your USBstorage device is kept safe and secure?
    • A. 

      Only use it in private surroundings.

    • B. 

      Do not access it using a Bluetooth device.

    • C. 

      Use firewall software.

    • D. 

      Never leave it unattended.

  • 25. 
    Which one of the following departments would usually hold guidelinesand procedures for the secure use of IT within an organisation?
    • A. 

      The IT Department.

    • B. 

      The Marketing Department.

    • C. 

      The Sales Department.

    • D. 

      The Finance Department.

  • 26. 
    • A. 

      To ensure easy access to information on your computer.

    • B. 

      To ensure the secure use of IT resources.

    • C. 

      To ensure the IT Department is able to monitor all activity.

    • D. 

      To ensure the Finance Department is able to monitor the costs of IT resources.

  • 27. 
    Which one of the following should you approach if you are unsure ofthe IT security procedure to follow when uninstalling an application onyour computer?
    • A. 

      A technically well-informed team member.

    • B. 

      A senior colleague in the Finance Department.

    • C. 

      The Maintenance Department.

    • D. 

      The Systems Administrator.

  • 28. 
    • A. 

      Using the telephone.

    • B. 

      By emailing to the IT Manager.

    • C. 

      Using any means of communication.

    • D. 

      Using the method listed in the organisation’s security policy.

  • 29. 
    • A. 

      By reading the office newsletter.

    • B. 

      By reading the policy in the organisation’s policy manual.

    • C. 

      By speaking to the Finance Department.

    • D. 

      By speaking to the Sales Department.

  • 30. 
    Which one of the following would prevent the theft of a laptop?
    • A. 

      Anti-virus software.

    • B. 

      Spyware.

    • C. 

      A security cable.

    • D. 

      A webcam.

  • 31. 
    Which one of the following could be the unexpected outcome ofdeleting a large group of files?
    • A. 

      The files would be hidden.

    • B. 

      An important file may be accidentally deleted.

    • C. 

      The files would become read-only.

    • D. 

      A delete file confirmation window may appear.

  • 32. 
    Which one of the following would NOT happen if a computer suddenlymalfunctions?
    • A. 

      Some software may have to be reinstalled.

    • B. 

      The operating system will fail.

    • C. 

      Files saved on the hard drive will be lost.

    • D. 

      All off-site backups will be lost.

  • 33. 
    • A. 

      A labelled CD.

    • B. 

      A printout.

    • C. 

      A website offering a file sharing service.

    • D. 

      A friend’s computer.

  • 34. 
    • A. 

      To improve accessible of files from other locations.

    • B. 

      To speed up the process of accessing the files at any time.

    • C. 

      To prevent the loss of data in the event of a fire.

    • D. 

      To reduce the possibility of data theft.

  • 35. 
    • A. 

      Storing it in a place free of magnetic fields.

    • B. 

      Storing it in a cupboard.

    • C. 

      Storing backups of the software.

    • D. 

      Storing it in its original packing.

  • 36. 
    • A. 

      PC diagnostic software.

    • B. 

      Anti-spyware software.

    • C. 

      Anti-spam software.

    • D. 

      Web tracking software.