Are You Safe Online? IT Security Awareness Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Aperry1
A
Aperry1
Community Contributor
Quizzes Created: 1 | Total Attempts: 315
Questions: 13 | Attempts: 315

SettingsSettingsSettings
Are You Safe Online? IT SecurITy Awareness Quiz - Quiz

.


Questions and Answers
  • 1. 

    All PC's, laptops and workstations must be locked when left unattended and be secured with a password-protected screen saver that has an activation timeout. What is the maximum idle time before the activation timeout of the screen saver? 

    • A.

      5 minutes

    • B.

      2 minutes

    • C.

      10 minutes

    • D.

      8 minutes

    Correct Answer
    C. 10 minutes
    Explanation
    The maximum idle time before the activation timeout of the screen saver is 10 minutes. This means that if the PC, laptop, or workstation is left unattended for 10 minutes without any activity, the screen saver will automatically activate and require a password to unlock it. This security measure ensures that unauthorized individuals cannot access the device and its contents when it is left unattended.

    Rate this question:

  • 2. 

    User's are permitted to download and/or install freeware, shareware and public-domain software on a Company-provided computer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Users are not permitted to download and/or install freeware, shareware, and public-domain software on a Company-provided computer.

    Rate this question:

  • 3. 

    Copyright laws are designed to secure the exclusive rights of the author of a "creative effort" to control who can make and distribute copies or who can make works derived from their original work. True or False? Pacer is not concerned with copyright laws in the IT Policy.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because Pacer is concerned with copyright laws in the IT Policy. The IT Policy would likely include guidelines and regulations regarding the use and distribution of copyrighted materials within the organization.

    Rate this question:

  • 4. 

    True or False? It is ok to store Company Data on your desktop, in My Documents or on another site such as Google Docs because it is more convenient for you.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Storing company data on personal desktops, in My Documents, or on external sites like Google Docs is not recommended because it poses security risks. Company data should be stored on secure servers or cloud platforms that are specifically designed for data storage and protection. Storing data in these unauthorized locations increases the chances of data breaches, unauthorized access, and loss of sensitive information. It is important to follow company policies and guidelines to ensure data security and compliance.

    Rate this question:

  • 5. 

    True or False? It is ok to stream media on the Company-provided Network (Radio, Videos, YouTube, etc.).

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Streaming media on the Company-provided Network is not okay because it can consume a significant amount of bandwidth and can slow down the network for other users. It can also pose security risks and may violate the company's acceptable use policy. Therefore, it is not advisable to stream media on the Company-provided Network.

    Rate this question:

  • 6. 

    Which of the below choices are examples of possible Social Engineering?

    • A.

      A phone call from an unidentified caller asking the user for his or her password in order to install software

    • B.

      An email that has misspelled words or grammatical errors

    • C.

      An email that contains suspicious attachments or links to other websites

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of the given choices are examples of possible Social Engineering. Social Engineering is a technique used by attackers to manipulate individuals into revealing sensitive information or performing actions that may compromise their security. In the first choice, the unidentified caller is attempting to deceive the user into sharing their password. In the second choice, the misspelled words or grammatical errors may be used to trick the user into thinking the email is legitimate. In the third choice, the suspicious attachments or links may lead the user to malicious websites or download malware.

    Rate this question:

  • 7. 

    All Passwords must be at least 8 characters in length and contain 3 out of the 5 categories that are standard. Please select the 5 standard categories below:

    • A.

      Include one or more non-alphanumeric characters (e.g. ! @ # $ %)

    • B.

      Include one or more uppercase letters (A through Z)

    • C.

      Include one or more base 10 digits (0 through 9)

    • D.

      Include the user's first and last name

    • E.

      Include one or more lowercase letters (a through z)

    • F.

      Include any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase

    Correct Answer(s)
    A. Include one or more non-alphanumeric characters (e.g. ! @ # $ %)
    B. Include one or more uppercase letters (A through Z)
    C. Include one or more base 10 digits (0 through 9)
    E. Include one or more lowercase letters (a through z)
    F. Include any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase
    Explanation
    The correct answer includes the categories that are standard for creating passwords. These categories ensure that the password is strong and secure. Including one or more non-alphanumeric characters, uppercase letters, base 10 digits, lowercase letters, and any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase helps to increase the complexity of the password and make it more difficult to guess or crack. By including these categories, the password will meet the requirement of being at least 8 characters in length and containing 3 out of the 5 standard categories.

