Security Awareness Quiz

10 Questions | Total Attempts: 1146

SettingsSettingsSettings
Please wait...
Security Awareness Quiz

This is a security awareness quiz that will test your knowledge on various aspects of security.


Questions and Answers
  • 1. 
    1. This is a document that states in writing how a company plans to protect the company's physical and IT assets.
    • A. 

      Data Encryption Standard

    • B. 

      security policy

    • C. 

      public key certificate

    • D. 

      access control list

    • E. 

      Copyright

  • 2. 
    This is a program or file that is specifically developed for the purpose of doing harm.
    • A. 

      Buffer overflow

    • B. 

      Bastion host

    • C. 

      Malware

    • D. 

      Ping sweep

    • E. 

      Passphrase

  • 3. 
    This is a set of related programs, usually located at a network gateway server, that protects the resources of a private network from other networks
    • A. 

      Firewall

    • B. 

      Sandbox

    • C. 

      Rootkit

    • D. 

      Password checker

    • E. 

      General protection fault

  • 4. 
    This is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
    • A. 

      Intrusion detection

    • B. 

      Security idnetifier

    • C. 

      Antigen

    • D. 

      Prob

    • E. 

      Antivirus software

  • 5. 
    In computer security, this describes a non-technical kind of intrusion that relies heavily on human interaction. It often involves tricking people into breaking their own security procedures.
    • A. 

      Cyberterrorism

    • B. 

      Debugging

    • C. 

      Hijacking

    • D. 

      Nonrepudiation

    • E. 

      Social engineering

  • 6. 
    This is a program in which malicious or harmful code is contained inside apparently harmless programming or data.
    • A. 

      War dialer

    • B. 

      Spam trap

    • C. 

      Smurf

    • D. 

      Trojan horse

    • E. 

      Walled garden

  • 7. 
    This is the process of determining whether someone or something is, in fact, who or what it is declared to be.
    • A. 

      Conditional access

    • B. 

      Anonymizer

    • C. 

      Bypass

    • D. 

      User profile

    • E. 

      Authentication

  • 8. 
    This is the conversion of data into a ciphertext that cannot be easily understood by unauthorized people.
    • A. 

      Brute force cracking

    • B. 

      Tunneling

    • C. 

      Encryption

    • D. 

      Ciphertext feedback

    • E. 

      Cloaking

  • 9. 
    To be effective, this should ideally contain at least one digit and not match a natural language word.
    • A. 

      Digital signature

    • B. 

      Smart card

    • C. 

      Public key

    • D. 

      Password

    • E. 

      Signature

  • 10. 
    This is an agreement a company may ask an employee to sign that specifies what is considered to be appropriate (or inappropriate) use of e-mail or Web browsing
    • A. 

      Rsa

    • B. 

      Aup

    • C. 

      Set

    • D. 

      Vpn

    • E. 

      Pki

Back to Top Back to top