Dr Debs Staff Training On Malware And Data Security

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Deborah Mills
D
Deborah Mills
Community Contributor
Quizzes Created: 4 | Total Attempts: 9,764
Questions: 21 | Attempts: 228

SettingsSettingsSettings
Dr Debs Staff Training On Malware And Data Security - Quiz

Read the policies and then test your knowledge of malware avoidance


Questions and Answers
  • 1. 

    Software that denies you acces to your files unless you pay a fee is called ?

    • A.

      Malware

    • B.

      Spyware

    • C.

      Adware

    • D.

      Ransomware

    Correct Answer
    D. Ransomware
    Explanation
    Ransomware is a type of malicious software that restricts access to a user's files or computer system until a ransom is paid. It encrypts the files or locks the computer, making them inaccessible to the user. The attacker then demands payment, usually in cryptocurrency, in exchange for providing the decryption key or unlocking the system. This form of cyberattack has become increasingly common and can cause significant damage to individuals and organizations by compromising their data and disrupting their operations.

    Rate this question:

  • 2. 

    What is "malware" short for?

    • A.

      Mallaible Software

    • B.

      Malicious Software

    • C.

      Malfuction Software

    • D.

      Magic Software

    Correct Answer
    B. Malicious Software
    Explanation
    The correct answer is "Malicious Software." Malware is a term used to describe any type of software that is designed to harm or exploit a computer system or its users. This can include viruses, worms, Trojans, ransomware, and spyware. The term "malicious" refers to the intent behind the software, indicating that it is created with the purpose of causing harm or damage. Therefore, "malware" is short for "malicious software."

    Rate this question:

  • 3. 

    What is the type of software is used to repel hackers?

    • A.

      Waterwall

    • B.

      Airwall

    • C.

      Firewall

    • D.

      Earthwall

    • E.

      Wonderwall

    Correct Answer
    C. Firewall
    Explanation
    A firewall is a type of software that is used to repel hackers. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access to a network by filtering out potentially harmful or malicious data packets. By analyzing the source, destination, and content of network traffic, a firewall can effectively block hackers and protect the network from cyber threats.

    Rate this question:

  • 4. 

    To ensure that a website you are visiting is secure, you should use sites that have the prefix _______ ?

    • A.

      Smtp://

    • B.

      Http://

    • C.

      Tftp://

    • D.

      Https://

    Correct Answer
    D. Https://
    Explanation
    In its popular deployment on the internet, HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.[4] In practice, this provides a reasonable guarantee that one is communicating with precisely the web site that one intended to communicate with (as opposed to an imposter), as well as ensuring that the contents of communications between the user and site cannot be read or forged by any third party.

    Rate this question:

  • 5. 

    Viruses that copy themselves across the internet are called _____________?

    • A.

      Chimeric

    • B.

      Stealthy

    • C.

      Worms

    • D.

      Predatory

    Correct Answer
    C. Worms
    Explanation
    Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form of malware along with viruses and trojans. A person typically installs worms by inadvertently opening an email attachment or message that contains executable scripts.
    Once installed on a computer, worms spontaneously generate additional email messages containing copies of the worm.

    Rate this question:

  • 6. 

    What message characteristics indicate that you are the recipient of a Phishing attack? (Choose all that apply)

    • A.

      Email address

    • B.

      Greeting does not have a first and last name

    • C.

      Typing errors in the messages from businesses

    • D.

      Alarmist tone in the message

    Correct Answer(s)
    A. Email address
    B. Greeting does not have a first and last name
    C. Typing errors in the messages from businesses
    D. Alarmist tone in the message
    Explanation
    Whilst generic greetings, spelling or grammar errors and alarmist tone of messages are more obvious characteristics of phishing scams, the email address or linked web addresses can also be a giveaway if the user is familiar with the correct addresses or extensions (ie. .net, .au etc.)

    Rate this question:

  • 7. 

    How can a mail delivery error be a threat to a user?

    • A.

      The message may be delayed.

    • B.

      The email box could become too full

    • C.

      Just another irritation in a busy day

    • D.

      The message could contain malware attachments that cause problems if the user clicks on it.

    Correct Answer
    D. The message could contain malware attachments that cause problems if the user clicks on it.
    Explanation
    A mail delivery error can be a threat to a user because the message could contain malware attachments. If the user clicks on these attachments, it can cause problems such as infecting the user's device with viruses or other malicious software. This can lead to data breaches, loss of personal information, and potential harm to the user's device and privacy. It is important for users to be cautious and avoid clicking on suspicious attachments to protect themselves from such threats.

