Business Quiz: Security Awareness Training

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Riasudeen
R
Riasudeen
Community Contributor
Quizzes Created: 1 | Total Attempts: 391
| Attempts: 391 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. Which of the following is an example of a strong password?

Explanation

A strong password consists of at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-sensitive, so a strong password contains letters in both uppercase and lowercase. Strong passwords also do not contain words that can be found in a dictionary or parts of the user’s own name.

Submit
Please wait...
About This Quiz
Business Quiz: Security Awareness Training - Quiz

This Business Quiz on Security Awareness Training tests knowledge on network configurations, firewall usage, strong password creation, IP address checking, and handling sensitive information calls, essential for secure... see morebusiness operations. see less

2. Some unknown person calling orange associates and asking some information. What you should do first?

Explanation

The most prevalent type of social engineering attack is conducted by phone. A hacker will call up and imitate someone in a position of authority or relevance and gradually pull information out of the User or Company.

Submit
3. When you receive Email from unknown recipient to provide your system password? and account Information?

Explanation

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Submit
4. What for Firewall Used?

Explanation

A system designed to prevent unauthorized access to or from a private network.

here are several types of firewall techniques:
# Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
# Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
# Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
# Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

Submit
5. Help Complete this Door Installation

The door illustrated at this facility is used for both entering and leaving the building. The door has a push bar to exit. What devices are missing from this installation?

Explanation

Help Complete This Door Installation

If the door is also regularly used for egress, either another card reader or request to exit device must be installed on the interior side, so that people exiting the door will not generate an alarm on the access control system.

Submit
6. What is the difference between 'digital zoom' and 'optical zoom'?

Explanation

Optical zoom is the traditional method of physically manipulating the distance between 2 lenses to create a different camera view. Digital zooming is a technique in which an electronic processor literally magnifies size of the pixels imaged by an optical lens. There are different techniques, but "grainy" appearance is typically associated with digital zoom, especially when the camera. Of cameras that have the ability to zoom (aka varifocal lens cameras), some are optical, some are digital- and some are both, which means that the mechanical lens movement and internal digital magnification are both taking place (22x optical and 10x digital = total 220x zoom capability). It should be noted that not all digital zooming technology is the same. We've seen all ranges from extremely poor to excellent and are quite pleased with the equipment we carry.

Submit
7. What cable color coding you use for network 2 computers directly?

Explanation

First, You will need lan cards on both of the computers. Connect lan cards of both the computers with a cross cable(One side 568A Another side 568B).
Assign private IP address of same class to both computers (e.g. 192.168.0.1 and 192.168.0.2). Now both computers can share files, network, etc..

Submit
8. What is frames per second in DVR?

Explanation

The frames per second (fps) relates to how many pictures the DVR will record in a second. Real time recording is about 30 fps on each camera. To calculate the fps per camera take the total fps in the system and divide it by the number of video inputs. For example, a 60 fps digital video recorder with 4 video inputs would result in about 15 fps per camera. The technology has finally gotten to the point now where real time recording is affordable. If you are recording cash registers or something similar then you should definitely invest in real time recording.

Submit
9. What is the frame result when you view the camera video over the internet using normal modem? & DSL? 

Explanation

You can view the camera video over the internet using a modem which is slow but can display 1 or 2 frames every 5 seconds. Better is a DSL or cable modem connection which can generally display 1 frame per second. When viewing remotely, the refresh rate is restricted by the communications medium (your internet connection speed). When viewing or playing back locally, the display is dependent of the unit's frame rate (fps). You will need a static ip address available to assign to the DVR (more about this in your documentation).

Submit
10. What command you used to check IP address of windows computer?
(Choose 3 Answers)

Explanation

The correct answers are "ping ? (ping www.google.com)", "ipconfig /all", and "ipconfig".

The "ping ? (ping www.google.com)" command is used to check the IP address by sending a request to the specified website (www.google.com) and receiving a response that includes the IP address.

The "ipconfig /all" command displays detailed information about all network interfaces on the Windows computer, including the IP address.

The "ipconfig" command alone also displays the IP address, along with other network configuration information, but it may not provide as much detail as the "/all" option.

Submit
11. Why Does Door Strike release from the Inside?
When some authorized users walk past this door from the inside, they hear the door strike release. What's causing this?

Explanation

Why Does Door Strike Release from the Inside?
Proximity readers can have detection fields that extend both in front of and behind the reader. If a person has his or her proximity credential in a pocket or purse, the reader may inadvertently read the credential when it nears the door. Installing a metal plate behind the reader will reduce or eliminate this problem.

Submit
12. Door releases, such as strikes and magnetic locks, typically are powered by:

Explanation

Door releases, such as strikes and magnetic locks, typically are powered by separate power supplies

Submit
13. The most popular access control credential technology used today is?

Explanation

The fastest growing technology for access control applications, proximity readers continuously transmit a low-level fixed radio frequency (RF) signal that provides energy to the card. When the card is held at a certain distance from the reader, the RF signal is absorbed by a small coil inside the card that powers up the card’s microchip, which contains a unique identification code. Once powered, the card transmits the code to the reader. The whole process is completed in microseconds. The big advantage of proximity over other technologies lies in its simplicity. There are no moving parts, no mechanical wear, no slots, and no read heads to maintain

Submit
14. What technology used in router to watch CCTV Video from Internet?



Refer Orange Associate setup and select 2 answers

Explanation

NAT or PAt can be configured in ADSL router to translate VIDEO Traffic Internet

Submit
15. Secure funneling is when two or more doors are logically connected so that one door must be closed before another door can be opened.

Explanation

False – The correct term is “mantrap”

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2009
    Quiz Created by
    Riasudeen
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is an example of a strong password?
Some unknown person calling orange associates and asking some...
When you receive Email from unknown recipient to provide your system...
What for Firewall Used?
Help Complete this Door Installation ...
What is the difference between 'digital zoom' and 'optical zoom'?
What cable color coding you use for network 2 computers directly?
What is frames per second in DVR?
What is the frame result when you view the camera video over the...
What command you used to check IP address of windows computer?(Choose...
Why Does Door Strike release from the Inside?When some authorized...
Door releases, such as strikes and magnetic locks, typically are...
The most popular access control credential technology used today is?
What technology used in router to watch CCTV Video from Internet?Refer...
Secure funneling is when two or more doors are logically connected so...
Alert!

Advertisement