Corporate Vigilance: Security Awareness In Business Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Asasasasa
A
Asasasasa
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,288
| Attempts: 1,288 | Questions: 76
Please wait...
Question 1 / 76
0 %
0/100
Score 0/100
1. In order to avoid spreading malicious programs through email is to not open unexpected e-mail attachments from unknown sources.

Explanation

Opening unexpected email attachments from unknown sources can indeed lead to the spreading of malicious programs. Malicious programs, such as viruses or malware, can be disguised as innocent-looking attachments and can infect a computer or network when opened. By not opening such attachments, individuals can protect themselves and their devices from potential harm. Therefore, the statement "In order to avoid spreading malicious programs through email is to not open unexpected e-mail attachments from unknown sources" is true.

Submit
Please wait...
About This Quiz
Corporate Vigilance: Security Awareness In Business Quiz - Quiz

In a business, it is essential to protect online assets. Why not take the Security Awareness In Business Quiz to learn about security awareness in business? The questions... see morein our quiz are carefully curated to help you get the best in-depth information on the topic. Do you think you can ace this quiz? All the questions in our test are compulsory, so make sure to read all the questions carefully before answering. Remember to share this quiz with your friends for a fun learning time. Good Luck, and keep learning!
see less

2. It's a best practice to lock/logout your office computer if you leave the place.

Explanation

Locking or logging out of your office computer when you leave the place is considered a best practice for security reasons. By doing so, you ensure that unauthorized individuals cannot access your computer and its data in your absence. This helps protect sensitive information, prevent unauthorized use of your computer, and maintain the privacy and security of your work.

Submit
3. When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the URL starts with 'https" to insure the transaction is protected by SSL encryption. 

Explanation

Before you enter sensitive data in a web form or on a webpage, look for signs—like a web address with https and a closed padlock beside it—that it is secure.

Submit
4. Which of the following message attachments would you be wise not to open? A message with an attachment that:

Explanation

All of the above message attachments would be wise not to open. This is because a message with an attachment that appears more than once in your Inbox could be a sign of a spam or phishing attempt. Similarly, a message claiming to be a sample copy of a new game from a recognized company e-mail address could be a potential malware or virus. Lastly, an unexpected note from a friend could also be a disguise for a malicious attachment. Therefore, it is best to exercise caution and avoid opening any of these message attachments.

Submit
5. Physical and administrative security standards also apply to handheld devices that are used for business purposes at the organization.

Explanation

Physical and administrative security standards are important for protecting sensitive information and ensuring the overall security of an organization's assets. Handheld devices, such as smartphones and tablets, are commonly used for business purposes and can store or access sensitive data. Therefore, it is necessary for these devices to comply with the same security standards as other devices within the organization to prevent unauthorized access or data breaches.

Submit
6. Which of the following passwords is the most secure? 

Explanation

Correct! Incorporating Uppercase, Lowercase, numbers and symbols into your passwords makes it more difficult to hack.

Submit
7. Clicking website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc.) can be harmful. 

Explanation

You should only access trusted sites (Google, Facebook, Twitter, etc) by entering the URL directly or via a bookmark. Clicking on links in e-mail and from other untrusted sites may allow an attacker to steal or capture your credentials.

Submit
8. Which of the following is a good way to create a password?

Explanation

A combination of upper and lowercase letters mixed with numbers and symbols is a good way to create a password because it increases the complexity and makes it harder for hackers to guess or crack the password. Including a mix of different character types adds an extra layer of security and makes the password stronger.

Submit
9. Which of the following should you not do with your password?

Explanation

Passwords are meant to be secret and only known by you and not shared in any way.

Submit
10. Where should keep your password in case you forget it?

Explanation

Passwords should never be written down unless they are being stored in a password vault or storage utility and protected by a master password.

Submit
11. Your supervisor is very busy and asks you to log into the the server using his/her username and password to retrieve some reports. What should you do? 

Explanation

C is correct. Decline the request and remind your supervisor that it is against ISI policy. Passwords must not be shared. If pressured further, report the situation to HR. If you have questions, contact the IT Department at [email protected]

Submit
12. It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.

Explanation

Even though email messages get scanned via multiple vendors for malware, spyware and phishing, there is no guarantee that they will catch every instance of malware. It is recommended that you only open attachments and click on links if messages are from an individual you know. Enabling Safe Senders for Outlook is a good way to accomplish this.

Submit
13. Which of the following would be the best password?

Explanation

The password "App@li" would be the best choice because it includes a combination of uppercase and lowercase letters, as well as special characters. This makes it more secure and harder to guess or crack. The other options either lack complexity or are too common and easily guessable.

Submit
14. What is one of the ways that you can secure your password from disclosure

Explanation

Using a password manager with encryption features is one of the ways to secure your password from disclosure. Password managers securely store and encrypt your passwords, making it difficult for hackers to access them. They also often have features like generating strong, unique passwords and automatically filling them in for you, reducing the need to remember or write down passwords. This method ensures that your passwords are protected and easily accessible only to you, enhancing the security of your accounts.

