Security Awareness Test Section 7

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Icorps
I
Icorps
Community Contributor
Quizzes Created: 2 | Total Attempts: 786
| Attempts: 272 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. If you receive a SPAM message soliciting pharmaceuticals what should you do?

Explanation

If you receive a SPAM message soliciting pharmaceuticals, the correct action to take is to tag the message as SPAM and delete it. This helps to filter out similar messages in the future and prevents you from engaging with potentially harmful or illegal activities. Responding to the message or forwarding it to a personal email account can lead to further spamming or phishing attempts. Signing up for a months' supply is also not recommended as it may result in financial loss or receiving counterfeit products.

Submit
Please wait...
About This Quiz
Security Awareness Test Section 7 - Quiz

Security Awareness Test Section 7 evaluates knowledge on handling spyware, chain emails, and SPAM. It tests actions for suspicious emails and personal data handling, crucial for safeguarding information... see morein personal and professional settings. see less

2. What is spyware?

Explanation

Spyware refers to software that is specifically designed to secretly gather information about a user's computer activity without their knowledge or consent. It can monitor and record keystrokes, capture screenshots, track internet browsing habits, and collect personal information. This information is often used for malicious purposes, such as identity theft or unauthorized access to sensitive data. Therefore, spyware poses a significant threat to user privacy and security.

Submit
3. If you receive a chain e-mail, what should you do?

Explanation

It is not advisable to forward a chain e-mail to co-workers for a good laugh as it may contain inappropriate or offensive content. Similarly, sending it to a client that is also a good friend can be unprofessional and may harm the professional relationship. Posting it on SharePoint is also not recommended as it may violate company policies or confidentiality agreements. Therefore, the correct answer is "None of the above" as it is best to avoid forwarding chain e-mails altogether.

Submit
4. What is a Trojan?

Explanation

A Trojan is a type of computer code that is designed with malicious intent to allow a hacker to gain remote control of a user's system. It is named after the famous Trojan horse from Greek mythology, which was used by the Greeks to infiltrate and conquer the city of Troy. Similarly, a Trojan code disguises itself as a harmless or legitimate program, tricking the user into installing it. Once installed, it opens a backdoor for the hacker to access and control the system, often leading to unauthorized activities or stealing of sensitive information.

Submit
5. An old college buddy would like to send you pics of his trip to Cancun, what should you do?

Explanation

Giving your old college buddy your personal email account is the most appropriate option in this situation. Since the pictures are personal in nature and it is a friend from college, it is more suitable to use personal communication channels. Using your work email account may not be appropriate as it is meant for professional purposes. Having him upload the pictures to the company's FTP site is also not necessary as it may not be accessible to him and could potentially violate company policies. Declining his offer by saying you're not interested is not a polite response.

Submit
6. Key loggers are used for what purpose?

Explanation

Key loggers are used to monitor and record the keys that are pressed on a keyboard. This can be done for various purposes, such as monitoring employee activities, tracking computer usage, or capturing sensitive information like passwords and credit card details. By logging the keys pressed, key loggers can provide insight into a user's online activities and help identify any unauthorized or malicious actions.

Submit
7. A visitor would like to connect to your WiFi guest network, what should be done?

Explanation

The correct answer is to confirm that the visitor's system is protected by Antivirus and then grant them access to the WiFi network. This is important because connecting to a WiFi network without antivirus protection can put the network and other connected devices at risk of malware and cyber attacks. By ensuring that the visitor's system is protected, the risk of potential security breaches is minimized.

Submit
8. If an e-mail is received from an unknown recipient with an attachment, what should you do?

Explanation

If an email is received from an unknown recipient with an attachment, it is best to inform the IT department of the suspicious message. This is the most cautious and responsible approach as the IT department can assess the potential risks associated with the email and take appropriate action. Opening or launching the attachment without proper investigation can potentially expose the system to malware or other security threats. Deleting it immediately may not provide the necessary information for the IT department to analyze the situation, and moving it to the junk folder may not effectively address the potential threat.

Submit
9. What impact does SPAM have on an organization?

Explanation

SPAM has a significant impact on an organization as it affects network bandwidth and storage on mail servers. This means that the organization's resources are being consumed by unwanted and unsolicited emails, leading to decreased efficiency and increased costs. Additionally, SPAM can also transmit malware, viruses, and trojans through hyperlinks or attachments, posing a serious threat to the organization's network security. Therefore, both options B and D are correct as they highlight the negative consequences of SPAM on an organization.

Submit
10. What is the one proven method that can be taken at the firewall level to prevent an end-users PC from sending SPAM?

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 12, 2010
    Quiz Created by
    Icorps
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
If you receive a SPAM message soliciting pharmaceuticals what should...
What is spyware?
If you receive a chain e-mail, what should you do?
What is a Trojan?
An old college buddy would like to send you pics of his trip to...
Key loggers are used for what purpose?
A visitor would like to connect to your WiFi guest network, what...
If an e-mail is received from an unknown recipient with an attachment,...
What impact does SPAM have on an organization?
What is the one proven method that can be taken at the firewall level...
Alert!

Advertisement