Cyber Security Exam: Trivia Quiz

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS, Computer Science |
Computer Expert
Review Board Member
Godwin is a proficient Database Administrator currently employed at MTN Nigeria. He holds as MS in Computer Science from the University of Bedfordshire, where he specialized in Agile Methodologies and Database Administration. He also earned a Bachelor's degree in Computer Science from the University of Port Harcourt. With expertise in SQL Server Integration Services (SSIS) and SQL Server Management Studio, Godwin's knowledge and experience enhance the authority of our quizzes, ensuring accuracy and relevance in the realm of computer science.
, MS, Computer Science
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Sonukumarq8
S
Sonukumarq8
Community Contributor
Quizzes Created: 1 | Total Attempts: 8,538
Questions: 27 | Attempts: 8,644

SettingsSettingsSettings
Cyber Security Exam: Trivia Quiz - Quiz


It is very important to feel safe while one carries out work, communication, or transactions online. Play this informative quiz on cybersecurity and see what you know about it. A lot of people can breach protocols laid down and cause harm by sharing information with people. Do you know how to ensure that the assets of an organization are free from being misused? What about the importance of social engineering? This quiz will help you shed some light on that.


Questions and Answers
  • 1. 

    You see a non-familiar face in the access-controlled areas of our office, and the person does not have the MGL ID/Visitor/Staff/Vendor tag with him. What would you do?

    • A.

      None of my business, let somebody else take care of it.

    • B.

      Ask the person to leave the facility.

    • C.

      Escort the person to the security and raise a security incident.

    • D.

      Raise a security incident and go back to doing your work.

    • E.

      Scream and yell till the person leaves

    Correct Answer
    C. Escort the person to the security and raise a security incident.
    Explanation
    If a non-familiar face is seen in the access-controlled areas without the required identification tags, the appropriate action would be to escort the person to the security and raise a security incident. This ensures that the person is properly handled by the security personnel and that any potential threat or unauthorized entry is addressed. It is important to prioritize the safety and security of the office premises, and taking immediate action in such situations is necessary.

    Rate this question:

  • 2. 

    How can you report a security incident?

    • A.

      HOTS

    • B.

      Phone

    • C.

      E-mail

    • D.

      Any of the above

    • E.

      None of the above

    Correct Answer
    D. Any of the above
    Explanation
    You can report a security incident through HOTS, phone, or email. All of these options are valid methods for reporting a security incident.

    Rate this question:

  • 3. 

    What are the different categories of assets in an organization?

    • A.

      Information and Paper Assets

    • B.

      Physical and Application Assets

    • C.

      Service Assets

    • D.

      Option A, B, C

    • E.

      Option A and B Only

    Correct Answer
    D. Option A, B, C
    Explanation
    The different categories of assets in an organization include information and paper assets, physical and application assets, and service assets. Option A, B, C is the correct answer because it includes all three categories of assets mentioned in the question.

    Rate this question:

  • 4. 

    You see a blue color sticker on certain physical assets. What does this signify?

    • A.

      The asset is very highly critical, and its failure affects the entire organization.

    • B.

      The asset with blue stickers should be kept air-conditioned at all times.

    • C.

      The asset is highly critical, and its failure will affect a group project's work in the organization.

    • D.

      The asset is critical and the impact is restricted to an employee only.

    Correct Answer
    C. The asset is highly critical, and its failure will affect a group project's work in the organization.
    Explanation
    The blue color sticker on certain physical assets signifies that the asset is highly critical and its failure will affect a group project's work in the organization.

    Rate this question:

  • 5. 

    A clear screen means that computers are to remain locked when you move away from your desk. Clear Desk means that confidential documents are to be under lock & key and should not be accessible to unauthorized parties when you move from your desk. These statements are 

    • A.

      Correct

    • B.

      Incorrect

    Correct Answer
    A. Correct
    Explanation
    The given answer is correct because it accurately explains the meaning of a clear screen and clear desk policy. A clear screen policy means that computers should be locked when the user is away from their desk to prevent unauthorized access. Similarly, a clear desk policy means that confidential documents should be secured and not accessible to unauthorized individuals when the user is not present. Both policies aim to protect sensitive information and maintain security.

    Rate this question:

  • 6. 

    What is the difference between a restricted and confidential document?

    • A.

      Restricted - to be shared among an authorized group Confidential - to be shared among named individuals

    • B.

      Restricted - to be shared among named individuals Confidential - to be shared among an authorized group

    • C.

