Dr Debs Staff Training On Malware And Data Security

21 Questions | Attempts: 218
Share

SettingsSettingsSettings
Dr Debs Staff Training On Malware And Data Security - Quiz

Read the policies and then test your knowledge of malware avoidance


Questions and Answers
  • 1. 
    Software that denies you acces to your files unless you pay a fee is called ?
    • A. 

      Malware

    • B. 

      Spyware

    • C. 

      Adware

    • D. 

      Ransomware

  • 2. 
    What is "malware" short for?
    • A. 

      Mallaible Software

    • B. 

      Malicious Software

    • C. 

      Malfuction Software

    • D. 

      Magic Software

  • 3. 
    What is the type of software is used to repel hackers?
    • A. 

      Waterwall

    • B. 

      Airwall

    • C. 

      Firewall

    • D. 

      Earthwall

    • E. 

      Wonderwall

  • 4. 
    To ensure that a website you are visiting is secure, you should use sites that have the prefix _______ ?
    • A. 

      Smtp://

    • B. 

      Http://

    • C. 

      Tftp://

    • D. 

      Https://

  • 5. 
    Viruses that copy themselves across the internet are called _____________?
    • A. 

      Chimeric

    • B. 

      Stealthy

    • C. 

      Worms

    • D. 

      Predatory

  • 6. 
    What message characteristics indicate that you are the recipient of a Phishing attack? (Choose all that apply)
    • A. 

      Email address

    • B. 

      Greeting does not have a first and last name

    • C. 

      Typing errors in the messages from businesses

    • D. 

      Alarmist tone in the message

  • 7. 
    How can a mail delivery error be a threat to a user?
    • A. 

      The message may be delayed.

    • B. 

      The email box could become too full

    • C. 

      Just another irritation in a busy day

    • D. 

      The message could contain malware attachments that cause problems if the user clicks on it.

  • 8. 
    Which traits do all malware – viruses, worms and tojans share in common? (Choose all that apply.)
    • A. 

      They originate from outside the network

    • B. 

      They use computer resources.

    • C. 

      They enter computer systems, usually without the user’s knowledge or intent.

    • D. 

      They release hidden payloads designed to damage hard drives and corrupt data files

  • 9. 
    If you get an email or pop-up message that asks for personal or financial information you should:
    • A. 

      Delete it/not reply

    • B. 

      Click it

    • C. 

      Fill it out

    • D. 

      Send it to your friends

  • 10. 
    Computers may be infected by malware if they:
    • A. 

      Are slow to log on

    • B. 

      Malfunction or glitch

    • C. 

      Won't shut down or restart

    • D. 

      All of the Above

  • 11. 
    A friend sends sends an electronic Hallmark greeting card to your work email. You need to click on the attachment to see the card. What should you do?
    • A. 

      Delete the message

    • B. 

      Forward to your personal email to open later

    • C. 

      Open attachment as it is from a friend

  • 12. 
    The cursor on your computer screen starts moving on its own and clicking on things on your desktop. Which is the best answer??
    • A. 

      Call your co-workers to see

    • B. 

      Disconnect your computer

    • C. 

      Unplug your mouse

    • D. 

      Tell your supervisor

  • 13. 
    Which are appropriate ways to deal with malware  threats
    • A. 

      Dont buy

    • B. 

      Dont try

    • C. 

      Dont reply

    • D. 

      Dont use computers... life was simpler back when - Apply to join the Amish

  • 14. 
    What is SPAM?
    • A. 

      A virus

    • B. 

      An unwanted email

    • C. 

      Spyware

    • D. 

      A fatal error

    • E. 

      A type of canned meat

  • 15. 
    Which of the following is NOT a form of malware or scam?
    • A. 

      Virus

    • B. 

      Worm

    • C. 

      Beetle

    • D. 

      Trojan horse

    • E. 

      Rogue dialler

    • F. 

      Whaling and spear phishing

  • 16. 
    A Ukrainian investor emails you and asks you to provide bank details to safeguard $2.5M USD until the crisis in eastern Europe settles, at which time they will take back the money, leaving you with a small commisson. What do you do?
    • A. 

      Immediately call Vladimir Putin - that money rightfully belongs to Russia!

    • B. 

      Immediately call Barack Obama - that money rightfully belongs to America!

    • C. 

      Delete the email

    • D. 

      Provide your bank details and silently pray to your chosen deity, thanking them for turning your luck around.

  • 17. 
    We need to change passwords regularly and at least quarterly
    • A. 

      True

    • B. 

      False

  • 18. 
    What is a data breach 
    • A. 

      A data breach occurs when personal information that an entity holds is subject to unauthorised access or disclosure, or is lost.

    • B. 

      A data breach occurs when any information that an entity holds is subject to unauthorised access 

    • C. 

      A data breach is when the photocopier is spitting out too many pages 

    • D. 

      A data breach occurs when money is stolen on the way to the bank.

  • 19. 
    ​​​​​​Disclosure of an individual’s personal information to a scammer, as a result of inadequate identity verification procedures, would be considered a data breach.
    • A. 

      True

    • B. 

      False

  • 20. 
    A signifiant data breach is one that may result in harm, by law needs to be reported to 
    • A. 

      Dr Deb Mills

    • B. 

      The patient 

    • C. 

      The Authorities 

    • D. 

      All of the above 

  • 21. 
    A patient gives you a USB (thumb) drive and says his vaccination records are on it 
    • A. 

      You say thanks and load it on the computer to have a look 

    • B. 

      You say - oh sorry but our data security policy says we are not allowed to load USB drives to the system

    • C. 

      You drop it on the floor and spray it with a fire extinguisher 

    • D. 

      You sigh sympathetically and say you will look up his records  on AIR 

    • E. 

      Both options B and D

Back to Top Back to top