Information Security Awareness Quiz: MCQ!

20 Questions | Attempts: 1583
Share

SettingsSettingsSettings
Information Security Awareness Quiz: MCQ! - Quiz

.


Questions and Answers
  • 1. 
    Why is it important to have a good understanding of Information Security policies and procedures?
    • A. 

      Helps protect individuals from being victims of security incidents.

    • B. 

      Provides an understanding of steps to follow in the event of a security incident

    • C. 

      Helps to understand levels of responsibility

    • D. 

      All of the above

  • 2. 
    Which of the following is a good way to create a password?
    • A. 

      Your children's or pet's names

    • B. 

      Using look-alike substitutions of numbers or symbols

    • C. 

      A combination of upper and lowercase letters mixed with numbers and symbols

    • D. 

      Using common names or words from the dictionary

  • 3. 
    Which of the following would be the best password?
    • A. 

      MySecret

    • B. 

      Dp0si#Z$2

    • C. 

      Abc123

    • D. 

      Keyboard

  • 4. 
    What is the most common delivery method for viruses?
    • A. 

      Email

    • B. 

      Instant Message

    • C. 

      Internet download

    • D. 

      Portable media

  • 5. 
    When receiving an email from an unknown contact that has an attachment, you should:
    • A. 

      Open the attachment to view its contents

    • B. 

      Delete the email

    • C. 

      Forward the email to your co-workers to allow them to open the attachment first

    • D. 

      Forward the email to your personal email account so you can open it at home

  • 6. 
    Which of the following is a good practice to avoid email viruses?
    • A. 

      Delete an unexpected or unsolicited message

    • B. 

      Use anti-virus software to scan attachments before opening

    • C. 

      Delete similar messages that appears more than once in your Inbox

    • D. 

      All the above

  • 7. 
    Which of the following is a proper use of email?
    • A. 

      Never email personal information

    • B. 

      Send out pricelists for your home-based business products

    • C. 

      Forward inspirational and humorous emails to your co-workers to brighten their day

    • D. 

      Send an email to all your friends and co-workers to advertise a job opening in your area

  • 8. 
    Instant Messaging is safer than regular email.
    • A. 

      True

    • B. 

      False

  • 9. 
    Which of the following life experiences might turn a trusted user into a malicious insider:
    • A. 

      Frustration with co-workers

    • B. 

      Stress

    • C. 

      Promotion

    • D. 

      Financial problems

  • 10. 
    A malicious user can rely on email or webpage to launch a ____
    • A. 

      Phishing attacks

    • B. 

      Virus attacks

    • C. 

      Spyware

    • D. 

      All of the above

  • 11. 
    Which statement most accurately describes the virus?
    • A. 

      A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources

    • B. 

      A program that protects your computer from hackers

    • C. 

      A program that is installed onto your computer that monitors your internet use

    • D. 

      All of the above

  • 12. 
    Which of the following is a measure for preventing a social engineering attack:
    • A. 

      Do not give out computer or network information

    • B. 

      Do not complete confidential company tasks in an unsecure setting

    • C. 

      Do not secure sensitive documents and media

    • D. 

      Do not give out personal identifiable information

  • 13. 
    Which statement is allowed according to the user acceptance agreement?
    • A. 

      Conducting business for personal gain

    • B. 

      Using company resources for political purpose

    • C. 

      Sending an occasional personal email

    • D. 

      Downloading music and video files

  • 14. 
    If you're not careful about your Internet browsing, which of the following can result?
    • A. 

      Spyware or Adware installation

    • B. 

      Browser Hijacking

    • C. 

      Information or identity theft

    • D. 

      All of the above

  • 15. 
    The first step in Security Awareness is being able to ________ a security threat.
    • A. 

      Avoid

    • B. 

      Recognize

    • C. 

      Challenge

    • D. 

      Log

  • 16. 
    What should you do if you think the email you received is a phishing attempt?
    • A. 

      Do not reply to the message

    • B. 

      Click the link so you can see what the site looks like

    • C. 

      Keep your system up to date, and install up-to-date antivirus and antispyware software

    • D. 

      Report the phishing email to the legitimate company or organization that has been spoofed

  • 17. 
    What should you do if you think your password has been compromised?
    • A. 

      Change your password

    • B. 

      Report the incident to the proper authorities - such as a system administrator(s)

    • C. 

      Check other systems that you have accounts on as they may be compromised as well

    • D. 

      All the above

  • 18. 
    All of these are good physical security practices except?
    • A. 

      Always wear your security badge when leaving work, even if just for a break. They should be worn outside of the office in public so other people know where you work

    • B. 

      Control access to your office by ensuring the door closes completely behind when entering and exiting. Ensure that no one slips in behind you

    • C. 

      When working in a public setting, prevent shoulder surfing by shielding your paperwork and keyboard from view using your body

    • D. 

      Follow the Clear Desk and Screen Policy. Store confidential and sensitive items in a secure place

    • E. 

      Dispose of Confidential Documents in Waste Paper Bins

  • 19. 
    What is the biggest vulnerability to computer information security?
    • A. 

      Instant Messaging, Peer-to-Peer (P2P) applications

    • B. 

      Malware - virus, worms, spyware

    • C. 

      Spam, Phishing attacks

    • D. 

      End Users

  • 20. 
    What should everyone know about information security?  
    • A. 

      Computer security is part of everyone's job

    • B. 

      Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find them..

    • C. 

      Report anything suspicious to your system administrator at [email protected]

    • D. 

      Do not ignore unusual computer functioning. It might be a sign of malware.

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.