Quiz: Security Awareness In Business

30 Questions | Total Attempts: 202

SettingsSettingsSettings
Please wait...
Business Management Quizzes & Trivia

Questions and Answers
  • 1. 
    What best describes phishing?
    • A. 

      In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

    • B. 

      Password cracking

    • C. 

      In the field of computer security, phishing is the criminally fraudulent process of a keylogger attempting to capture keyboard keystrokes of the user.

    • D. 

      This is a made up term

  • 2. 
    An 8 character password containing a mix of uppercase, lowercase and special characters can be cracked in under a day.  
    • A. 

      True

    • B. 

      False

  • 3. 
    It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.
    • A. 

      True

    • B. 

      False

  • 4. 
    Where should keep your password in case you forget it?
    • A. 

      Someplace easily seen from your computer

    • B. 

      Someplace out of sight like in a drawer or under your keyboard

    • C. 

      If you have to write down your password, it should be stored in a password keeper or vault.

  • 5. 
    Password challenge questions, used for resetting passwords on some Internet sites, should not be used if they contain publicly available information. 
    • A. 

      True

    • B. 

      False

  • 6. 
    It's OK to setup a rule to auto-forward all of your work e-mail to an external e-mail account like G-mail or Hotmail. 
    • A. 

      True

    • B. 

      False

  • 7. 
    It is not safe to e-mail business documents to your home computer to work on them.
    • A. 

      True

    • B. 

      False

  • 8. 
    If you are browsing the Internet and suddenly you get a prompt asking you to download a file and run it, what should you do?
    • A. 

      Download the file and run it.

    • B. 

      Cancel the download and close your browser.

    • C. 

      Download the file and e-mail it to a co-worker to see if it is legitimate.

  • 9. 
    It's OK to post personal information about yourself on Twitter or Facebook.
    • A. 

      True

    • B. 

      False

  • 10. 
    It's OK to click website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc).  
    • A. 

      True

    • B. 

      False

  • 11. 
    When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the url starts with 'https" to insure the transaction is protected by SSL encryption. 
    • A. 

      True

    • B. 

      False

  • 12. 
    Prior to leaving for the day, employees must secure all non-public information in a manner to which it cannot be retrieved by any unauthorized party, such as in a locked drawer or locked file cabinet.
    • A. 

      True

    • B. 

      False

  • 13. 
    Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?  
    • A. 

      Browsing

    • B. 

      Phishing

    • C. 

      Encoding

    • D. 

      Blogging

  • 14. 
    Which two (2) methods will reduce the chances that your password will be compromised? 
    • A. 

      Make your password lower case

    • B. 

      Change your password regularly

    • C. 

      Make your password a combination of uppercase, lower case and numbers

    • D. 

      Use personally identifiable information (such as birthdates, and telephone numbers)

  • 15. 
    Which of the following passwords is the most secure?
    • A. 

      MyDogFido

    • B. 

      Fido

    • C. 

      MdF1s-Go0d!

    • D. 

      Fid0399o

  • 16. 
    How often should passwords be changed?
    • A. 

      Every year

    • B. 

      Every 60 days

    • C. 

      Once a week

    • D. 

      Every 6 months

  • 17. 
    Your supervisor is very busy and asks you to log into the the server using his/her username and password to retrieve some reports. What should you do?
    • A. 

      It's your boss, so it's okay to do this.

    • B. 

      Ignore the request and hope he/she forgets.

    • C. 

      Decline the request and remind your supervisor that it is against company policy

  • 18. 
    You receive an email with an attachment from "I.T. Security." The email says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do? (select all that apply).
    • A. 

      Follow the instructions ASAP to avoid the virus.

    • B. 

      Open the email attachment to see what is says before proceeding

    • C. 

      Reply to the sender and say "take me off this list".

    • D. 

      Delete the message from the unknown source.

    • E. 

      Contact the IT Department and ask about the email before doing anything

  • 19. 
    Your sister sends you an email at work with a screen saver she says you will love. What should you do? (select all that apply).
    • A. 

      Download it onto your computer, since it's from a trusted source

    • B. 

      Forward the message to other friends to share it

    • C. 

      Call IT and ask them to help install it for you

    • D. 

      Delete the message

  • 20. 
    Which workstation security safeguards are YOU responsible for protecting? (Select all that apply).
    • A. 

      User I.D

    • B. 

      Password

    • C. 

      Logging off programs

    • D. 

      Locking up office or work areas (cabinets, doors, windows)

    • E. 

      All of the above

  • 21. 
    The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? (Select all that apply)
    • A. 

      Call your co-workers over so they can see.

    • B. 

      Disconnect your computer from the network.

    • C. 

      Unplug your mouse

    • D. 

      Tell your supervisor

    • E. 

      Turn your computer off.

    • F. 

      Run Anti-Virus

    • G. 

      All of the above.

  • 22. 
    What is the most effective way for an individual to ensure they are going to the intended website they receive as a link within an email that is from an unknown sender?
    • A. 

      Hover mouse over the link and if looks legit then click it

    • B. 

      Manually type in URL/use previously saved bookmark

    • C. 

      Google key search terms.

    • D. 

      If the link is blue, it is safe to click on it.

    • E. 

      There is no way to be certain that a link from an email will be safe.

  • 23. 
    A web browser pop-up appears on your personal computer offering an "anti-spyware product" What's your best course of action?
    • A. 

      Click on the link and provide your credit card information as the more protection prompted to install the better.

    • B. 

      Click on the link in the ad to learn more about the company its products before your decide.

    • C. 

      Close the window. If you want spyware protection software, or are unsure if you have up-to-date anti-spyware software, it is best to speak with the IT Specialist.

  • 24. 
    Which of the following should you not do with your password?
    • A. 

      Say it out loud as you are typing it in

    • B. 

      Email it to another team member

    • C. 

      Provide it to your supervisor

    • D. 

      All of the above

  • 25. 
    Most information security breaches occur due to what?
    • A. 

      Amazing External Hackers

    • B. 

      Poor Programming Techniques

    • C. 

      Internal Employees

    • D. 

      Bad Firewall Settings

Back to Top Back to top