Nextiraone Security Awareness Quiz

15 Questions | Total Attempts: 70

SettingsSettingsSettings
Please wait...
Security Awareness Quizzes & Trivia

This quiz will test your knowledge of Internet Security, using information taken from the Security Awareness training session


Questions and Answers
  • 1. 
    What is a BotNet ?
    • A. 

      A collection of semi-intelligent robotic systems that can be used to create malicious software

    • B. 

      A network of zombie hosts that provide an attacker with remote control of a compromised system

    • C. 

      A woven bag used to collect insects

    • D. 

      An infection of the lower colon

  • 2. 
    Hackers typically control a Botnet using what technology
    • A. 

      IRC

    • B. 

      Yahoo chat

    • C. 

      Black magic

    • D. 

      Msn network

  • 3. 
    This type of keylogger can not be detected by Anti-Virus or Anti-spyware
    • A. 

      Software keylogger

    • B. 

      Stealth Keylogger

    • C. 

      Covert Keylogger

    • D. 

      Hardware Keylogger

  • 4. 
    Which of the following urls may indicate a potential Phishing attack
    • A. 

      Http://www.demon.net/3l33thax0r/index.html

    • B. 

      Http://www.cisco.com.co.uk/support.asp

    • C. 

      Http://www.facebook.com

    • D. 

      Http://www.microsoft.co.uk/owned.txt

  • 5. 
    Which of the following are best practice recommendations for avoiding Phishing & Pharming attacks ? Pick 2
    • A. 

      When you have clicked on the link and landed on the new web page, check for spelling mistakes

    • B. 

      Submit your account details to the online form and await their security info page

    • C. 

      Enable firefox 3 Phishing filters

    • D. 

      Use common sense

  • 6. 
    Which of the following piece of Malware is identified as self propagating, standalone code
    • A. 

      Virus

    • B. 

      Trojan

    • C. 

      Worm

    • D. 

      Backdoor

  • 7. 
    Polymorphic malware can defeat AV because
    • A. 

      It changes it's file name periodically every 9 days

    • B. 

      It changes syntactical code within the binary so that the hash and pattern no longer match

    • C. 

      It blocks access to web scanning sites

    • D. 

      It prevents windows from booting cleanly

  • 8. 
    What is the average detection rate of Anti-Virus systems
    • A. 

      35%

    • B. 

      30%

    • C. 

      29%

    • D. 

      24%

  • 9. 
    What functionality does a RAT (Remote Access Trojan) provide to an attacker Click all that apply
    • A. 

      Keylogging

    • B. 

      Turn on the webcam

    • C. 

      Track your URL's

    • D. 

      Turn on a microphone in your TV

    • E. 

      Capture your screen

  • 10. 
    Name 3 ways an attacker has to crack your passwords
    • A. 

      Comparing your password to ones he has in a dictionary

    • B. 

      Guessing each different arrangement of upper & lower case letters, number and characters

    • C. 

      Using a distributed global cracking engine called zevious9

    • D. 

      Sniffing the password as it leaves your computer

  • 11. 
    Which of the following is considered best practice for the use of passwords
    • A. 

      Ensure the password is found within a dictionary

    • B. 

      Where the letters E or I are used, substitute these for a 3 and a 1

    • C. 

      The password must be at least 8 chracters

    • D. 

      Must be alpha numeric with special characters

  • 12. 
    How do you avoid being a victim of Social Engineering Name 2 ..
    • A. 

      Only click on the links which offer free security software or device scans

    • B. 

      Check the certificate of a website, and if it is only 2 or 3 weeks out of date, then add the site to you IE trusted zone

    • C. 

      Hover over a link with your mouse and see if you can identify the destination of the hyperlink

    • D. 

      Never pass your account details over the phone to any organisation

  • 13. 
    What are 2 concerns of Social Networking sites
    • A. 

      There is no means to accurately identify a friend is who they say they are

    • B. 

      Images and applications that are posted to Social Networking sites are created by unknown entities

    • C. 

      Your partner can see when you have been emailing your old girlfriend from school and be waiting at your secret rendezvous when you arrive

    • D. 

      The privacy measures of Social Networking sites have proven to be insufficient even when configured correctly

  • 14. 
    Which of the following are weaknesses of IP based voice communications - i.e. Unified Communications Select all that apply
    • A. 

      The audio from your call can be captured and replayed without your knowledge

    • B. 

      Features of the phone can be turned on remotely

    • C. 

      Poor password & PIN security mean that anyone can access your message store

    • D. 

      The plastic stand on a Cisco 7960 can snap off if you try to force the device open without pressing the button

  • 15. 
    NextiraOne has a series of security policies that define acceptable use of the companies network and computer systems - where are these documents located
    • A. 

      In an off site safe located in Doncaster

    • B. 

      Held by the Inland revenue, only to be disclosed in the event of malpractice

    • C. 

      On the company intranet, in the HR folder

    • D. 

      On a hacking warez site because the company was owned by Korean Hacktivists