      Restricted - to be shared among named individuals Confidential - to be shared across the organization only

    • D.

      Restricted - to be shared among named individuals Confidential - to be shared with friends and family

    Correct Answer
    B. Restricted - to be shared among named individuals Confidential - to be shared among an authorized group
    Explanation
    The difference between a restricted and confidential document is that a restricted document is to be shared among named individuals, while a confidential document is to be shared among an authorized group. This means that a restricted document is limited to specific individuals who have been named or identified, while a confidential document can be shared with a larger group of individuals who have been authorized to access it.

    Rate this question:

  • 7. 

    What is the color code of the ID badge at MGL?

    • A.

      Vendor - Red Employees - Blue Visitor - Yellow Staff on Visit - Green

    • B.

      Vendor - Red Employees - Blue Visitor - Green Staff on Visit - Yellow

    • C.

      Vendor - Green Employees - Blue Visitor - Red Staff on Visit - Yellow

    • D.

      Vendor - Red Employees - Blue Visitor - Green Staff on Visit - Yellow

    Correct Answer
    A. Vendor - Red Employees - Blue Visitor - Yellow Staff on Visit - Green
    Explanation
    The correct answer is the first option. According to the given information, the ID badge color code at MGL is as follows: Vendor - Red, Employees - Blue, Visitor - Yellow, and Staff on Visit - Green.

    Rate this question:

  • 8. 

    CIA of assets stands for

    • A.

      Confidentiality, Integration and Availability

    • B.

      Continuity, Integration and Availability

    • C.

      Confidentiality, Integrity and Accessibility

    • D.

      Continuity, Integrity and Accessibility

    • E.

      Confidentiality, Integrity and Availability

    Correct Answer
    E. Confidentiality, Integrity and Availability
    Explanation
    The correct answer is "Confidentiality, Integrity, and Availability." CIA of assets refers to the three fundamental principles of information security. Confidentiality ensures that information is accessible only to authorized individuals. Integrity ensures that information is accurate and trustworthy. Availability ensures that information is accessible and usable when needed. These principles are crucial for protecting sensitive data and maintaining the overall security of an organization.

    Rate this question:

  • 9. 

    Availability means

    • A.

      Service should be accessible at the required time and usable by all

    • B.

      Service should be accessible at the required time and usable only by the authorized entity

    • C.

      Service should not be accessible when required

    Correct Answer
    B. Service should be accessible at the required time and usable only by the authorized entity
    Explanation
    Availability means the property of being accessible and usable upon demand by the authorized entity. Like Melange should be accessible at all times to MGL employees only.

    Rate this question:

  • 10. 

    When you check in the code/documents in your configuration management system like CVS, Sublime, or KT, what do you ensure?

    • A.

      Integrity of the code

    • B.

      Availability of the code

    • C.

      Confidentiality of the code

    • D.

      All of the above

    Correct Answer
    A. Integrity of the code
    Explanation
    The act of checking in code is typically associated with ensuring that the changes made to the code are correctly and accurately captured in the version control system, maintaining the integrity of the codebase.

    Rate this question:

  • 11. 

    Why do we have a Business Continuity Plan?

    • A.

      To ensure availability/immediate restoration of our service with customers in the event of a disaster/Incident.

    • B.

      To ensure that we continue business relations with customers even after a project has ended.

    • C.

      To ensure that customers are kept happy so that we continue to get business from them.

    Correct Answer
    A. To ensure availability/immediate restoration of our service with customers in the event of a disaster/Incident.
    Explanation
    The Business Continuity Plan captures the steps to be followed in case a disaster/incident occurs at the primary worksite.

    Rate this question:

  • 12. 

    A threat means something that has the potential to cause harm. In the following example, identify what is the threat. "We have installed antiviruses on individual systems to prevent the attack of the virus."

    • A.

      Virus

    • B.

      Anti virus

    • C.

      System

    • D.

      The User

    Correct Answer
    A. Virus
    Explanation
    In the given example, the threat is the virus. The statement mentions that antiviruses have been installed on individual systems to prevent the attack of the virus. This implies that the virus is a potential harm that needs to be protected against, making it the threat in this scenario.

    Rate this question:

  • 13. 

    What is social engineering?

    • A.

      A group planning for a social activity in the organization.

    • B.

      Creating a situation wherein a third party gains confidential information from you.

    • C.

      The organization planning an activity for the welfare of the neighborhood.

