Security Awareness Month Quiz

25 Questions | Total Attempts: 205

SettingsSettingsSettings
Please wait...
Security Awareness Month Quiz

Happy Security Awareness Month! There’s no better time to educate yourself – or reassure your existing knowledge, as the case may be – about the dos and don’ts of security and being safe with computers. Let’s see how much you know!


Questions and Answers
  • 1. 
    It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.
    • A. 

      True

    • B. 

      False

  • 2. 
    It's ok to share your work password with others. 
    • A. 

      True

    • B. 

      False

  • 3. 
    The following are characteristics of a good work password:
    • A. 

      The password is the same as another online account

    • B. 

      The password is at least 4 characters long

    • C. 

      The password uses a combination of lowercase, uppercase, and special characters

    • D. 

      The password contains part of a family members birthday

    • E. 

      All of the above

  • 4. 
    If you received a message that you suspect may be spam or a phishing attempt, what should you do with the message?  
    • A. 

      Open it up and click any links or attachments in the message

    • B. 

      Delete the message

    • C. 

      Forward it to a co-worker to see if they can open it

  • 5. 
    Which of the following should you not do with your password?
    • A. 

      Say it out loud

    • B. 

      Email it to an associate

    • C. 

      Provide it to your manager

    • D. 

      All of the above

  • 6. 
    Where should keep your password in case you forget it?
    • A. 

      Someplace easily seen from your computer

    • B. 

      Someplace out of sight like in a drawer or under your keyboard

    • C. 

      If you have to write down your password, it should be stored in a password keeper or vault.

  • 7. 
    Password challenge questions, used for resetting passwords on some Internet sites, should not be used if they contain publicly available information. 
    • A. 

      True

    • B. 

      False

  • 8. 
    It is safe to connect a USB drive that you found in the parking lot to your work computer. 
    • A. 

      True

    • B. 

      False

  • 9. 
    If someone calls you and requests information about where you work, the employees, your work account, passwords, or personal information about yourself you should:
    • A. 

      Answer them as truthfully as possible

    • B. 

      Give them your work e-mail address so they can email you the information they need

    • C. 

      Deny their request and contact Security about the call.

  • 10. 
    It's ok to setup a rule to auto-forward all of your work e-mail to an external e-mail account like Gmail or Hotmail. 
    • A. 

      True

    • B. 

      False

  • 11. 
    It's not OK to accept 3rd party/customer data without permissions from Information Security.
    • A. 

      True

    • B. 

      False

  • 12. 
    An 8 character password containing a mix of uppercase, lowercase and special characters can be cracked in under a day.  
    • A. 

      True

    • B. 

      False

  • 13. 
    If you set your anti-virus software to auto-update then you don't need Windows Automatic Updates.
    • A. 

      True

    • B. 

      False

  • 14. 
    According to the FBI and the Computer Security Institute, most information security breaches occur due to what?
    • A. 

      External Hackers

    • B. 

      Poor Programming Techniques

    • C. 

      Internal Employees

    • D. 

      Bad Firewall Settings

  • 15. 
    It is not safe to e-mail business documents to your home computer to work on them.
    • A. 

      True

    • B. 

      False

  • 16. 
    If you are browsing the Internet and suddenly you get a prompt asking you to download a file and run it, what should you do?
    • A. 

      Download the file and run it.

    • B. 

      Cancel the download and close your browser.

    • C. 

      Download the file and e-mail it to a co-worker to see if it is legitimate.

  • 17. 
    What type of attack relies on the trusting nature of employees and the art of deception?
    • A. 

      Fraud

    • B. 

      Phishing

    • C. 

      Social Engineering

    • D. 

      Dumpster Diving

  • 18. 
    You receive an e-mail message from a deposed Prince of Nigeria. What do you do?
    • A. 

      Forward it to all of your friends

    • B. 

      Follow all his instructions to the letter and wait for your check in the mail

    • C. 

      Highlight the message and hit "Control + Shift + Delete" to completely remove the message

  • 19. 
    You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords) for an approved, business need. What should you do?
    • A. 

      Encrypt the information before sending it through e-mail

    • B. 

      Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands

    • C. 

      Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands

  • 20. 
    It's OK to post personal information about yourself on Twitter or Facebook.
    • A. 

      True

    • B. 

      False

  • 21. 
    It's OK to click website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc).  
    • A. 

      True

    • B. 

      False

  • 22. 
    When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the url starts with 'https" to insure the transaction is protected by SSL encryption. 
    • A. 

      True

    • B. 

      False

  • 23. 
    Which of the following is the best protection technique for a home wireless network
    • A. 

      MAC address filtering

    • B. 

      Hidden SSID

    • C. 

      WEP encryption

    • D. 

      WPA2 encryption

  • 24. 
    If you receive an e-mail plea from a family member asking for money, it's OK to repond and wire them money since they sent the message from their e-mail account. 
    • A. 

      True

    • B. 

      False

  • 25. 
    If you've spoken to your kids about being safe on the Internet, then there is no need to filter web content for them.
    • A. 

      True

    • B. 

      False

Back to Top Back to top