Dr Debs Staff Training On Malware And Data Security

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Deborah Mills
D
Deborah Mills
Community Contributor
Quizzes Created: 4 | Total Attempts: 10,821
| Attempts: 232 | Questions: 21
Please wait...
Question 1 / 21
0 %
0/100
Score 0/100
1. If you get an email or pop-up message that asks for personal or financial information you should:

Explanation

If you receive an email or pop-up message that asks for personal or financial information, you should delete it or not reply. This is because legitimate organizations will never ask for such sensitive information through email or pop-ups. Responding to these messages can put your personal and financial security at risk, as they are often phishing attempts or scams designed to steal your information. It is important to always exercise caution and not provide any personal or financial details unless you are certain of the legitimacy of the request.

Submit
Please wait...
About This Quiz
Security Training Quizzes & Trivia

Read the policies and then test your knowledge of malware avoidance

2. We need to change passwords regularly and at least quarterly

Explanation

Regularly changing passwords is a recommended security practice to protect sensitive information. By changing passwords at least quarterly, it reduces the risk of unauthorized access to accounts and helps prevent potential security breaches. Regularly updating passwords is especially important because it minimizes the chances of someone guessing or cracking the password. It also ensures that if a password is compromised, it will not remain valid for an extended period, limiting the potential damage that can be done. Therefore, the statement that we need to change passwords regularly and at least quarterly is true.

Submit
3. ​​​​​​Disclosure of an individual's personal information to a scammer, as a result of inadequate identity verification procedures, would be considered a data breach.

Explanation

If an individual's personal information is disclosed to a scammer due to inadequate identity verification procedures, it would be considered a data breach. A data breach refers to the unauthorized access or disclosure of sensitive or confidential information. In this case, the personal information of the individual has been accessed and disclosed to a scammer, which is a clear violation of privacy and security. Therefore, the statement "True" is the correct answer.

Submit
4. What is the type of software is used to repel hackers?

Explanation

A firewall is a type of software that is used to repel hackers. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access to a network by filtering out potentially harmful or malicious data packets. By analyzing the source, destination, and content of network traffic, a firewall can effectively block hackers and protect the network from cyber threats.

Submit
5. What is "malware" short for?

Explanation

The correct answer is "Malicious Software." Malware is a term used to describe any type of software that is designed to harm or exploit a computer system or its users. This can include viruses, worms, Trojans, ransomware, and spyware. The term "malicious" refers to the intent behind the software, indicating that it is created with the purpose of causing harm or damage. Therefore, "malware" is short for "malicious software."

Submit
6. Viruses that copy themselves across the internet are called _____________?

Explanation

Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form of malware along with viruses and trojans. A person typically installs worms by inadvertently opening an email attachment or message that contains executable scripts.
Once installed on a computer, worms spontaneously generate additional email messages containing copies of the worm.

Submit
7. Computers may be infected by malware if they:

Explanation

Computers may be infected by malware if they exhibit any of the mentioned symptoms. When a computer is slow to log on, it could indicate the presence of malware that is affecting the system's performance. Malfunctions or glitches can also be caused by malware, as it interferes with the normal functioning of the computer. Similarly, if a computer won't shut down or restart properly, it could be a sign of malware infection. Therefore, all of the mentioned symptoms can be indicators of a malware-infected computer.

Submit
8. A Ukrainian investor emails you and asks you to provide bank details to safeguard $2.5M USD until the crisis in eastern Europe settles, at which time they will take back the money, leaving you with a small commisson. What do you do?

Explanation

If you chose anything other than the correct answer, just wait there a second, I'm...going to make a quick phone call...

Submit
9. How can a mail delivery error be a threat to a user?

Explanation

A mail delivery error can be a threat to a user because the message could contain malware attachments. If the user clicks on these attachments, it can cause problems such as infecting the user's device with viruses or other malicious software. This can lead to data breaches, loss of personal information, and potential harm to the user's device and privacy. It is important for users to be cautious and avoid clicking on suspicious attachments to protect themselves from such threats.

Submit
10. To ensure that a website you are visiting is secure, you should use sites that have the prefix _______ ?

Explanation

In its popular deployment on the internet, HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.[4] In practice, this provides a reasonable guarantee that one is communicating with precisely the web site that one intended to communicate with (as opposed to an imposter), as well as ensuring that the contents of communications between the user and site cannot be read or forged by any third party.

Submit
11. Which of the following is NOT a form of malware or scam?

Explanation

The given options consist of various forms of malware or scams, except for "Beetle". Beetle is not a recognized form of malware or scam, making it the correct answer.

Submit
12. Software that denies you acces to your files unless you pay a fee is called ?

