1.
Software that denies you acces to your files unless you pay a fee is called ?
Correct Answer
D. Ransomware
Explanation
Ransomware is a type of malicious software that restricts access to a user's files or computer system until a ransom is paid. It encrypts the files or locks the computer, making them inaccessible to the user. The attacker then demands payment, usually in cryptocurrency, in exchange for providing the decryption key or unlocking the system. This form of cyberattack has become increasingly common and can cause significant damage to individuals and organizations by compromising their data and disrupting their operations.
2.
What is "malware" short for?
Correct Answer
B. Malicious Software
Explanation
The correct answer is "Malicious Software." Malware is a term used to describe any type of software that is designed to harm or exploit a computer system or its users. This can include viruses, worms, Trojans, ransomware, and spyware. The term "malicious" refers to the intent behind the software, indicating that it is created with the purpose of causing harm or damage. Therefore, "malware" is short for "malicious software."
3.
What is the type of software is used to repel hackers?
Correct Answer
C. Firewall
Explanation
A firewall is a type of software that is used to repel hackers. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access to a network by filtering out potentially harmful or malicious data packets. By analyzing the source, destination, and content of network traffic, a firewall can effectively block hackers and protect the network from cyber threats.
4.
To ensure that a website you are visiting is secure, you should use sites that have the prefix _______ ?
Correct Answer
D. Https://
Explanation
In its popular deployment on the internet, HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.[4] In practice, this provides a reasonable guarantee that one is communicating with precisely the web site that one intended to communicate with (as opposed to an imposter), as well as ensuring that the contents of communications between the user and site cannot be read or forged by any third party.
5.
Viruses that copy themselves across the internet are called _____________?
Correct Answer
C. Worms
Explanation
Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form of malware along with viruses and trojans. A person typically installs worms by inadvertently opening an email attachment or message that contains executable scripts.
Once installed on a computer, worms spontaneously generate additional email messages containing copies of the worm.
6.
What message characteristics indicate that you are the recipient of a Phishing attack? (Choose all that apply)
Correct Answer(s)
A. Email address
B. Greeting does not have a first and last name
C. Typing errors in the messages from businesses
D. Alarmist tone in the message
Explanation
Whilst generic greetings, spelling or grammar errors and alarmist tone of messages are more obvious characteristics of phishing scams, the email address or linked web addresses can also be a giveaway if the user is familiar with the correct addresses or extensions (ie. .net, .au etc.)
7.
How can a mail delivery error be a threat to a user?
Correct Answer
D. The message could contain malware attachments that cause problems if the user clicks on it.
Explanation
A mail delivery error can be a threat to a user because the message could contain malware attachments. If the user clicks on these attachments, it can cause problems such as infecting the user's device with viruses or other malicious software. This can lead to data breaches, loss of personal information, and potential harm to the user's device and privacy. It is important for users to be cautious and avoid clicking on suspicious attachments to protect themselves from such threats.
8.
Which traits do all malware – viruses, worms and tojans share in common? (Choose all that apply.)
Correct Answer(s)
A. They originate from outside the network
B. They use computer resources.
C. They enter computer systems, usually without the user’s knowledge or intent.
Explanation
All three options that are selected as the correct answer explain the common traits shared by malware. Malware, including viruses, worms, and trojans, originate from outside the network, use computer resources, and enter computer systems without the user's knowledge or intent. Additionally, the statement about hidden payloads damaging hard drives and corrupting data files is not mentioned in the question and therefore cannot be considered as a common trait for all malware.
9.
If you get an email or pop-up message that asks for personal or financial information you should:
Correct Answer
A. Delete it/not reply
Explanation
If you receive an email or pop-up message that asks for personal or financial information, you should delete it or not reply. This is because legitimate organizations will never ask for such sensitive information through email or pop-ups. Responding to these messages can put your personal and financial security at risk, as they are often phishing attempts or scams designed to steal your information. It is important to always exercise caution and not provide any personal or financial details unless you are certain of the legitimacy of the request.
10.
Computers may be infected by malware if they:
Correct Answer
D. All of the Above
Explanation
Computers may be infected by malware if they exhibit any of the mentioned symptoms. When a computer is slow to log on, it could indicate the presence of malware that is affecting the system's performance. Malfunctions or glitches can also be caused by malware, as it interferes with the normal functioning of the computer. Similarly, if a computer won't shut down or restart properly, it could be a sign of malware infection. Therefore, all of the mentioned symptoms can be indicators of a malware-infected computer.