    Rate this question:

  • 8. 

    Which traits do all malware – viruses, worms and tojans share in common? (Choose all that apply.)

    • A.

      They originate from outside the network

    • B.

      They use computer resources.

    • C.

      They enter computer systems, usually without the user’s knowledge or intent.

    • D.

      They release hidden payloads designed to damage hard drives and corrupt data files

    Correct Answer(s)
    A. They originate from outside the network
    B. They use computer resources.
    C. They enter computer systems, usually without the user’s knowledge or intent.
    Explanation
    All three options that are selected as the correct answer explain the common traits shared by malware. Malware, including viruses, worms, and trojans, originate from outside the network, use computer resources, and enter computer systems without the user's knowledge or intent. Additionally, the statement about hidden payloads damaging hard drives and corrupting data files is not mentioned in the question and therefore cannot be considered as a common trait for all malware.

    Rate this question:

  • 9. 

    If you get an email or pop-up message that asks for personal or financial information you should:

    • A.

      Delete it/not reply

    • B.

      Click it

    • C.

      Fill it out

    • D.

      Send it to your friends

    Correct Answer
    A. Delete it/not reply
    Explanation
    If you receive an email or pop-up message that asks for personal or financial information, you should delete it or not reply. This is because legitimate organizations will never ask for such sensitive information through email or pop-ups. Responding to these messages can put your personal and financial security at risk, as they are often phishing attempts or scams designed to steal your information. It is important to always exercise caution and not provide any personal or financial details unless you are certain of the legitimacy of the request.

    Rate this question:

  • 10. 

    Computers may be infected by malware if they:

    • A.

      Are slow to log on

    • B.

      Malfunction or glitch

    • C.

      Won't shut down or restart

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    Computers may be infected by malware if they exhibit any of the mentioned symptoms. When a computer is slow to log on, it could indicate the presence of malware that is affecting the system's performance. Malfunctions or glitches can also be caused by malware, as it interferes with the normal functioning of the computer. Similarly, if a computer won't shut down or restart properly, it could be a sign of malware infection. Therefore, all of the mentioned symptoms can be indicators of a malware-infected computer.

    Rate this question:

  • 11. 

    A friend sends sends an electronic Hallmark greeting card to your work email. You need to click on the attachment to see the card. What should you do?

    • A.

      Delete the message

    • B.

      Forward to your personal email to open later

    • C.

      Open attachment as it is from a friend

    Correct Answer
    A. Delete the message
    Explanation
    It is important to delete the message because opening attachments from unknown or untrusted sources can pose a security risk. Even if the message appears to be from a friend, it is possible that their email account has been compromised and the attachment could contain malware or viruses. It is always better to err on the side of caution and avoid opening attachments that you were not expecting or that come from unfamiliar sources.

    Rate this question:

  • 12. 

    The cursor on your computer screen starts moving on its own and clicking on things on your desktop. Which is the best answer??

    • A.

      Call your co-workers to see

    • B.

      Disconnect your computer

    • C.

      Unplug your mouse

    • D.

      Tell your supervisor

    Correct Answer(s)
    B. Disconnect your computer
    D. Tell your supervisor
    Explanation
    If the user knows how to safely disconnect a PC from power and the network that would be the most correct option, however if they are not confident to do so, alerting the supervisor would be the next best thing.

    Rate this question:

  • 13. 

    Which are appropriate ways to deal with malware  threats

    • A.

      Dont buy

    • B.

      Dont try

    • C.

      Dont reply

    • D.

      Dont use computers... life was simpler back when - Apply to join the Amish

    Correct Answer(s)
    A. Dont buy
    B. Dont try
    C. Dont reply
    Explanation
    The given answer suggests that appropriate ways to deal with malware threats are to not buy, not try, and not reply. This implies that one should avoid purchasing suspicious software or products, refrain from attempting to interact with or execute potentially harmful files or programs, and avoid responding to suspicious or phishing emails or messages. These actions can help prevent malware infections and protect computer systems from potential threats.

    Rate this question:

  • 14. 

    What is SPAM?

    • A.

      A virus

    • B.

      An unwanted email

    • C.

      Spyware

    • D.

      A fatal error

    • E.

      A type of canned meat

    Correct Answer(s)
    B. An unwanted email
    E. A type of canned meat
    Explanation
    Don't fret if you opted not to tick the canned meat - many of us have tried to put our days of SPAM sandwiches behind us...

