Cyber Security Exam: Trivia Quiz

27 Questions | Attempts: 6599

SettingsSettingsSettings
Cyber Security Exam: Trivia Quiz - Quiz

Cybersecurity exam: trivia quiz. Feeling safe while one carries out their work, communication, or transactions online is very important. A lot of people have the ability to breach protocols laid down and cause harm by sharing information with people. Do you know how to ensure that the assets of an organization are free from being misused? What about the importance of social engineering? This quiz will help you shed some light to that.


Questions and Answers
  • 1. 
    You see a non-familiar face in the access-controlled areas of our office, the person does not have the MGL ID/Visitor/Staff/Vendor tag with him. What would you do?
    • A. 

      None of my business, let some body else take care of it

    • B. 

      Ask the person to leave the facility

    • C. 

      Escort the person to the security and raise a security incident

    • D. 

      Raise a security incident and go back doing your work

    • E. 

      Scream and yell till the person leaves

  • 2. 
    How can you report a security incident?
    • A. 

      HOTS

    • B. 

      Phone

    • C. 

      E-mail

    • D. 

      Any of the above

    • E. 

      None of the above

  • 3. 
    What are the different categories of assets in an organization?
    • A. 

      Information and Paper assets

    • B. 

      Physical and Application assets

    • C. 

      Service Assets

    • D. 

      Option A, B, C

    • E. 

      Option A and B Only

  • 4. 
    You see a blue color sticker on certain physical assets. What does this signify?
    • A. 

      The asset is very high critical and its failure affects the entire organization

    • B. 

      The asset with blue stickers should be kept air conditioned at all times

    • C. 

      The asset is high critical and its failure will affect a group/s/project's work in the organization

    • D. 

      The asset is critical and the impact is restricted to an employee only

  • 5. 
    A clear screen means that computers are to remain locked when you move away from your desk. Clear Desk means that confidential documents are to be under lock & key and should not be accessible to unauthorized parties when you move from your desk. These statements are 
    • A. 

      Correct

    • B. 

      Incorrect

  • 6. 
    What is the difference between a restricted and confidential document?
    • A. 

      Restricted - to be shared among an authorized group Confidential - to be shared among named individuals

    • B. 

      Restricted - to be shared among named individuals Confidential - to be shared among an authorized group

    • C. 

      Restricted - to be shared among named individuals Confidential - to be shared across the organization only

    • D. 

      Restricted - to be shared among named individuals Confidential - to be shared with friends and family

  • 7. 
    What is the colour code of the ID badge at MGL
    • A. 

      Vendor - Red Employees - Blue Visitor - Yellow Staff on Visit - Green

    • B. 

      Vendor - Red Employees - Blue Visitor - Green Staff on Visit - Yellow

    • C. 

      Vendor - Green Employees - Blue Visitor - Red Staff on Visit - Yellow

    • D. 

      Vendor - Red Employees - Blue Visitor - Green Staff on Visit - Yellow

  • 8. 
    CIA of assets stands for
    • A. 

      Confidentiality, Integration and Availability

    • B. 

      Continuity, Integration and Availability

    • C. 

      Confidentiality, Integrity and Accessibility

    • D. 

      Continuity, Integrity and Accessibility

    • E. 

      Confidentiality, Integrity and Availability

  • 9. 
    Availability means
    • A. 

      Service should be accessible at the required time and usable by all

    • B. 

      Service should be accessible at the required time and usable only by the authorized entity

    • C. 

      Service should not be accessible when required

  • 10. 
    When you check in the code/documents in your configuration management system like CVS, Sublime, or KT, what do you ensure?
    • A. 

      Integrity of the code

    • B. 

      Availability of the code

    • C. 

      Confidentiality of the code

    • D. 

      All of the above

  • 11. 
    Why do we have a Business Continuity Plan?
    • A. 

      To ensure availability/immediate restoration of our service to the customers in the event of a disaster/Incident

    • B. 

      To ensure that we continue business relations with customer even after a project has ended

    • C. 

      To ensure that customers are kept happy so that we continue to get business from them

  • 12. 
    A threat means something that has the potential to cause harm In the following example identify what is the threat. "We have installed antiviruses on individual systems to prevent the attack of the virus"
    • A. 

      Virus

    • B. 

      Anti virus

    • C. 

      System

    • D. 

      The User

  • 13. 
    What is social engineering?
    • A. 

      A group planning for a social activity in the organization

    • B. 

      Creating a situation wherein a third party gains confidential information from you

    • C. 

      The organization planning an activity for welfare of the neighborhood

  • 14. 
    You have a hard copy of a custom design document that you want to dispose of. What would you do?
    • A. 

      Throw it in any dustbin

    • B. 

      Shred it using a shredder

    • C. 

      Give it to the office boy to reuse it for other purposes

    • D. 

      Be environment friendly and reuse it for writing

  • 15. 
    You see an employee taking photos in the server room. What do you do?
    • A. 

      No issues, join them

    • B. 

      Ask them not to take photos in secure areas like server rooms, labs etc. and raise a security incident.

  • 16. 
    The financial result of your company is published on the website. The document is to be classified as
    • A. 

      Confidential Document

    • B. 

      Public Document

    • C. 

      Internal Document

    • D. 

      External Document

  • 17. 
    CEO sends a  mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as
    • A. 

      Internal Mail

    • B. 

      Public Mail

    • C. 

      Confidential Mail

    • D. 

      Restricted Mail

  • 18. 
    What is Risk?
    • A. 

      Risk is the just a consequence

    • B. 

      Risk is the combination of the probability of an event occurring along with its consequence

    • C. 

      Risk is just an probability of an event happening

  • 19. 
    Integrity of data means
    • A. 

      Accuracy and completeness of the data

    • B. 

      Data should be viewable at all times

    • C. 

      Data should be accessed by only the right people

  • 20. 
    A vulnerability means an inherent weakness in the system. How have we reduced the vulnerability of outside attacks to our network?
    • A. 

      By using Firewalls

    • B. 

      By installing a router

    • C. 

      Using MS Outlook

    • D. 

      Using CVS

  • 21. 
    What is tailgating?
    • A. 

      Blocking somebody's entry through the access door

    • B. 

      Going behind somebody through the access doors without using own access card

    • C. 

      Opening an access door with your own access card

  • 22. 
    You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
    • A. 

      Shoulder Surfing

    • B. 

      Mountaineering

    • C. 

      Phishing

    • D. 

      Trekking

  • 23. 
    After receiving an email from an unknown contact that has an attachment, you should
    • A. 

      Open the attachment

    • B. 

      Forward the attachment to your colleagues and friends

    • C. 

      Delete the mail without opening it

    • D. 

      Do nothing and keep it in the in-box

  • 24. 
    What quality system standard has been adopted for implementing the ISMS quality system?
    • A. 

      ISO9001:2008

    • B. 

      ISO27001:2005

    • C. 

      ISO14001:2004

    • D. 

      BS7799

    • E. 

      TL9000:2000

  • 25. 
    Does the security have the right to ask you to display your ID badges and check your bags?
    • A. 

      Yes

    • B. 

      No

×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.