Business Security Awareness Questions And Answers

30 Questions | Attempts: 517

SettingsSettingsSettings
Business Security Awareness Questions And Answers - Quiz

Do you know about business security awareness? To test your awareness and knowledge, try these business security awareness questions and answers. Here, we have included questions about awareness related to business security. If you are updated and have enough knowledge about the topic, it will be an easy quiz for you. Try this quiz, and get a perfect score on this quiz. All the best! Hopefully, this quiz will be an add-on to your knowledge. Do share it with other business people.


Questions and Answers
  • 1. 
    What best describes phishing?
    • A. 

      In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.

    • B. 

      Password cracking

    • C. 

      In the field of computer security, phishing is the criminally fraudulent process of a keylogger attempting to capture the keyboard keystrokes of the user.

    • D. 

      This is a made-up term.

  • 2. 
    An 8-character password containing a mix of uppercase, lowercase and special characters can be cracked in under a day.  
    • A. 

      True

    • B. 

      False

  • 3. 
    It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.
    • A. 

      True

    • B. 

      False

  • 4. 
    Where should you keep your password in case you forget it?
    • A. 

      Someplace easily seen from your computer

    • B. 

      Someplace out of sight, like in a drawer or under your keyboard

    • C. 

      If you have to write down your password, it should be stored in a password keeper or vault.

  • 5. 
    Password challenge questions, used for resetting passwords on some Internet sites, should not be used if they contain publicly available information. 
    • A. 

      True

    • B. 

      False

  • 6. 
    It's OK to set up a rule to auto-forward all of your work e-mail to an external e-mail account like G-mail or Hotmail. 
    • A. 

      True

    • B. 

      False

  • 7. 
    It is not safe to e-mail business documents to your home computer to work on them.
    • A. 

      True

    • B. 

      False

  • 8. 
    If you are browsing the Internet and suddenly you get a prompt asking you to download a file and run it, what should you do?
    • A. 

      Download the file and run it.

    • B. 

      Cancel the download and close your browser.

    • C. 

      Download the file and e-mail it to a co-worker to see if it is legitimate.

  • 9. 
    It's OK to post personal information about yourself on Twitter or Facebook.
    • A. 

      True

    • B. 

      False

  • 10. 
    It's OK to click website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc.).  
    • A. 

      True

    • B. 

      False

  • 11. 
    When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the URL starts with 'HTTPS" to ensure the transaction is protected by SSL encryption. 
    • A. 

      True

    • B. 

      False

  • 12. 
    Prior to leaving for the day, employees must secure all non-public information in a manner in which it cannot be retrieved by any unauthorized party, such as in a locked drawer or locked file cabinet.
    • A. 

      True

    • B. 

      False

  • 13. 
    Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?  
    • A. 

      Browsing

    • B. 

      Phishing

    • C. 

      Encoding

    • D. 

      Blogging

  • 14. 
    Which two (2) methods will reduce the chances that your password will be compromised? 
    • A. 

      Make your password lower-case

    • B. 

      Change your password regularly

    • C. 

      Make your password a combination of uppercase, lower case, and numbers

    • D. 

      Use personally identifiable information (such as birthdates and telephone numbers)

  • 15. 
    Which of the following passwords is the most secure?
    • A. 

      MyDogFido

    • B. 

      Fido

    • C. 

      MdF1s-Go0d!

    • D. 

      Fid0399o

  • 16. 
    How often should passwords be changed?
    • A. 

      Every year

    • B. 

      Every 60 days

    • C. 

      Once a week

    • D. 

      Every 6 months

  • 17. 
    Your supervisor is very busy and asks you to log into the server using his/her username and password to retrieve some reports. What should you do?
    • A. 

      It's your boss, so it's okay to do this.

    • B. 

      Ignore the request and hope he/she forgets.

    • C. 

      Decline the request and remind your supervisor that it is against company policy

  • 18. 
    You receive an email with an attachment from "I.T. Security." The email says that your computer has been infected with a virus, and you need to open the attachment and follow the directions to get rid of the virus. What should you do? (select all that apply).
    • A. 

      Follow the instructions ASAP to avoid the virus.

    • B. 

      Open the email attachment to see what it says before proceeding.

    • C. 

      Reply to the sender and say, "take me off this list."

    • D. 

      Delete the message from the unknown source.

    • E. 

      Contact the IT Department and ask about the email before doing anything

  • 19. 
    Your sister sends you an email at work with a screen saver she says you will love. What should you do? (select all that apply).
    • A. 

      Download it onto your computer since it's from a trusted source

    • B. 

      Forward the message to other friends to share it

    • C. 

      Call IT and ask them to help install it for you.

    • D. 

      Delete the message

  • 20. 
    Which workstation security safeguards are YOU responsible for protecting? (Select all that apply).
    • A. 

      User ID

    • B. 

      Password

    • C. 

      Logging off programs

    • D. 

      Locking up the office or work areas (cabinets, doors, windows)

    • E. 

      All of the above

  • 21. 
    The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? (Select all that apply)
    • A. 

      Call your co-workers over so they can see.

    • B. 

      Disconnect your computer from the network.

    • C. 

      Unplug your mouse

    • D. 

      Tell your supervisor

    • E. 

      Turn your computer off.

    • F. 

      Run Anti-Virus

    • G. 

      All of the above.

  • 22. 
    What is the most effective way for an individual to ensure they are going to the intended website they receive as a link within an email that is from an unknown sender?
    • A. 

      Hover the mouse over the link, and if looks legit, then click it.

    • B. 

      Manually type in URL/use previously saved bookmark.

    • C. 

      Google key search terms.

    • D. 

      If the link is blue, it is safe to click on it.

    • E. 

      There is no way to be certain that a link from an email will be safe.

  • 23. 
    A web browser pop-up appears on your personal computer offering an "anti-spyware product" What's your best course of action?
    • A. 

      Click on the link and provide your credit card information, as the more protection prompted to install, the better.

    • B. 

      Click on the link in the ad to learn more about the company and its products before you decide.

    • C. 

      Close the window. If you want spyware protection software or are unsure if you have up-to-date anti-spyware software, it is best to speak with the IT Specialist.

  • 24. 
    Which of the following should you not do with your password?
    • A. 

      Say it out loud as you are typing it in

    • B. 

      Email it to another team member

    • C. 

      Provide it to your supervisor

    • D. 

      All of the above

  • 25. 
    Most information security breaches occur due to what?
    • A. 

      Amazing External Hackers

    • B. 

      Poor Programming Techniques

    • C. 

      Internal Employees

    • D. 

      Bad Firewall Settings

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.