Read the policies and then test your knowledge of malware avoidance
True
False
Rate this question:
True
False
Rate this question:
Mallaible Software
Malicious Software
Malfuction Software
Magic Software
Rate this question:
Waterwall
Airwall
Firewall
Earthwall
Wonderwall
Rate this question:
Chimeric
Stealthy
Worms
Predatory
Rate this question:
Are slow to log on
Malfunction or glitch
Won't shut down or restart
All of the Above
Rate this question:
Immediately call Vladimir Putin - that money rightfully belongs to Russia!
Immediately call Barack Obama - that money rightfully belongs to America!
Delete the email
Provide your bank details and silently pray to your chosen deity, thanking them for turning your luck around.
Rate this question:
The message may be delayed.
The email box could become too full
Just another irritation in a busy day
The message could contain malware attachments that cause problems if the user clicks on it.
Rate this question:
Smtp://
Http://
Tftp://
Https://
Rate this question:
Virus
Worm
Beetle
Trojan horse
Rogue dialler
Whaling and spear phishing
Rate this question:
Malware
Spyware
Adware
Ransomware
Rate this question:
Dr Deb Mills
The patient
The Authorities
All of the above
Rate this question:
Delete the message
Forward to your personal email to open later
Open attachment as it is from a friend
Rate this question:
Dont buy
Dont try
Dont reply
Dont use computers... life was simpler back when - Apply to join the Amish
Rate this question:
You say thanks and load it on the computer to have a look
You say - oh sorry but our data security policy says we are not allowed to load USB drives to the system
You drop it on the floor and spray it with a fire extinguisher
You sigh sympathetically and say you will look up his records on AIR
Both options B and D
Rate this question:
Email address
Greeting does not have a first and last name
Typing errors in the messages from businesses
Alarmist tone in the message
Rate this question:
A data breach occurs when personal information that an entity holds is subject to unauthorised access or disclosure, or is lost.
A data breach occurs when any information that an entity holds is subject to unauthorised access
A data breach is when the photocopier is spitting out too many pages
A data breach occurs when money is stolen on the way to the bank.
Rate this question:
Call your co-workers to see
Disconnect your computer
Unplug your mouse
Tell your supervisor
Rate this question:
A virus
An unwanted email
Spyware
A fatal error
A type of canned meat
Rate this question:
They originate from outside the network
They use computer resources.
They enter computer systems, usually without the user’s knowledge or intent.
They release hidden payloads designed to damage hard drives and corrupt data files
Rate this question:
Quiz Review Timeline (Updated): Mar 14, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.