11.
A friend sends sends an electronic Hallmark greeting card to your work email. You need to click on the attachment to see the card. What should you do?
Correct Answer
A. Delete the message
Explanation
It is important to delete the message because opening attachments from unknown or untrusted sources can pose a security risk. Even if the message appears to be from a friend, it is possible that their email account has been compromised and the attachment could contain malware or viruses. It is always better to err on the side of caution and avoid opening attachments that you were not expecting or that come from unfamiliar sources.
12.
The cursor on your computer screen starts moving on its own and clicking on things on your desktop. Which is the best answer??
Correct Answer(s)
B. Disconnect your computer
D. Tell your supervisor
Explanation
If the user knows how to safely disconnect a PC from power and the network that would be the most correct option, however if they are not confident to do so, alerting the supervisor would be the next best thing.
13.
Which are appropriate ways to deal with malware threats
Correct Answer(s)
A. Dont buy
B. Dont try
C. Dont reply
Explanation
The given answer suggests that appropriate ways to deal with malware threats are to not buy, not try, and not reply. This implies that one should avoid purchasing suspicious software or products, refrain from attempting to interact with or execute potentially harmful files or programs, and avoid responding to suspicious or phishing emails or messages. These actions can help prevent malware infections and protect computer systems from potential threats.
14.
What is SPAM?
Correct Answer(s)
B. An unwanted email
E. A type of canned meat
Explanation
Don't fret if you opted not to tick the canned meat - many of us have tried to put our days of SPAM sandwiches behind us...
15.
Which of the following is NOT a form of malware or scam?
Correct Answer
C. Beetle
Explanation
The given options consist of various forms of malware or scams, except for "Beetle". Beetle is not a recognized form of malware or scam, making it the correct answer.
16.
A Ukrainian investor emails you and asks you to provide bank details to safeguard $2.5M USD until the crisis in eastern Europe settles, at which time they will take back the money, leaving you with a small commisson. What do you do?
Correct Answer
C. Delete the email
Explanation
If you chose anything other than the correct answer, just wait there a second, I'm...going to make a quick phone call...
17.
We need to change passwords regularly and at least quarterly
Correct Answer
A. True
Explanation
Regularly changing passwords is a recommended security practice to protect sensitive information. By changing passwords at least quarterly, it reduces the risk of unauthorized access to accounts and helps prevent potential security breaches. Regularly updating passwords is especially important because it minimizes the chances of someone guessing or cracking the password. It also ensures that if a password is compromised, it will not remain valid for an extended period, limiting the potential damage that can be done. Therefore, the statement that we need to change passwords regularly and at least quarterly is true.
18.
What is a data breach
Correct Answer
A. A data breach occurs when personal information that an entity holds is subject to unauthorised access or disclosure, or is lost.
Explanation
A data breach refers to the unauthorized access, disclosure, or loss of personal information held by an entity. It involves a breach of security measures that protect sensitive data, resulting in potential harm or misuse of that information. This can include incidents where hackers gain unauthorized access to databases, employees accidentally disclose sensitive information, or when data is lost due to theft or negligence.
19.
Disclosure of an individual’s personal information to a scammer, as a result of inadequate identity verification procedures, would be considered a data breach.
Correct Answer
A. True
Explanation
If an individual's personal information is disclosed to a scammer due to inadequate identity verification procedures, it would be considered a data breach. A data breach refers to the unauthorized access or disclosure of sensitive or confidential information. In this case, the personal information of the individual has been accessed and disclosed to a scammer, which is a clear violation of privacy and security. Therefore, the statement "True" is the correct answer.
20.
A signifiant data breach is one that may result in harm, by law needs to be reported to
Correct Answer
D. All of the above
Explanation
A significant data breach is one that may result in harm to Dr. Deb Mills, the patient, or the authorities. Therefore, it is necessary to report such a breach to all of the above parties to ensure that appropriate actions can be taken to mitigate the harm caused and prevent further breaches in the future.
21.
A patient gives you a USB (thumb) drive and says his vaccination records are on it
Correct Answer
E. Both options B and D
Explanation
Both options B and D are correct because they both involve not loading the USB drive onto the computer. Option B states that the data security policy does not allow loading USB drives, while option D suggests looking up the patient's records on AIR, which implies that the USB drive is not being used. Therefore, both options B and D align with the statement that loading the USB drive is not allowed according to the data security policy.