Read the policies and then test your knowledge of malware avoidance
Malware
Spyware
Adware
Ransomware
Mallaible Software
Malicious Software
Malfuction Software
Magic Software
Waterwall
Airwall
Firewall
Earthwall
Wonderwall
Smtp://
Http://
Tftp://
Https://
Chimeric
Stealthy
Worms
Predatory
Email address
Greeting does not have a first and last name
Typing errors in the messages from businesses
Alarmist tone in the message
The message may be delayed.
The email box could become too full
Just another irritation in a busy day
The message could contain malware attachments that cause problems if the user clicks on it.
They originate from outside the network
They use computer resources.
They enter computer systems, usually without the user’s knowledge or intent.
They release hidden payloads designed to damage hard drives and corrupt data files
Delete it/not reply
Click it
Fill it out
Send it to your friends
Are slow to log on
Malfunction or glitch
Won't shut down or restart
All of the Above
Delete the message
Forward to your personal email to open later
Open attachment as it is from a friend
Call your co-workers to see
Disconnect your computer
Unplug your mouse
Tell your supervisor
Dont buy
Dont try
Dont reply
Dont use computers... life was simpler back when - Apply to join the Amish
A virus
An unwanted email
Spyware
A fatal error
A type of canned meat
Virus
Worm
Beetle
Trojan horse
Rogue dialler
Whaling and spear phishing
Immediately call Vladimir Putin - that money rightfully belongs to Russia!
Immediately call Barack Obama - that money rightfully belongs to America!
Delete the email
Provide your bank details and silently pray to your chosen deity, thanking them for turning your luck around.
True
False
A data breach occurs when personal information that an entity holds is subject to unauthorised access or disclosure, or is lost.
A data breach occurs when any information that an entity holds is subject to unauthorised access
A data breach is when the photocopier is spitting out too many pages
A data breach occurs when money is stolen on the way to the bank.
True
False
Dr Deb Mills
The patient
The Authorities
All of the above
You say thanks and load it on the computer to have a look
You say - oh sorry but our data security policy says we are not allowed to load USB drives to the system
You drop it on the floor and spray it with a fire extinguisher
You sigh sympathetically and say you will look up his records on AIR
Both options B and D