CyberSecurity Awareness Test Quiz!

15 Questions | Total Attempts: 274

SettingsSettingsSettings
Cybersecurity Awareness Test Quiz! - Quiz

.


Questions and Answers
  • 1. 
    Which of the below is not used for Multi-factor authentication?
    • A. 

      Something you do

    • B. 

      Something you have

    • C. 

      Something you know

    • D. 

      Something you are

  • 2. 
    Which of the below is not a best practice of choosing Strong Passwords?
    • A. 

      Make it impersonal

    • B. 

      Make it long

    • C. 

      Make it diverse

    • D. 

      Make it numeric

  • 3. 
    Which of the below is not a part of the Clean Desk Policy?
    • A. 

      Tidy your desk

    • B. 

      Lock your screen

    • C. 

      Hiding passwords below keyboard

    • D. 

      Put away sensitive documents

  • 4. 
    Which of the below is not a part of the appropriate use - Laptop Security Policy?
    • A. 

      Return your laptop when you resign

    • B. 

      Prevent damage to loss/theft of Laptop

    • C. 

      Report loss of Laptop to HR & IT Department

    • D. 

      Install any software without approval

  • 5. 
    Which of the below is not a part of the appropriate use - Email Security Policy?
    • A. 

      Don't access your personal email account

    • B. 

      Use official Email ID for personal purposes

    • C. 

      Don't send spam

    • D. 

      Don't do Email Forging

  • 6. 
    When receiving a Email from a unknown contact that has an attachment, you should:
    • A. 

      Open the attachment to view its contents

    • B. 

      Delete the mail

    • C. 

      Forward the email to your co-workers to allow them to open the attachment first

    • D. 

      Forward the email to your personal email account so you can open it at home

  • 7. 
    The mouse on your computer begins moving across the screen and clicking on things without you even touching it. What will you do?
    • A. 

      Unplug your mouse

    • B. 

      Disconnect your computer from the network & call the IT Support Desk

    • C. 

      Turn your computer OFF

    • D. 

      Call your colleagues over so they can see this miracle!

  • 8. 
    Which of the following is an Online Malware Scanning Service for suspicious files and URLs?
    • A. 

      Www.serials.ws

    • B. 

      Www.crackme.us

    • C. 

      Www.totalvirus.com

    • D. 

      Www.virustotal.com

  • 9. 
    When is the best time to lie to your information security auditor or officer?
    • A. 

      If you want to cover up your best friend’s faults or mistakes

    • B. 

      If the security auditor is not your friend and cannot be trusted

    • C. 

      If it impacts the termination of the key people in your organization

    • D. 

      None of the above

  • 10. 
    You went to Starbucks/CCD to buy a coffee and then while waiting for your order, you decided to connect to their Free WIIFI. While browsing your Google Mail (https://mail.google.com/), the page redirects to http://www.googlemail.anish.net. What do you think should you do?
    • A. 

      Login to where Google Mail has redirected, it’s just one of Google’s web sites – not suspicious at all.

    • B. 

      Disconnect to Starbucks/CCD WIFI network.

    • C. 

      Ask the person sitting next to you if his Google Mail also redirects to http://www.googlemail.anish.net.

    • D. 

      Find the Wireless Access Point (Wi-Fi device) and reboot it

  • 11. 
    Which of the following could help you mitigate malwares and viruses from infecting your PC?
    • A. 

      Download software from trusted sources only

    • B. 

      Install an antivirus program and enable firewall

    • C. 

      Always update your PC when prompted for system updates

    • D. 

      Monitor and analyze the network traffic of your PC

  • 12. 
    You have a hard copy of a design document that you want to dispose of. What would you do?
    • A. 

      Throw it in any dustbin

    • B. 

      Shred it using a shredder

    • C. 

      Give it to the office boy to reuse it for other purposes

    • D. 

      Be environment friendly and reuse it for writing

  • 13. 
    What is social engineering?
    • A. 

      A group planning for a social activity in the organization

    • B. 

      Creating a situation wherein a third party gains confidential information from you

    • C. 

      The organization planning an activity for welfare of the neighbourhood

    • D. 

      None of the above

  • 14. 
    How can you report a security incident?
    • A. 

      Email

    • B. 

      Phone

    • C. 

      Any of the above

    • D. 

      None of the above

  • 15. 
    You see a non familiar face in the access controlled areas of our office, the person does not have the a ITZCASH ID/Visitor/Vendor tag with him. What would you do?
    • A. 

      None of my business, let some body else take care of it

    • B. 

      Ask the person to leave the facility

    • C. 

      Escort the person to the security and raise a security incident

    • D. 

      Scream and yell till the person leaves

Back to Top Back to top