Explanation

Ransomware is a type of malicious software that restricts access to a user's files or computer system until a ransom is paid. It encrypts the files or locks the computer, making them inaccessible to the user. The attacker then demands payment, usually in cryptocurrency, in exchange for providing the decryption key or unlocking the system. This form of cyberattack has become increasingly common and can cause significant damage to individuals and organizations by compromising their data and disrupting their operations.

Submit
13. A signifiant data breach is one that may result in harm, by law needs to be reported to 

Explanation

A significant data breach is one that may result in harm to Dr. Deb Mills, the patient, or the authorities. Therefore, it is necessary to report such a breach to all of the above parties to ensure that appropriate actions can be taken to mitigate the harm caused and prevent further breaches in the future.

Submit
14. A friend sends sends an electronic Hallmark greeting card to your work email. You need to click on the attachment to see the card. What should you do?

Explanation

It is important to delete the message because opening attachments from unknown or untrusted sources can pose a security risk. Even if the message appears to be from a friend, it is possible that their email account has been compromised and the attachment could contain malware or viruses. It is always better to err on the side of caution and avoid opening attachments that you were not expecting or that come from unfamiliar sources.

Submit
15. Which are appropriate ways to deal with malware  threats

Explanation

The given answer suggests that appropriate ways to deal with malware threats are to not buy, not try, and not reply. This implies that one should avoid purchasing suspicious software or products, refrain from attempting to interact with or execute potentially harmful files or programs, and avoid responding to suspicious or phishing emails or messages. These actions can help prevent malware infections and protect computer systems from potential threats.

Submit
16. A patient gives you a USB (thumb) drive and says his vaccination records are on it 

Explanation

Both options B and D are correct because they both involve not loading the USB drive onto the computer. Option B states that the data security policy does not allow loading USB drives, while option D suggests looking up the patient's records on AIR, which implies that the USB drive is not being used. Therefore, both options B and D align with the statement that loading the USB drive is not allowed according to the data security policy.

Submit
17. What message characteristics indicate that you are the recipient of a Phishing attack? (Choose all that apply)

Explanation

Whilst generic greetings, spelling or grammar errors and alarmist tone of messages are more obvious characteristics of phishing scams, the email address or linked web addresses can also be a giveaway if the user is familiar with the correct addresses or extensions (ie. .net, .au etc.)

Submit
18. What is a data breach 

Explanation

A data breach refers to the unauthorized access, disclosure, or loss of personal information held by an entity. It involves a breach of security measures that protect sensitive data, resulting in potential harm or misuse of that information. This can include incidents where hackers gain unauthorized access to databases, employees accidentally disclose sensitive information, or when data is lost due to theft or negligence.

Submit
19. The cursor on your computer screen starts moving on its own and clicking on things on your desktop. Which is the best answer??

Explanation

If the user knows how to safely disconnect a PC from power and the network that would be the most correct option, however if they are not confident to do so, alerting the supervisor would be the next best thing.

Submit
20. What is SPAM?

Explanation

Don't fret if you opted not to tick the canned meat - many of us have tried to put our days of SPAM sandwiches behind us...

Submit
21. Which traits do all malware – viruses, worms and tojans share in common? (Choose all that apply.)

Explanation

All three options that are selected as the correct answer explain the common traits shared by malware. Malware, including viruses, worms, and trojans, originate from outside the network, use computer resources, and enter computer systems without the user's knowledge or intent. Additionally, the statement about hidden payloads damaging hard drives and corrupting data files is not mentioned in the question and therefore cannot be considered as a common trait for all malware.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 14, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 02, 2014
    Quiz Created by
    Deborah Mills
Cancel
  • All
    All (21)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
If you get an email or pop-up message that asks for personal or...
We need to change passwords regularly and at least quarterly
​​​​​​Disclosure of an individual's personal information...
What is the type of software is used to repel hackers?
What is "malware" short for?
Viruses that copy themselves across the internet are called...
Computers may be infected by malware if they:
A Ukrainian investor emails you and asks you to provide bank details...
How can a mail delivery error be a threat to a user?
To ensure that a website you are visiting is secure, you should use...
Which of the following is NOT a form of malware or scam?
Software that denies you acces to your files unless you pay a fee is...
A signifiant data breach is one that may result in harm, by law needs...
A friend sends sends an electronic Hallmark greeting card to your work...
Which are appropriate ways to deal with malware  threats
A patient gives you a USB (thumb) drive and says his vaccination...
What message characteristics indicate that you are the recipient of a...
What is a data breach 
The cursor on your computer screen starts moving on its own and...
What is SPAM?
Which traits do all malware – viruses, worms and tojans share in...
Alert!

Advertisement