Cyber Security Exam: Trivia Quiz

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
By Sonukumarq8
S
Sonukumarq8
Community Contributor
Quizzes Created: 1 | Total Attempts: 9,120
| Attempts: 9,121 | Questions: 27
Please wait...
Question 1 / 27
0 %
0/100
Score 0/100
1. A clear screen means that computers are to remain locked when you move away from your desk. Clear Desk means that confidential documents are to be under lock & key and should not be accessible to unauthorized parties when you move from your desk. These statements are 

Explanation

The given answer is correct because it accurately explains the meaning of a clear screen and clear desk policy. A clear screen policy means that computers should be locked when the user is away from their desk to prevent unauthorized access. Similarly, a clear desk policy means that confidential documents should be secured and not accessible to unauthorized individuals when the user is not present. Both policies aim to protect sensitive information and maintain security.

Submit
Please wait...
About This Quiz
Cyber Security Exam: Trivia Quiz - Quiz


It is very important to feel safe while one carries out work, communication, or transactions online. Play this informative quiz on cybersecurity and see what you know about... see moreit. A lot of people can breach protocols laid down and cause harm by sharing information with people. Do you know how to ensure that the assets of an organization are free from being misused? What about the importance of social engineering? This quiz will help you shed some light on that. see less

2. You see an employee taking photos in the server room. What do you do?

Explanation

Photos cannot be taken in secure areas. You are allowed to take the photos in Development areas, cafeteria, etc.

Submit
3. Does the security have the right to ask you to display your ID badges and check your bags?

Explanation

The security personnel have the right to ask individuals to display their ID badges and check their bags as a part of their duty to maintain safety and security in the area they are responsible for. This is a common practice in many public places, workplaces, and events to ensure that only authorized individuals are present and to prevent any potential threats or illegal activities. It helps in maintaining order and protecting the well-being of everyone present in the area.

Submit
4. What is Risk?

Explanation

Risk is the combination of the probability of an event occurring along with its consequence.

Submit
5. A vulnerability means an inherent weakness in the system. How have we reduced the vulnerability of outside attacks to our network?

Explanation

Firewalls are a security measure that helps reduce the vulnerability of outside attacks to our network. They act as a barrier between our internal network and external networks, monitoring and controlling incoming and outgoing network traffic. Firewalls analyze the data packets, determine their legitimacy, and block any unauthorized access attempts. By implementing firewalls, we can effectively filter and block potential threats, thus reducing the vulnerability of outside attacks to our network.

Submit
6. You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

Explanation

Phishing is the correct answer because it refers to the act of attempting to acquire sensitive information, such as usernames, passwords, and credit card details, by pretending to be a trustworthy entity in an electronic communication. In this scenario, the unknown person is trying to deceive the recipient by claiming to be a representative of their bank and asking for their account number and password. This is a classic example of phishing, where the attacker is trying to trick the victim into revealing their confidential information.

Submit
7. After receiving an email from an unknown contact that has an attachment, you should

Explanation

When receiving an email from an unknown contact with an attachment, it is important to prioritize cybersecurity. Opening the attachment can potentially expose your device to malware or viruses. Forwarding the attachment to colleagues and friends can unknowingly spread the threat further. Therefore, the safest course of action is to delete the email without opening it, ensuring the protection of your device and personal information.

Submit
8. What is tailgating?

Explanation

Tailgating refers to the act of following closely behind someone through an access door without using one's own access card. This is considered a security breach as it allows unauthorized individuals to gain entry into a restricted area by taking advantage of someone else's access. It is important to prevent tailgating in order to maintain the integrity of access control systems and ensure the safety and security of the premises.

Submit
9. What is social engineering?

Explanation

Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust.

Submit
10. You have a hard copy of a custom design document that you want to dispose of. What would you do?

Explanation

 If a document is confidential or restricted, you need to dispose off it by shredding it. The environmental guidelines for reusing paper specify that only non-confidential paper should be reused.

Submit
11. Availability means

Explanation

Availability means the property of being accessible and usable upon demand by the authorized entity. Like Melange should be accessible at all times to MGL employees only.

Submit
12. What are the different categories of assets in an organization?

Explanation

The different categories of assets in an organization include information and paper assets, physical and application assets, and service assets. Option A, B, C is the correct answer because it includes all three categories of assets mentioned in the question.

Submit
13. Why do we have a Business Continuity Plan?

Explanation

The Business Continuity Plan captures the steps to be followed in case a disaster/incident occurs at the primary worksite.

Submit
14. How can you report a security incident?

Explanation

You can report a security incident through HOTS, phone, or email. All of these options are valid methods for reporting a security incident.

Submit
15. A threat means something that has the potential to cause harm. In the following example, identify what is the threat. "We have installed antiviruses on individual systems to prevent the attack of the virus."

Explanation

In the given example, the threat is the virus. The statement mentions that antiviruses have been installed on individual systems to prevent the attack of the virus. This implies that the virus is a potential harm that needs to be protected against, making it the threat in this scenario.

Submit
16. When you check in the code/documents in your configuration management system like CVS, Sublime, or KT, what do you ensure?

Explanation

The act of checking in code is typically associated with ensuring that the changes made to the code are correctly and accurately captured in the version control system, maintaining the integrity of the codebase.

