Security Awareness Month Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bubbanc
B
Bubbanc
Community Contributor
Quizzes Created: 1 | Total Attempts: 526
| Attempts: 526 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. It's ok to share your work password with others. 

Explanation

Your work password should never be shared with anyone; even your manager.

Submit
Please wait...
About This Quiz
Security Awareness Month Quiz - Quiz

Happy Security Awareness Month! There’s no better time to educate yourself – or reassure your existing knowledge, as the case may be – about the dos and don’ts of security and being safe with computers. Let’s see how much you know!

2. If you receive an e-mail plea from a family member asking for money, it's OK to repond and wire them money since they sent the message from their e-mail account. 

Explanation

These types of scams are common when an e-mail account has been hacked. The first course of action is to try and contact the person (not via e-mail) and confirm if they really need money and let them know that their e-mail account may have been hacked.

Submit
3. If you've spoken to your kids about being safe on the Internet, then there is no need to filter web content for them.

Explanation

Web content should always be filtered for children. OpenDNS provides DNS-based protections for free. Other Anti-Virus companies also provide protections and filters for children accessing the Internet.

Submit
4. When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the url starts with 'https" to insure the transaction is protected by SSL encryption. 

Explanation

Before you enter sensitive data in a web form or on a webpage, look for signs—like a web address with https and a closed padlock beside it—that it is secure.

Submit
5. It is safe to connect a USB drive that you found in the parking lot to your work computer. 

Explanation

GIS should be contacted to clean the device or you can contact Security to put the drive in lost and found.

Submit
6. If you received a message that you suspect may be spam or a phishing attempt, what should you do with the message?  

Explanation

If it looks suspicious it is safest to delete the message and not expose yourself and SAS to risk.

Submit
7. It's OK to click website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc).  

Explanation

You should only access trusted sites (Google, Facebook, Twitter, etc) by entering the URL directly or via a bookmark. Clicking on links in e-mail and from other untrusted sites may allow an attacker to steal or capture your credentials.

Submit
8. If someone calls you and requests information about where you work, the employees, your work account, passwords, or personal information about yourself you should:

Explanation

Cases like this is when someone is trying to social engineer you for information about your workplace.

Submit
9. Where should keep your password in case you forget it?

Explanation

Passwords should never be written down unless they are being stored in a password vault or storage utility and protected by a master password.

Submit
10. You receive an e-mail message from a deposed Prince of Nigeria. What do you do?

Explanation

These types of e-mails are called 419 or 411 scams. These are e-mails that try to encourage you to perform fraudulent activities on behalf of someone in another country (such as laundering money).

Submit
11. It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.

Explanation

Even though email messages get scanned via multiple vendors for malware, spyware and phishing, there is no guarantee that they will catch every instance of malware. It is recommended that you only open attachments and click on links if messages are from an individual you know. Enabling Safe Senders for Outlook is a good way to accomplish this.

Submit
12. Which of the following should you not do with your password?

Explanation

Passwords are meant to be secret and only known by you and not shared in any way.

Submit
13. If you are browsing the Internet and suddenly you get a prompt asking you to download a file and run it, what should you do?

Explanation

If you are prompted to download a file when simply browsing the internet, then chances are you've navigated to a site that is infected and is trying to infect you. It is best to cancel the download, close the browser and run a full AV scan on your machine.

Submit
14. It's ok to setup a rule to auto-forward all of your work e-mail to an external e-mail account like Gmail or Hotmail. 

Explanation

Auto-forwarding rules are prohibited by company policy. You can forward individual mails to your personal account as long as the communications are not company confidential.

Submit
15. It's OK to post personal information about yourself on Twitter or Facebook.

Explanation

You should limit the personal information you post about yourself and your family on Twitter, Facebook and other social media sites. This information could be used in order to perform social engineering on you or your family. You should configure privacy settings to be as strict as possible on such sites to limit prying eyes. All information posted to social media sites should be considered permanent, no matter what the privacy policies of the sites state.

Submit
16. Password challenge questions, used for resetting passwords on some Internet sites, should not be used if they contain publicly available information. 