    Rate this question:

  • 8. 

    You receive a suspicious email that contains a link to a website. What should you do?

    • A.

      Forward the email to [email protected] and delete the email

    • B.

      Click on the link and open it to see where it goes

    • C.

      Go to Internet explorer and type the link in the browser to see what the website is

    • D.

      Forward it to a colleague and have them open it first

    Correct Answer
    A. Forward the email to [email protected] and delete the email
    Explanation
    Forwarding the suspicious email to [email protected] allows the security team to investigate and take necessary actions to protect against potential threats. Deleting the email ensures that you do not accidentally click on the link or open any potentially harmful content. It is important to avoid clicking on unknown links or opening suspicious emails to protect against phishing attempts or malware.

    Rate this question:

  • 9. 

    True or False? The company owns all the data on its computing equipment and users have no expectation of privacy.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    This statement is true because companies typically have policies in place that state that all data stored on company-owned computing equipment is the property of the company. Therefore, users should not expect any privacy for their personal data on these devices. This is to ensure that the company has control over its data and can protect its interests.

    Rate this question:

  • 10. 

    You receive a phone call and the caller asks you for your user id and password so he can install needed software on your computer. What should you do?

    • A.

      Give them your password so they can gain access to your computer

    • B.

      Do not give them any information and contact the Pacer Security Team immediately

    • C.

      Ask the caller a series of questions to verify who they are

    • D.

      Transfer the call to your Manager

    Correct Answer
    B. Do not give them any information and contact the Pacer Security Team immediately
    Explanation
    The correct answer is to not give them any information and contact the Pacer Security Team immediately. This is because it is a common tactic used by scammers to gain unauthorized access to personal information and computers. Providing them with your user id and password can lead to identity theft, unauthorized access to personal data, and potential financial loss. It is important to always be cautious and verify the identity of callers before sharing any sensitive information.

    Rate this question:

  • 11. 

    Without thinking, you open an email that appears to be from a Vendor that you do business with. After opening the email, you realize that it is a phishing scam. What should you do?

    • A.

      Not worry about it because you have anti-virus software installed on your PC

    • B.

      Call the Pacer Help Desk and tell them about what happened so they can scan your PC for a possible virus

    • C.

      Ask your Manager for advice

    • D.

      Delete the email and not tell anyone what happened

    Correct Answer
    B. Call the Pacer Help Desk and tell them about what happened so they can scan your PC for a possible virus
    Explanation
    If you have mistakenly opened a phishing email, it is important to take immediate action to protect your computer and personal information. Calling the Pacer Help Desk and informing them about the incident allows them to scan your PC for any potential viruses. This step is crucial as phishing scams often aim to install malware or steal sensitive data. By seeking assistance from the help desk, you can ensure that any potential threats are identified and addressed promptly, minimizing the risk of further harm.

    Rate this question:

  • 12. 

    Users may obtain a complete copy of the IT Policy Manual by:

    • A.

      Visiting the UltiPro home page and looking under Information Technology

    • B.

      Calling the Help Desk and having them email it to you

    • C.

      Sending an email to [email protected]

    • D.

      Asking HR to give you a copy

    Correct Answer
    A. Visiting the UltiPro home page and looking under Information Technology
    Explanation
    The correct answer is visiting the UltiPro home page and looking under Information Technology. This option suggests that users can access the complete copy of the IT Policy Manual by visiting the UltiPro home page and navigating to the Information Technology section. This implies that the manual is available online and can be easily accessed by employees through the company's internal website.

    Rate this question:

  • 13. 

    The security policy has been established to:

    • A.

      Protect the Company's investment in it's IT Systems and Network

    • B.

      Safeguard the information contained in these Systems

    • C.

      Protect the good name of the Company

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The security policy has been established to ensure the protection of the company's investment in its IT systems and network, as well as to safeguard the information contained in these systems. Additionally, the policy aims to protect the good name of the company by implementing measures to prevent unauthorized access, data breaches, and other security incidents. Therefore, all of the given options are valid reasons for establishing the security policy.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 06, 2013
    Quiz Created by
    Aperry1
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.