Security Awareness Test Section 7

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Icorps
I
Icorps
Community Contributor
Quizzes Created: 2 | Total Attempts: 786
Questions: 10 | Attempts: 272

SettingsSettingsSettings
Security Awareness Test Section 7 - Quiz

This is a quiz to test your security knowledge.


Questions and Answers
  • 1. 

    What is spyware?

    • A.

      Gadgets used by secret agents

    • B.

      Clothing worn by the iSpy characters

    • C.

      A & B

    • D.

      Software used to spy on a user's computer activity

    Correct Answer
    D. Software used to spy on a user's computer activity
    Explanation
    Spyware refers to software that is specifically designed to secretly gather information about a user's computer activity without their knowledge or consent. It can monitor and record keystrokes, capture screenshots, track internet browsing habits, and collect personal information. This information is often used for malicious purposes, such as identity theft or unauthorized access to sensitive data. Therefore, spyware poses a significant threat to user privacy and security.

    Rate this question:

  • 2. 

    If you receive a chain e-mail, what should you do?

    • A.

      Forward it to co-workers for a good laugh

    • B.

      Send it to a client that is also a good friend

    • C.

      Post it on SharePoint

    • D.

      None of the above

    Correct Answer
    D. None of the above
    Explanation
    It is not advisable to forward a chain e-mail to co-workers for a good laugh as it may contain inappropriate or offensive content. Similarly, sending it to a client that is also a good friend can be unprofessional and may harm the professional relationship. Posting it on SharePoint is also not recommended as it may violate company policies or confidentiality agreements. Therefore, the correct answer is "None of the above" as it is best to avoid forwarding chain e-mails altogether.

    Rate this question:

  • 3. 

    If an e-mail is received from an unknown recipient with an attachment, what should you do?

    • A.

      Delete it immediately

    • B.

      Investigate by opening and launching the attachment

    • C.

      Inform your IT department of the suspicious message

    • D.

      Move it to the junk folder

    Correct Answer
    C. Inform your IT department of the suspicious message
    Explanation
    If an email is received from an unknown recipient with an attachment, it is best to inform the IT department of the suspicious message. This is the most cautious and responsible approach as the IT department can assess the potential risks associated with the email and take appropriate action. Opening or launching the attachment without proper investigation can potentially expose the system to malware or other security threats. Deleting it immediately may not provide the necessary information for the IT department to analyze the situation, and moving it to the junk folder may not effectively address the potential threat.

    Rate this question:

  • 4. 

    What impact does SPAM have on an organization?

    • A.

      None whatsoever

    • B.

      SPAM impacts network bandwidth and storage on mail servers

    • C.

      Very little

    • D.

      SPAM has the ability to transmit malware, viruses, and trojans via hyperlink or attachments which can reap havoc on a network

    • E.

      B & D

    Correct Answer
    E. B & D
    Explanation
    SPAM has a significant impact on an organization as it affects network bandwidth and storage on mail servers. This means that the organization's resources are being consumed by unwanted and unsolicited emails, leading to decreased efficiency and increased costs. Additionally, SPAM can also transmit malware, viruses, and trojans through hyperlinks or attachments, posing a serious threat to the organization's network security. Therefore, both options B and D are correct as they highlight the negative consequences of SPAM on an organization.

    Rate this question:

  • 5. 

    If you receive a SPAM message soliciting pharmaceuticals what should you do?

    • A.

      Respond to the message explaining that you're not interested

    • B.

      Tag the message as SPAM and delete

    • C.

      Sign up for a months' supply

    • D.

      Forward the e-mail to a personal e-mail account

    Correct Answer
    B. Tag the message as SPAM and delete
    Explanation
    If you receive a SPAM message soliciting pharmaceuticals, the correct action to take is to tag the message as SPAM and delete it. This helps to filter out similar messages in the future and prevents you from engaging with potentially harmful or illegal activities. Responding to the message or forwarding it to a personal email account can lead to further spamming or phishing attempts. Signing up for a months' supply is also not recommended as it may result in financial loss or receiving counterfeit products.

    Rate this question:

  • 6. 

    An old college buddy would like to send you pics of his trip to Cancun, what should you do?

    • A.

      Give him your work e-mail account

    • B.

      Have him upload it to your company's FTP site for retrieval at a later date

    • C.

      Give him your personal e-mail account

    • D.

      Tell him your not interested

    Correct Answer
    C. Give him your personal e-mail account
    Explanation
    Giving your old college buddy your personal email account is the most appropriate option in this situation. Since the pictures are personal in nature and it is a friend from college, it is more suitable to use personal communication channels. Using your work email account may not be appropriate as it is meant for professional purposes. Having him upload the pictures to the company's FTP site is also not necessary as it may not be accessible to him and could potentially violate company policies. Declining his offer by saying you're not interested is not a polite response.

    Rate this question:

  • 7. 

    What is a Trojan?

    • A.

      Brad Pitt

    • B.

      A descendant of the legendary city of Troy

    • C.

      The famed Trojan horse that caused the fall of Troy

    • D.

      Computer code designed to allow a hacker remote control of a user's system

    Correct Answer
    D. Computer code designed to allow a hacker remote control of a user's system
    Explanation
    A Trojan is a type of computer code that is designed with malicious intent to allow a hacker to gain remote control of a user's system. It is named after the famous Trojan horse from Greek mythology, which was used by the Greeks to infiltrate and conquer the city of Troy. Similarly, a Trojan code disguises itself as a harmless or legitimate program, tricking the user into installing it. Once installed, it opens a backdoor for the hacker to access and control the system, often leading to unauthorized activities or stealing of sensitive information.

    Rate this question:

  • 8. 

    Key loggers are used for what purpose?

    • A.

      Log each time you open a door

    • B.

      Monitor and log the keys that are pressed on a keyboard

    • C.

      Monitor remote access to a PC

    • D.

      Log key events in the windows system log

    Correct Answer
    B. Monitor and log the keys that are pressed on a keyboard
    Explanation
    Key loggers are used to monitor and record the keys that are pressed on a keyboard. This can be done for various purposes, such as monitoring employee activities, tracking computer usage, or capturing sensitive information like passwords and credit card details. By logging the keys pressed, key loggers can provide insight into a user's online activities and help identify any unauthorized or malicious actions.

    Rate this question:

  • 9. 

    A visitor would like to connect to your WiFi guest network, what should be done?

    • A.

      Give him/her the WiFi code and grant them access

    • B.

      Confirm that the visitor's system is protected by Antivirus and then grant them access to the WiFi network

    • C.

      Apologize and explain that this access is ONLY for privileged visitors

    • D.

      All of the above

    Correct Answer
    B. Confirm that the visitor's system is protected by Antivirus and then grant them access to the WiFi network
    Explanation
    The correct answer is to confirm that the visitor's system is protected by Antivirus and then grant them access to the WiFi network. This is important because connecting to a WiFi network without antivirus protection can put the network and other connected devices at risk of malware and cyber attacks. By ensuring that the visitor's system is protected, the risk of potential security breaches is minimized.

    Rate this question:

  • 10. 

    What is the one proven method that can be taken at the firewall level to prevent an end-users PC from sending SPAM?

    • A.

      Upgrade the firewall firmware

    • B.

      Make sure the Exchange server does not permit an open relay

    • C.

      Block outbound port 25 traffic from all devices except the mail server

    • D.

      Block port 25 on each user's PC

    Correct Answer
    B. Make sure the Exchange server does not permit an open relay

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 12, 2010
    Quiz Created by
    Icorps
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.