    Correct Answer
    B. Creating a situation wherein a third party gains confidential information from you.
    Explanation
    Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust.

    Rate this question:

  • 14. 

    You have a hard copy of a custom design document that you want to dispose of. What would you do?

    • A.

      Throw it in any dustbin

    • B.

      Shred it using a shredder

    • C.

      Give it to the office boy to reuse it for other purposes

    • D.

      Be environment friendly and reuse it for writing

    Correct Answer
    B. Shred it using a shredder
    Explanation
     If a document is confidential or restricted, you need to dispose off it by shredding it. The environmental guidelines for reusing paper specify that only non-confidential paper should be reused.

    Rate this question:

  • 15. 

    You see an employee taking photos in the server room. What do you do?

    • A.

      No issues, join them

    • B.

      Ask them not to take photos in secure areas like server rooms, labs etc. and raise a security incident.

    Correct Answer
    B. Ask them not to take photos in secure areas like server rooms, labs etc. and raise a security incident.
    Explanation
    Photos cannot be taken in secure areas. You are allowed to take the photos in Development areas, cafeteria, etc.

    Rate this question:

  • 16. 

    The financial result of your company is published on the website. The document is to be classified as

    • A.

      Confidential Document

    • B.

      Public Document

    • C.

      Internal Document

    • D.

      External Document

    Correct Answer
    B. Public Document
    Explanation
    The financial result of your company being published on the website indicates that it is intended for public access and dissemination. As a public document, it is meant to be accessible to anyone who visits the website, including stakeholders, investors, and the general public. This classification suggests that the company wants to provide transparency and make its financial information readily available to interested parties.

    Rate this question:

  • 17. 

    The CEO sends an e-mail giving his views on the status of the company and the company’s future strategy, the CEO's vision, and the employee's part in it. The e-mail should be classified as

    • A.

      Internal e-mail

    • B.

      Public e-mail

    • C.

      Confidential e-mail

    • D.

      Restricted e-mail

    Correct Answer
    C. Confidential e-mail
    Explanation
    This kind of communication often contains sensitive information and is intended for internal stakeholders, making it classified as confidential.

    Rate this question:

  • 18. 

    What is Risk?

    • A.

      Risk is just a consequence.

    • B.

      Risk is the combination of the probability of an event occurring along with its consequence.

    • C.

      Risk is just the probability of an event happening.

    Correct Answer
    B. Risk is the combination of the probability of an event occurring along with its consequence.
    Explanation
    Risk is the combination of the probability of an event occurring along with its consequence.

    Rate this question:

  • 19. 

    Integrity of data means

    • A.

      Accuracy and completeness of the data

    • B.

      Data should be viewable at all times

    • C.

      Data should be accessed by only the right people

    Correct Answer
    A. Accuracy and completeness of the data
    Explanation
    The integrity of the data implies that the data should be accurate and complete. For Example: when we back up a database we don't expect only the structure and half the entries to be backed up, we expect the whole database to be backed up.

    Rate this question:

  • 20. 

    A vulnerability means an inherent weakness in the system. How have we reduced the vulnerability of outside attacks to our network?

    • A.

      By using Firewalls

    • B.

      By installing a router

    • C.

      Using MS Outlook

    • D.

      Using CVS

    Correct Answer
    A. By using Firewalls
    Explanation
    Firewalls are a security measure that helps reduce the vulnerability of outside attacks to our network. They act as a barrier between our internal network and external networks, monitoring and controlling incoming and outgoing network traffic. Firewalls analyze the data packets, determine their legitimacy, and block any unauthorized access attempts. By implementing firewalls, we can effectively filter and block potential threats, thus reducing the vulnerability of outside attacks to our network.

    Rate this question:

  • 21. 

    What is tailgating?

    • A.

      Blocking somebody's entry through the access door

    • B.

      Going behind somebody through the access doors without using own access card

    • C.

      Opening an access door with your own access card

    Correct Answer
    B. Going behind somebody through the access doors without using own access card
    Explanation
    Tailgating refers to the act of following closely behind someone through an access door without using one's own access card. This is considered a security breach as it allows unauthorized individuals to gain entry into a restricted area by taking advantage of someone else's access. It is important to prevent tailgating in order to maintain the integrity of access control systems and ensure the safety and security of the premises.

    Rate this question:

  • 22. 

    You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

    • A.

      Shoulder Surfing

    • B.

      Mountaineering

    • C.

      Phishing

    • D.