Explanation

Know what you've posted about yourself. A common way that hackers break into financial or other accounts is by clicking the "Forgot your password?" link on the account login page. To break into your account, they search for the answers to your security questions, such as your birthday, home town, high school class, or mother's middle name. If the site allows, make up your own password questions, and don't draw them from material anyone could find with a quick search.

Submit
17. If you set your anti-virus software to auto-update then you don't need Windows Automatic Updates.

Explanation

Anti-virus is not a replacement for regularly applying patches and security updates.

Submit
18. You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords) for an approved, business need. What should you do?

Explanation

Encrypting the information before sending it through email ensures that the data is protected and cannot be accessed by unauthorized individuals. Encryption converts the information into a code that can only be deciphered with a decryption key, making it extremely difficult for anyone else to read or understand the content of the email. This helps to maintain the confidentiality and integrity of the private information being transmitted.

Submit
19. The following are characteristics of a good work password:

Explanation

You should never choose your work password to be the same as any other accounts. You should also not use family birthdays, names, or other publicly available information about you or your family as part of your password.

Submit
20. It is not safe to e-mail business documents to your home computer to work on them.

Explanation

You should work on business documents on a corporate issued machine by either working on it in the office, or remotely connecting to your work machine and working on them remotely

Submit
21. It's not OK to accept 3rd party/customer data without permissions from Information Security.

Explanation

Information Security has a request form that will walk you through the process of accepting 3rd party data.

Submit
22. According to the FBI and the Computer Security Institute, most information security breaches occur due to what?

Explanation

Internal employees tend to be the cause of the most information security breaches

Submit
23. Which of the following is the best protection technique for a home wireless network

Explanation

MAC filters are not protection from an intruder as MAC information can be obtained via wireless sniffers and this information be spoofed. Hiding your SSID will also not keep intruders out since the SSID can still be detected via a wireless sniffer. WEP is not a suitable wireless protection mechanism because this encryption technique can easily be cracked in a number of minutes. WPA2 Pre-shared key with a lengthy key is the preferred standard.

Submit
24. What type of attack relies on the trusting nature of employees and the art of deception?

Explanation

Social Engineering is when an attacker tries to gain information about an attack based on information they already know about you or pretending to misrepresent themselves to you in hopes that you will trust them.

Submit
25. An 8 character password containing a mix of uppercase, lowercase and special characters can be cracked in under a day.  

Explanation

Hackers are now using Graphics cards in order to help brute force passwords. The 8 character keyspace can be traversed in under 24 hours with multi-GPU machines: http://arstechnica.com/security/2012/08/passwords-under-assault/

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 14, 2012
    Quiz Created by
    Bubbanc
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
It's ok to share your work password with others. 
If you receive an e-mail plea from a family member asking for money,...
If you've spoken to your kids about being safe on the Internet,...
When entering personal data such as credit card information into a...
It is safe to connect a USB drive that you found in the parking lot to...
If you received a message that you suspect may be spam or a phishing...
It's OK to click website links in e-mails, from other untrusted...
If someone calls you and requests information about where you work,...
Where should keep your password in case you forget it?
You receive an e-mail message from a deposed Prince of Nigeria. What...
It's safe to open e-mail attachments and click on e-mail links,...
Which of the following should you not do with your password?
If you are browsing the Internet and suddenly you get a prompt asking...
It's ok to setup a rule to auto-forward all of your work e-mail to...
It's OK to post personal information about yourself on Twitter or...
Password challenge questions, used for resetting passwords on some...
If you set your anti-virus software to auto-update then you don't...
You are using e-mail to send and receive private information (e.g....
The following are characteristics of a good work password:
It is not safe to e-mail business documents to your home computer to...
It's not OK to accept 3rd party/customer data without permissions...
According to the FBI and the Computer Security Institute, most...
Which of the following is the best protection technique for a home...
What type of attack relies on the trusting nature of employees and the...
An 8 character password containing a mix of uppercase, lowercase and...
Alert!

Advertisement