Security Awareness Test Section 7

10 Questions

Settings
Please wait...
Security Awareness Quizzes & Trivia

This is a quiz to test your security knowledge.


Questions and Answers
  • 1. 
    What is spyware?
    • A. 

      Gadgets used by secret agents

    • B. 

      Clothing worn by the iSpy characters

    • C. 

      A & B

    • D. 

      Software used to spy on a user's computer activity

  • 2. 
    If you receive a chain e-mail, what should you do?
    • A. 

      Forward it to co-workers for a good laugh

    • B. 

      Send it to a client that is also a good friend

    • C. 

      Post it on SharePoint

    • D. 

      None of the above

  • 3. 
    If an e-mail is received from an unknown recipient with an attachment, what should you do?
    • A. 

      Delete it immediately

    • B. 

      Investigate by opening and launching the attachment

    • C. 

      Inform your IT department of the suspicious message

    • D. 

      Move it to the junk folder

  • 4. 
    What impact does SPAM have on an organization?
    • A. 

      None whatsoever

    • B. 

      SPAM impacts network bandwidth and storage on mail servers

    • C. 

      Very little

    • D. 

      SPAM has the ability to transmit malware, viruses, and trojans via hyperlink or attachments which can reap havoc on a network

    • E. 

      B & D

  • 5. 
    If you receive a SPAM message soliciting pharmaceuticals what should you do?
    • A. 

      Respond to the message explaining that you're not interested

    • B. 

      Tag the message as SPAM and delete

    • C. 

      Sign up for a months' supply

    • D. 

      Forward the e-mail to a personal e-mail account

  • 6. 
    An old college buddy would like to send you pics of his trip to Cancun, what should you do?
    • A. 

      Give him your work e-mail account

    • B. 

      Have him upload it to your company's FTP site for retrieval at a later date

    • C. 

      Give him your personal e-mail account

    • D. 

      Tell him your not interested

  • 7. 
    What is a Trojan?
    • A. 

      Brad Pitt

    • B. 

      A descendant of the legendary city of Troy

    • C. 

      The famed Trojan horse that caused the fall of Troy

    • D. 

      Computer code designed to allow a hacker remote control of a user's system

  • 8. 
    Key loggers are used for what purpose?
    • A. 

      Log each time you open a door

    • B. 

      Monitor and log the keys that are pressed on a keyboard

    • C. 

      Monitor remote access to a PC

    • D. 

      Log key events in the windows system log

  • 9. 
    A visitor would like to connect to your WiFi guest network, what should be done?
    • A. 

      Give him/her the WiFi code and grant them access

    • B. 

      Confirm that the visitor's system is protected by Antivirus and then grant them access to the WiFi network

    • C. 

      Apologize and explain that this access is ONLY for privileged visitors

    • D. 

      All of the above

  • 10. 
    What is the one proven method that can be taken at the firewall level to prevent an end-users PC from sending SPAM?
    • A. 

      Upgrade the firewall firmware

    • B. 

      Make sure the Exchange server does not permit an open relay

    • C. 

      Block outbound port 25 traffic from all devices except the mail server

    • D. 

      Block port 25 on each user's PC