Submit
17. MGL's ______________ policy is mentioned below. We shall
  • Manage efficiently the confidentiality and integrity of organizational and customer information assets.
  • Ensure business continuity in the event of any security incident, with minimal business impact.
  • Continually improve our processes to enhance information security.

Explanation

The given correct answer is "Information Security Policy". This is because the policy mentioned in the statement focuses on managing the confidentiality and integrity of organizational and customer information assets, ensuring business continuity in the event of any security incident, and continually improving processes to enhance information security. Therefore, it is clear that the policy being referred to is the Information Security Policy.

Submit
18. Integrity of data means

Explanation

The integrity of the data implies that the data should be accurate and complete. For Example: when we back up a database we don't expect only the structure and half the entries to be backed up, we expect the whole database to be backed up.

Submit
19. You see a non-familiar face in the access-controlled areas of our office, and the person does not have the MGL ID/Visitor/Staff/Vendor tag with him. What would you do?

Explanation

If a non-familiar face is seen in the access-controlled areas without the required identification tags, the appropriate action would be to escort the person to the security and raise a security incident. This ensures that the person is properly handled by the security personnel and that any potential threat or unauthorized entry is addressed. It is important to prioritize the safety and security of the office premises, and taking immediate action in such situations is necessary.

Submit
20. The financial result of your company is published on the website. The document is to be classified as

Explanation

The financial result of your company being published on the website indicates that it is intended for public access and dissemination. As a public document, it is meant to be accessible to anyone who visits the website, including stakeholders, investors, and the general public. This classification suggests that the company wants to provide transparency and make its financial information readily available to interested parties.

Submit
21. As a developer, how do you ensure the integrity of the software that you develop?

Explanation

To ensure the integrity of the software, developers can follow multiple steps. Firstly, they can maintain documents and code in a configuration management system, which allows for version control and tracking changes. Secondly, following coding guidelines ensures consistency and readability, reducing the chances of errors. Additionally, doing reviews and testing helps identify and fix any issues or bugs. Therefore, the correct answer is "All the above" as all these practices contribute to maintaining the integrity of the software.

Submit
22. What quality system standard has been adopted for implementing the ISMS quality system?

Explanation

ISO27001:2005 is the correct answer because it is the international standard for implementing an Information Security Management System (ISMS). This standard provides a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability. ISO27001:2005 sets out the requirements for establishing, implementing, maintaining, and continually improving an ISMS within the context of the organization's overall business risks. It helps organizations identify and address information security risks, protect against potential security breaches, and demonstrate a commitment to information security to stakeholders.

Submit
23. What is the difference between a restricted and confidential document?

Explanation

The difference between a restricted and confidential document is that a restricted document is to be shared among named individuals, while a confidential document is to be shared among an authorized group. This means that a restricted document is limited to specific individuals who have been named or identified, while a confidential document can be shared with a larger group of individuals who have been authorized to access it.

Submit
24. CIA of assets stands for

Explanation

The correct answer is "Confidentiality, Integrity, and Availability." CIA of assets refers to the three fundamental principles of information security. Confidentiality ensures that information is accessible only to authorized individuals. Integrity ensures that information is accurate and trustworthy. Availability ensures that information is accessible and usable when needed. These principles are crucial for protecting sensitive data and maintaining the overall security of an organization.

Submit
25. The CEO sends an e-mail giving his views on the status of the company and the company's future strategy, the CEO's vision, and the employee's part in it. The e-mail should be classified as

Explanation

This kind of communication often contains sensitive information and is intended for internal stakeholders, making it classified as confidential.

Submit
26. What is the color code of the ID badge at MGL?

Explanation

The correct answer is the first option. According to the given information, the ID badge color code at MGL is as follows: Vendor - Red, Employees - Blue, Visitor - Yellow, and Staff on Visit - Green.

Submit
27. You see a blue color sticker on certain physical assets. What does this signify?

Explanation

The blue color sticker on certain physical assets signifies that the asset is highly critical and its failure will affect a group project's work in the organization.

Submit
View My Results
Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline (Updated): Nov 23, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 23, 2023
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Oct 04, 2012
    Quiz Created by
    Sonukumarq8
Cancel
  • All
    All (27)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A clear screen means that computers are to remain locked when you move...
You see an employee taking photos in the server room. What do you do?
Does the security have the right to ask you to display your ID badges...
What is Risk?
A vulnerability means an inherent weakness in the system....
You receive an E-mail from some unknown person claiming to be...
After receiving an email from an unknown contact that has an...
What is tailgating?
What is social engineering?
You have a hard copy of a custom design document that you want to...
Availability means
What are the different categories of assets in an organization?
Why do we have a Business Continuity Plan?
How can you report a security incident?
A threat means something that has the potential to cause harm. ...
When you check in the code/documents in your configuration...
MGL's ______________ policy is mentioned below. ...
Integrity of data means
You see a non-familiar face in the access-controlled areas of our...
The financial result of your company is published on the website. The...
As a developer, how do you ensure the integrity of the software that...
What quality system standard has been adopted for implementing the...
What is the difference between a restricted and confidential document?
CIA of assets stands for
The CEO sends an e-mail giving his views on the status of the company...
What is the color code of the ID badge at MGL?
You see a blue color sticker on certain physical assets. What does...
Alert!

Advertisement