      Trekking

    Correct Answer
    C. Phishing
    Explanation
    Phishing is the correct answer because it refers to the act of attempting to acquire sensitive information, such as usernames, passwords, and credit card details, by pretending to be a trustworthy entity in an electronic communication. In this scenario, the unknown person is trying to deceive the recipient by claiming to be a representative of their bank and asking for their account number and password. This is a classic example of phishing, where the attacker is trying to trick the victim into revealing their confidential information.

    Rate this question:

  • 23. 

    After receiving an email from an unknown contact that has an attachment, you should

    • A.

      Open the attachment

    • B.

      Forward the attachment to your colleagues and friends

    • C.

      Delete the mail without opening it

    • D.

      Do nothing and keep it in the inbox

    Correct Answer
    C. Delete the mail without opening it
    Explanation
    When receiving an email from an unknown contact with an attachment, it is important to prioritize cybersecurity. Opening the attachment can potentially expose your device to malware or viruses. Forwarding the attachment to colleagues and friends can unknowingly spread the threat further. Therefore, the safest course of action is to delete the email without opening it, ensuring the protection of your device and personal information.

    Rate this question:

  • 24. 

    What quality system standard has been adopted for implementing the ISMS quality system?

    • A.

      ISO9001:2008

    • B.

      ISO27001:2005

    • C.

      ISO14001:2004

    • D.

      BS7799

    • E.

      TL9000:2000

    Correct Answer
    B. ISO27001:2005
    Explanation
    ISO27001:2005 is the correct answer because it is the international standard for implementing an Information Security Management System (ISMS). This standard provides a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability. ISO27001:2005 sets out the requirements for establishing, implementing, maintaining, and continually improving an ISMS within the context of the organization's overall business risks. It helps organizations identify and address information security risks, protect against potential security breaches, and demonstrate a commitment to information security to stakeholders.

    Rate this question:

  • 25. 

    Does the security have the right to ask you to display your ID badges and check your bags?

    • A.

      Yes

    • B.

      No

    Correct Answer
    A. Yes
    Explanation
    The security personnel have the right to ask individuals to display their ID badges and check their bags as a part of their duty to maintain safety and security in the area they are responsible for. This is a common practice in many public places, workplaces, and events to ensure that only authorized individuals are present and to prevent any potential threats or illegal activities. It helps in maintaining order and protecting the well-being of everyone present in the area.

    Rate this question:

  • 26. 

    MGL's ______________ policy is mentioned below. We shall
    • Manage efficiently the confidentiality and integrity of organizational and customer information assets.
    • Ensure business continuity in the event of any security incident, with minimal business impact.
    • Continually improve our processes to enhance information security.

    • A.

      Environmental Policy

    • B.

      Quality Policy

    • C.

      Information Security Policy

    Correct Answer
    C. Information Security Policy
    Explanation
    The given correct answer is "Information Security Policy". This is because the policy mentioned in the statement focuses on managing the confidentiality and integrity of organizational and customer information assets, ensuring business continuity in the event of any security incident, and continually improving processes to enhance information security. Therefore, it is clear that the policy being referred to is the Information Security Policy.

    Rate this question:

  • 27. 

    As a developer, how do you ensure the integrity of the software that you develop?

    • A.

      By maintaining documents/code in the configuration management system.

    • B.

      By following coding guidelines.

    • C.

      By doing reviews and testing.

    • D.

      Option A and B

    • E.

      All the above

    Correct Answer
    E. All the above
    Explanation
    To ensure the integrity of the software, developers can follow multiple steps. Firstly, they can maintain documents and code in a configuration management system, which allows for version control and tracking changes. Secondly, following coding guidelines ensures consistency and readability, reducing the chances of errors. Additionally, doing reviews and testing helps identify and fix any issues or bugs. Therefore, the correct answer is "All the above" as all these practices contribute to maintaining the integrity of the software.

    Rate this question:

Godwin Iheuwa |MS, Computer Science |
Computer Expert
Godwin is a proficient Database Administrator currently employed at MTN Nigeria. He holds as MS in Computer Science from the University of Bedfordshire, where he specialized in Agile Methodologies and Database Administration. He also earned a Bachelor's degree in Computer Science from the University of Port Harcourt. With expertise in SQL Server Integration Services (SSIS) and SQL Server Management Studio, Godwin's knowledge and experience enhance the authority of our quizzes, ensuring accuracy and relevance in the realm of computer science.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 23, 2023
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Oct 04, 2012
    Quiz Created by
    Sonukumarq8
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.