    Rate this question:

  • 15. 

    Which of the following is NOT a form of malware or scam?

    • A.

      Virus

    • B.

      Worm

    • C.

      Beetle

    • D.

      Trojan horse

    • E.

      Rogue dialler

    • F.

      Whaling and spear phishing

    Correct Answer
    C. Beetle
    Explanation
    The given options consist of various forms of malware or scams, except for "Beetle". Beetle is not a recognized form of malware or scam, making it the correct answer.

    Rate this question:

  • 16. 

    A Ukrainian investor emails you and asks you to provide bank details to safeguard $2.5M USD until the crisis in eastern Europe settles, at which time they will take back the money, leaving you with a small commisson. What do you do?

    • A.

      Immediately call Vladimir Putin - that money rightfully belongs to Russia!

    • B.

      Immediately call Barack Obama - that money rightfully belongs to America!

    • C.

      Delete the email

    • D.

      Provide your bank details and silently pray to your chosen deity, thanking them for turning your luck around.

    Correct Answer
    C. Delete the email
    Explanation
    If you chose anything other than the correct answer, just wait there a second, I'm...going to make a quick phone call...

    Rate this question:

  • 17. 

    We need to change passwords regularly and at least quarterly

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Regularly changing passwords is a recommended security practice to protect sensitive information. By changing passwords at least quarterly, it reduces the risk of unauthorized access to accounts and helps prevent potential security breaches. Regularly updating passwords is especially important because it minimizes the chances of someone guessing or cracking the password. It also ensures that if a password is compromised, it will not remain valid for an extended period, limiting the potential damage that can be done. Therefore, the statement that we need to change passwords regularly and at least quarterly is true.

    Rate this question:

  • 18. 

    What is a data breach 

    • A.

      A data breach occurs when personal information that an entity holds is subject to unauthorised access or disclosure, or is lost.

    • B.

      A data breach occurs when any information that an entity holds is subject to unauthorised access 

    • C.

      A data breach is when the photocopier is spitting out too many pages 

    • D.

      A data breach occurs when money is stolen on the way to the bank.

    Correct Answer
    A. A data breach occurs when personal information that an entity holds is subject to unauthorised access or disclosure, or is lost.
    Explanation
    A data breach refers to the unauthorized access, disclosure, or loss of personal information held by an entity. It involves a breach of security measures that protect sensitive data, resulting in potential harm or misuse of that information. This can include incidents where hackers gain unauthorized access to databases, employees accidentally disclose sensitive information, or when data is lost due to theft or negligence.

    Rate this question:

  • 19. 

    ​​​​​​Disclosure of an individual’s personal information to a scammer, as a result of inadequate identity verification procedures, would be considered a data breach.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    If an individual's personal information is disclosed to a scammer due to inadequate identity verification procedures, it would be considered a data breach. A data breach refers to the unauthorized access or disclosure of sensitive or confidential information. In this case, the personal information of the individual has been accessed and disclosed to a scammer, which is a clear violation of privacy and security. Therefore, the statement "True" is the correct answer.

    Rate this question:

  • 20. 

    A signifiant data breach is one that may result in harm, by law needs to be reported to 

    • A.

      Dr Deb Mills

    • B.

      The patient 

    • C.

      The Authorities 

    • D.

      All of the above 

    Correct Answer
    D. All of the above 
    Explanation
    A significant data breach is one that may result in harm to Dr. Deb Mills, the patient, or the authorities. Therefore, it is necessary to report such a breach to all of the above parties to ensure that appropriate actions can be taken to mitigate the harm caused and prevent further breaches in the future.

    Rate this question:

  • 21. 

    A patient gives you a USB (thumb) drive and says his vaccination records are on it 

    • A.

      You say thanks and load it on the computer to have a look 

    • B.

      You say - oh sorry but our data security policy says we are not allowed to load USB drives to the system

    • C.

      You drop it on the floor and spray it with a fire extinguisher 

    • D.

      You sigh sympathetically and say you will look up his records  on AIR 

    • E.

      Both options B and D

    Correct Answer
    E. Both options B and D
    Explanation
    Both options B and D are correct because they both involve not loading the USB drive onto the computer. Option B states that the data security policy does not allow loading USB drives, while option D suggests looking up the patient's records on AIR, which implies that the USB drive is not being used. Therefore, both options B and D align with the statement that loading the USB drive is not allowed according to the data security policy.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 02, 2014
    Quiz Created by
    Deborah Mills
Back to Top Back to top
Advertisement