Are You Safe Online? IT Security Awareness Quiz

13 Questions | Attempts: 289
Share

SettingsSettingsSettings
Are You Safe Online? IT SecurITy Awareness Quiz - Quiz

.


Questions and Answers
  • 1. 
    All PC's, laptops and workstations must be locked when left unattended and be secured with a password-protected screen saver that has an activation timeout. What is the maximum idle time before the activation timeout of the screen saver? 
    • A. 

      5 minutes

    • B. 

      2 minutes

    • C. 

      10 minutes

    • D. 

      8 minutes

  • 2. 
    User's are permitted to download and/or install freeware, shareware and public-domain software on a Company-provided computer.
    • A. 

      True

    • B. 

      False

  • 3. 
    Copyright laws are designed to secure the exclusive rights of the author of a "creative effort" to control who can make and distribute copies or who can make works derived from their original work. True or False? Pacer is not concerned with copyright laws in the IT Policy.
    • A. 

      True

    • B. 

      False

  • 4. 
    True or False? It is ok to store Company Data on your desktop, in My Documents or on another site such as Google Docs because it is more convenient for you.
    • A. 

      True

    • B. 

      False

  • 5. 
    True or False? It is ok to stream media on the Company-provided Network (Radio, Videos, YouTube, etc.).
    • A. 

      True

    • B. 

      False

  • 6. 
    Which of the below choices are examples of possible Social Engineering?
    • A. 

      A phone call from an unidentified caller asking the user for his or her password in order to install software

    • B. 

      An email that has misspelled words or grammatical errors

    • C. 

      An email that contains suspicious attachments or links to other websites

    • D. 

      All of the above

  • 7. 
    All Passwords must be at least 8 characters in length and contain 3 out of the 5 categories that are standard. Please select the 5 standard categories below:
    • A. 

      Include one or more non-alphanumeric characters (e.g. ! @ # $ %)

    • B. 

      Include one or more uppercase letters (A through Z)

    • C. 

      Include one or more base 10 digits (0 through 9)

    • D. 

      Include the user's first and last name

    • E. 

      Include one or more lowercase letters (a through z)

    • F. 

      Include any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase

  • 8. 
    You receive a suspicious email that contains a link to a website. What should you do?
    • A. 

      Forward the email to [email protected] and delete the email

    • B. 

      Click on the link and open it to see where it goes

    • C. 

      Go to Internet explorer and type the link in the browser to see what the website is

    • D. 

      Forward it to a colleague and have them open it first

  • 9. 
    True or False? The company owns all the data on its computing equipment and users have no expectation of privacy.
    • A. 

      True

    • B. 

      False

  • 10. 
    You receive a phone call and the caller asks you for your user id and password so he can install needed software on your computer. What should you do?
    • A. 

      Give them your password so they can gain access to your computer

    • B. 

      Do not give them any information and contact the Pacer Security Team immediately

    • C. 

      Ask the caller a series of questions to verify who they are

    • D. 

      Transfer the call to your Manager

  • 11. 
    Without thinking, you open an email that appears to be from a Vendor that you do business with. After opening the email, you realize that it is a phishing scam. What should you do?
    • A. 

      Not worry about it because you have anti-virus software installed on your PC

    • B. 

      Call the Pacer Help Desk and tell them about what happened so they can scan your PC for a possible virus

    • C. 

      Ask your Manager for advice

    • D. 

      Delete the email and not tell anyone what happened

  • 12. 
    Users may obtain a complete copy of the IT Policy Manual by:
    • A. 

      Visiting the UltiPro home page and looking under Information Technology

    • B. 

      Calling the Help Desk and having them email it to you

    • C. 

      Sending an email to [email protected]

    • D. 

      Asking HR to give you a copy

  • 13. 
    The security policy has been established to:
    • A. 

      Protect the Company's investment in it's IT Systems and Network

    • B. 

      Safeguard the information contained in these Systems

    • C. 

      Protect the good name of the Company

    • D. 

      All of the above

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.