Cyber Security Exam: Trivia Quiz

15 Questions | Total Attempts: 1254

SettingsSettingsSettings
Please wait...
Cyber Security Exam: Trivia Quiz

Cybersecurity exam: trivia quiz. Feeling safe while one carries out their work, communication, or transactions online is very important. A lot of people have the ability to breach protocols laid down and cause harm by sharing information with people. Do you know how to ensure that the assets of an organization are free from being misused? What about the importance of social engineering? This quiz will help you shed some light to that.


Questions and Answers
  • 1. 
    You see a non-familiar face in the access-controlled areas of our office, the person does not have the MGL ID/Visitor/Staff/Vendor tag with him. What would you do?
    • A. 

      None of my business, let some body else take care of it

    • B. 

      Ask the person to leave the facility

    • C. 

      Escort the person to the security and raise a security incident

    • D. 

      Raise a security incident and go back doing your work

    • E. 

      Scream and yell till the person leaves

  • 2. 
    How can you report a security incident?
    • A. 

      HOTS

    • B. 

      Phone

    • C. 

      E-mail

    • D. 

      Any of the above

    • E. 

      None of the above

  • 3. 
    What are the different categories of assets in an organization?
    • A. 

      Information and Paper assets

    • B. 

      Physical and Application assets

    • C. 

      Service Assets

    • D. 

      Option A, B, C

    • E. 

      Option A and B Only

  • 4. 
    You see a blue color sticker on certain physical assets. What does this signify?
    • A. 

      The asset is very high critical and its failure affects the entire organization

    • B. 

      The asset with blue stickers should be kept air conditioned at all times

    • C. 

      The asset is high critical and its failure will affect a group/s/project's work in the organization

    • D. 

      The asset is critical and the impact is restricted to an employee only

  • 5. 
    A clear screen means that computers are to remain locked when you move away from your desk. Clear Desk means that confidential documents are to be under lock & key and should not be accessible to unauthorized parties when you move from your desk. These statements are 
    • A. 

      Correct

    • B. 

      Incorrect

  • 6. 
    What is the difference between a restricted and confidential document?
    • A. 

      Restricted - to be shared among an authorized group Confidential - to be shared among named individuals

    • B. 

      Restricted - to be shared among named individuals Confidential - to be shared among an authorized group

    • C. 

      Restricted - to be shared among named individuals Confidential - to be shared across the organization only

    • D. 

      Restricted - to be shared among named individuals Confidential - to be shared with friends and family

  • 7. 
    What is the colour code of the ID badge at MGL
    • A. 

      Vendor - Red Employees - Blue Visitor - Yellow Staff on Visit - Green

    • B. 

      Vendor - Red Employees - Blue Visitor - Green Staff on Visit - Yellow

    • C. 

      Vendor - Green Employees - Blue Visitor - Red Staff on Visit - Yellow

    • D. 

      Vendor - Red Employees - Blue Visitor - Green Staff on Visit - Yellow

  • 8. 
    CIA of assets stands for
    • A. 

      Confidentiality, Integration and Availability

    • B. 

      Continuity, Integration and Availability

    • C. 

      Confidentiality, Integrity and Accessibility

    • D. 

      Continuity, Integrity and Accessibility

    • E. 

      Confidentiality, Integrity and Availability

  • 9. 
    Availability means
    • A. 

      Service should be accessible at the required time and usable by all

    • B. 

      Service should be accessible at the required time and usable only by the authorized entity

    • C. 

      Service should not be accessible when required

  • 10. 
    When you check in the code/documents in your configuration management system like CVS, Sublime, or KT, what do you ensure?
    • A. 

      Integrity of the code

    • B. 

      Availability of the code

    • C. 

      Confidentiality of the code

    • D. 

      All of the above

  • 11. 
    Why do we have a Business Continuity Plan?
    • A. 

      To ensure availability/immediate restoration of our service to the customers in the event of a disaster/Incident

    • B. 

      To ensure that we continue business relations with customer even after a project has ended

    • C. 

      To ensure that customers are kept happy so that we continue to get business from them

  • 12. 
    A threat means something that has the potential to cause harm In the following example identify what is the threat. "We have installed antiviruses on individual systems to prevent the attack of the virus"
    • A. 

      Virus

    • B. 

      Anti virus

    • C. 

      System

    • D. 

      The User

  • 13. 
    What is social engineering?
    • A. 

      A group planning for a social activity in the organization

    • B. 

      Creating a situation wherein a third party gains confidential information from you

    • C. 

      The organization planning an activity for welfare of the neighborhood

  • 14. 
    You have a hard copy of a custom design document that you want to dispose of. What would you do?
    • A. 

      Throw it in any dustbin

    • B. 

      Shred it using a shredder

    • C. 

      Give it to the office boy to reuse it for other purposes

    • D. 

      Be environment friendly and reuse it for writing

  • 15. 
    You see an employee taking photos in the server room. What do you do?
    • A. 

      No issues, join them

    • B. 

      Ask them not to take photos in secure areas like server rooms, labs etc. and raise a security incident.