Are You Safe Online? IT Security Awareness Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Aperry1
A
Aperry1
Community Contributor
Quizzes Created: 1 | Total Attempts: 323
| Attempts: 323 | Questions: 13
Please wait...
Question 1 / 13
0 %
0/100
Score 0/100
1. True or False? It is ok to store Company Data on your desktop, in My Documents or on another site such as Google Docs because it is more convenient for you.

Explanation

Storing company data on personal desktops, in My Documents, or on external sites like Google Docs is not recommended because it poses security risks. Company data should be stored on secure servers or cloud platforms that are specifically designed for data storage and protection. Storing data in these unauthorized locations increases the chances of data breaches, unauthorized access, and loss of sensitive information. It is important to follow company policies and guidelines to ensure data security and compliance.

Submit
Please wait...
About This Quiz
Are You Safe Online? IT SecurITy Awareness Quiz - Quiz

The 'Are you Safe Online? IT Security Awareness Quiz' assesses knowledge on securing devices, copyright laws, software installation policies, and data storage practices to ensure compliance and protect... see morecompany resources. see less

2. You receive a phone call and the caller asks you for your user id and password so he can install needed software on your computer. What should you do?

Explanation

The correct answer is to not give them any information and contact the Pacer Security Team immediately. This is because it is a common tactic used by scammers to gain unauthorized access to personal information and computers. Providing them with your user id and password can lead to identity theft, unauthorized access to personal data, and potential financial loss. It is important to always be cautious and verify the identity of callers before sharing any sensitive information.

Submit
3. User's are permitted to download and/or install freeware, shareware and public-domain software on a Company-provided computer.  

Explanation

Users are not permitted to download and/or install freeware, shareware, and public-domain software on a Company-provided computer.

Submit
4. True or False? It is ok to stream media on the Company-provided Network (Radio, Videos, YouTube, etc.).

Explanation

Streaming media on the Company-provided Network is not okay because it can consume a significant amount of bandwidth and can slow down the network for other users. It can also pose security risks and may violate the company's acceptable use policy. Therefore, it is not advisable to stream media on the Company-provided Network.

Submit
5. The security policy has been established to:

Explanation

The security policy has been established to ensure the protection of the company's investment in its IT systems and network, as well as to safeguard the information contained in these systems. Additionally, the policy aims to protect the good name of the company by implementing measures to prevent unauthorized access, data breaches, and other security incidents. Therefore, all of the given options are valid reasons for establishing the security policy.

Submit
6. You receive a suspicious email that contains a link to a website. What should you do?

Explanation

Forwarding the suspicious email to [email protected] allows the security team to investigate and take necessary actions to protect against potential threats. Deleting the email ensures that you do not accidentally click on the link or open any potentially harmful content. It is important to avoid clicking on unknown links or opening suspicious emails to protect against phishing attempts or malware.

Submit
7. Without thinking, you open an email that appears to be from a Vendor that you do business with. After opening the email, you realize that it is a phishing scam. What should you do?

Explanation

If you have mistakenly opened a phishing email, it is important to take immediate action to protect your computer and personal information. Calling the Pacer Help Desk and informing them about the incident allows them to scan your PC for any potential viruses. This step is crucial as phishing scams often aim to install malware or steal sensitive data. By seeking assistance from the help desk, you can ensure that any potential threats are identified and addressed promptly, minimizing the risk of further harm.

Submit
8. Which of the below choices are examples of possible Social Engineering?

Explanation

All of the given choices are examples of possible Social Engineering. Social Engineering is a technique used by attackers to manipulate individuals into revealing sensitive information or performing actions that may compromise their security. In the first choice, the unidentified caller is attempting to deceive the user into sharing their password. In the second choice, the misspelled words or grammatical errors may be used to trick the user into thinking the email is legitimate. In the third choice, the suspicious attachments or links may lead the user to malicious websites or download malware.

Submit
9. Copyright laws are designed to secure the exclusive rights of the author of a "creative effort" to control who can make and distribute copies or who can make works derived from their original work. True or False? Pacer is not concerned with copyright laws in the IT Policy.

Explanation

The statement is false because Pacer is concerned with copyright laws in the IT Policy. The IT Policy would likely include guidelines and regulations regarding the use and distribution of copyrighted materials within the organization.

Submit
10. True or False? The company owns all the data on its computing equipment and users have no expectation of privacy.

Explanation

This statement is true because companies typically have policies in place that state that all data stored on company-owned computing equipment is the property of the company. Therefore, users should not expect any privacy for their personal data on these devices. This is to ensure that the company has control over its data and can protect its interests.

Submit
11. Users may obtain a complete copy of the IT Policy Manual by:

Explanation

The correct answer is visiting the UltiPro home page and looking under Information Technology. This option suggests that users can access the complete copy of the IT Policy Manual by visiting the UltiPro home page and navigating to the Information Technology section. This implies that the manual is available online and can be easily accessed by employees through the company's internal website.

Submit
12. All PC's, laptops and workstations must be locked when left unattended and be secured with a password-protected screen saver that has an activation timeout. What is the maximum idle time before the activation timeout of the screen saver? 

Explanation

The maximum idle time before the activation timeout of the screen saver is 10 minutes. This means that if the PC, laptop, or workstation is left unattended for 10 minutes without any activity, the screen saver will automatically activate and require a password to unlock it. This security measure ensures that unauthorized individuals cannot access the device and its contents when it is left unattended.

Submit
13. All Passwords must be at least 8 characters in length and contain 3 out of the 5 categories that are standard. Please select the 5 standard categories below:

Explanation

The correct answer includes the categories that are standard for creating passwords. These categories ensure that the password is strong and secure. Including one or more non-alphanumeric characters, uppercase letters, base 10 digits, lowercase letters, and any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase helps to increase the complexity of the password and make it more difficult to guess or crack. By including these categories, the password will meet the requirement of being at least 8 characters in length and containing 3 out of the 5 standard categories.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 06, 2013
    Quiz Created by
    Aperry1
Cancel
  • All
    All (13)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
True or False? ...
You receive a phone call and the caller asks you for your user id and...
User's are permitted to download and/or install freeware,...
True or False? ...
The security policy has been established to:
You receive a suspicious email that contains a link to a website. What...
Without thinking, you open an email that appears to be from a Vendor...
Which of the below choices are examples of possible Social...
Copyright laws are designed to secure the exclusive rights of the...
True or False? ...
Users may obtain a complete copy of the IT Policy Manual by:
All PC's, laptops and workstations must be locked when left...
All Passwords must be at least 8 characters in length and contain 3...
Alert!

Advertisement