CyberSecurity Awareness Test Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Adityam
A
Adityam
Community Contributor
Quizzes Created: 1 | Total Attempts: 579
| Attempts: 579 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. You have a hard copy of a design document that you want to dispose of. What would you do?

Explanation

Shredding the hard copy of the design document is the correct answer because it ensures that the sensitive information contained in the document is destroyed and cannot be accessed by unauthorized individuals. This helps to protect the confidentiality of the information and prevent any potential misuse or data breaches. Shredding is a secure and reliable method of disposing of confidential documents.

Submit
Please wait...
About This Quiz
Cybersecurity Awareness Test Quiz! - Quiz

Cybersecurity Awareness Test Quiz assesses knowledge on multi-factor authentication, strong password practices, clean desk policies, and secure use of laptops and emails. It aims to enhance security practices... see moreand awareness, crucial for personal and professional cybersecurity management. see less

2. You went to Starbucks/CCD to buy a coffee and then while waiting for your order, you decided to connect to their Free WIIFI. While browsing your Google Mail (https://mail.google.com/), the page redirects to https://www.googlemail.anish.net. What do you think should you do?

Explanation

The correct answer is to disconnect from the Starbucks/CCD WIFI network. This is because when browsing Google Mail, the page redirects to a suspicious website (http://www.googlemail.anish.net) instead of the legitimate Google Mail website (https://mail.google.com/). This could indicate a potential security threat or a man-in-the-middle attack. To ensure the safety of personal information, it is best to disconnect from the WIFI network to prevent any unauthorized access or data breach.

Submit
3. When receiving a Email from a unknown contact that has an attachment, you should:

Explanation

When receiving an email from an unknown contact that has an attachment, it is recommended to delete the mail. Opening the attachment can pose a security risk as it may contain malware or viruses that can harm your computer or compromise your personal information. Forwarding the email to co-workers or personal email accounts can potentially spread the risk to others or expose personal information to unauthorized individuals. Therefore, the safest course of action is to delete the email to protect yourself and your system from potential harm.

Submit
4. The mouse on your computer begins moving across the screen and clicking on things without you even touching it. What will you do?

Explanation

If the mouse on your computer is moving and clicking on things without you touching it, it is likely that your computer has been compromised by malware or a hacker. Disconnecting your computer from the network is important to prevent further unauthorized access or potential damage. Calling the IT Support Desk is necessary to report the incident and seek assistance in resolving the issue and ensuring the security of your computer system.

Submit
5. You see a non familiar face in the access controlled areas of our office, the person does not have the a ITZCASH ID/Visitor/Vendor tag with him. What would you do?

Explanation

If a non-familiar face is seen in the access controlled areas of the office without any proper identification, the appropriate action would be to escort the person to the security and raise a security incident. This ensures that the person is properly addressed and investigated by the security team, maintaining the safety and security protocols of the office.

Submit
6. Which of the below is not a part of the appropriate use - Laptop Security Policy?

Explanation

The correct answer is "Install any software without approval." This is not a part of the appropriate use - Laptop Security Policy because it can pose a security risk to the laptop and the network. Installing software without approval can introduce malware or other malicious programs, compromise the laptop's security, and violate company policies. It is important to obtain proper approval before installing any software to ensure the security and integrity of the laptop and the organization's network.

Submit
7. How can you report a security incident?

Explanation

The correct answer is "Any of the above" because reporting a security incident can be done through various means, including email and phone. This allows individuals to choose the most convenient method for them to report the incident and ensure that it is communicated to the appropriate authorities.

Submit
8. When is the best time to lie to your information security auditor or officer?

Explanation

The best time to lie to your information security auditor or officer is never. Lying to cover up someone else's faults or mistakes, or because you don't trust the auditor, or to protect key people in your organization is unethical and can have serious consequences. It is always best to be honest and transparent with auditors and officers to maintain the integrity and security of the organization's information.

Submit
9. Which of the following could help you mitigate malwares and viruses from infecting your PC?

Explanation

Installing an antivirus program and enabling a firewall can help mitigate malwares and viruses from infecting your PC. Antivirus software can detect and remove malicious programs, while a firewall can block unauthorized access to your computer, protecting it from potential threats. By having both of these security measures in place, you can significantly reduce the risk of malware and virus infections on your PC.

Submit
10. Which of the below is not a part of the Clean Desk Policy?

Explanation

The Clean Desk Policy aims to maintain a clutter-free and secure work environment. Tidying your desk, locking your screen, and putting away sensitive documents are all practices that align with this policy. However, hiding passwords below the keyboard is not a part of the Clean Desk Policy. This action poses a security risk as it makes it easier for unauthorized individuals to access sensitive information.

Submit
11. What is social engineering?

Explanation

Social engineering refers to the act of manipulating individuals into divulging confidential information or performing actions that may compromise their security. This can be done through various techniques such as impersonation, deception, or psychological manipulation. The correct answer states that social engineering involves creating a situation where a third party gains confidential information from the individual, which accurately describes the concept. It is important to be aware of social engineering tactics to protect oneself from potential security breaches.

Submit
12. Which of the following is an Online Malware Scanning Service for suspicious files and URLs?

Explanation

www.virustotal.com is an online malware scanning service that allows users to scan suspicious files and URLs for potential malware or viruses. It provides a comprehensive analysis by using multiple antivirus engines and other tools to detect any malicious content. Users can upload files or enter URLs to be scanned, and the service provides detailed reports on the potential threats found. It is a trusted platform used by individuals and organizations to ensure the safety of their files and websites.

Submit
13. Which of the below is not a best practice of choosing Strong Passwords?

Explanation

Making a password numeric is actually a best practice for choosing strong passwords. Including numbers in a password adds complexity and makes it harder for attackers to guess or crack the password. Therefore, the given answer is incorrect.

Submit
14. Which of the below is not a part of the appropriate use - Email Security Policy?

Explanation

The statement "Use official Email ID for personal purposes" is not a part of the appropriate use - Email Security Policy. This policy is designed to ensure the security and confidentiality of email communication within an organization. Using official email IDs for personal purposes may compromise the security of sensitive information and increase the risk of unauthorized access or data breaches. It is important to separate personal and official email accounts to maintain the integrity of the organization's email security policy.

Submit
15. Which of the below is not used for Multi-factor authentication?

Explanation

"Something you do" is not used for multi-factor authentication. Multi-factor authentication typically involves using a combination of two or more factors to verify a user's identity. These factors can include "something you have" (such as a physical token or a mobile device), "something you know" (such as a password or PIN), and "something you are" (such as biometric data like fingerprints or facial recognition). However, "something you do" refers to behavioral biometrics, which is a separate authentication method that analyzes patterns of behavior, such as typing speed or mouse movements, to verify identity.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 22, 2016
    Quiz Created by
    Adityam
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You have a hard copy of a design document that you want to dispose of....
You went to Starbucks/CCD to buy a coffee and then while waiting for...
When receiving a Email from a unknown contact that has an attachment,...
The mouse on your computer begins moving across the screen and...
You see a non familiar face in the access controlled areas of our...
Which of the below is not a part of the appropriate use - Laptop...
How can you report a security incident?
When is the best time to lie to your information security auditor or...
Which of the following could help you mitigate malwares and viruses...
Which of the below is not a part of the Clean Desk Policy?
What is social engineering?
Which of the following is an Online Malware Scanning Service for...
Which of the below is not a best practice of choosing Strong...
Which of the below is not a part of the appropriate use - Email...
Which of the below is not used for Multi-factor authentication?
Alert!

Advertisement