Submit
15. Employees must secure all non-public information in a manner to which it cannot be retrieved by any unauthorized party, such as in a locked drawer or locked file cabinet.

Explanation

The statement is true because it emphasizes the importance of securing non-public information. It states that employees must ensure that such information is stored in a way that unauthorized individuals cannot access it. This can be achieved by using locked drawers or file cabinets, which provide an additional layer of protection against unauthorized retrieval. By following these guidelines, organizations can maintain the confidentiality and integrity of sensitive information.

Submit
16. A malicious user can rely on email or webpage to launch a ____?

Explanation

A malicious user can rely on email or webpage to launch phishing attacks, virus attacks, and spyware. Phishing attacks involve tricking individuals into revealing sensitive information through deceptive emails or websites. Virus attacks involve spreading harmful software through email attachments or infected webpages. Spyware can be installed on a user's device without their knowledge or consent through malicious emails or webpages, allowing the attacker to monitor their activities. Therefore, all of the mentioned options can be utilized by a malicious user to launch their attacks.

Submit
17. When is the best time to lie to your information security auditor or officer?

Explanation

The best time to lie to your information security auditor or officer is never. Lying to cover up someone else's mistakes or faults, distrusting the security auditor, or trying to protect key individuals in your organization are all unethical and can have serious consequences. It is always important to maintain honesty and integrity when dealing with information security.

Submit
18. It is not safe to e-mail business documents to your home computer to work on them.

Explanation

You should work on business documents on a corporate issued machine by either working on it in the office, or remotely connecting to your work machine and working on them remotely

Submit
19. Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?  

Explanation

Phishing is a scheme where criminals send unsolicited e-mail or pop-up messages to deceive and trick unsuspecting victims into providing personal and financial information. This information is then used for fraudulent purposes such as identity theft or financial fraud.

Submit
20. A web browser pop-up appears on your personal computer offering an "anti-spyware product" .What's your best course of action? 

Explanation

The best course of action is to close the window. This is because the pop-up offering an "anti-spyware product" is likely a scam or a form of malware. Clicking on the link and providing credit card information can lead to identity theft or financial loss. It is always safer to consult with an IT specialist to ensure that you have legitimate and up-to-date anti-spyware software.

Submit
21. Is it legal to copy software from Office PC to your laptop or home PC?

Explanation

It is not legal to copy software from an Office PC to your laptop or home PC without proper authorization. Software is protected by copyright laws, and copying it without permission is a violation of those laws. It is important to obtain the necessary licenses or permissions to use the software on each device separately.

Submit
22. Passwords are used as:

Explanation

Passwords are used as a first line of defense against hackers because they provide a layer of security for accessing sensitive information. By requiring a password, it becomes more difficult for unauthorized individuals to gain access to personal accounts or systems. This helps to protect against potential threats and unauthorized access, making passwords an essential security measure in today's digital world.

Submit
23. What indicates you are shopping online in a secure manner?

Explanation

When the URL/address of a website starts with "https://", it indicates that you are shopping online in a secure manner. The "https://" protocol ensures that the data exchanged between your browser and the website is encrypted and cannot be easily intercepted by hackers. This helps to protect your personal and financial information while making online transactions.

Submit
24. Your Facebook friend has just posted a link on your timeline that contains nude pictures. You also noticed that he has tagged some of your mutual friends too, what is the most responsible thing you can do for this situation as a cyber-savvy?

Explanation

The most responsible thing to do in this situation as a cyber-savvy individual is to report the malicious post to Facebook. By reporting the post, you are taking action to prevent the spread of inappropriate content and protect yourself and your mutual friends from potential harm. Untagging yourself and deleting the post may address the immediate issue, but reporting it to Facebook ensures that appropriate measures are taken to address the violation of community guidelines and prevent similar incidents in the future. Unfriending the person or scolding them may be appropriate actions as well, but reporting the post takes a proactive approach to address the larger issue.

Submit
25. You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords) for an approved, business need. What should you do?

Explanation

To ensure the security and privacy of the private information being sent and received via email, it is important to use an encryption method. Encryption converts the information into a code that can only be deciphered by authorized parties, thus protecting it from unauthorized access. This is crucial when dealing with sensitive data such as medical records, salary information, social security numbers, and passwords, as it reduces the risk of the information falling into the wrong hands.

Submit
26. How often should passwords be changed? 

Explanation

Correct! Passwords should be changed at least every six (6) months, and in order to maintain security you should not use the same password for multiple log-ins or the same password within the same year.

Submit
27. You receive an e-mail message from a widow in Turks and Caicos. What do you do?

Explanation

These types of e-mails are called 419 or 411 scams. These are e-mails that try to encourage you to perform fraudulent activities on behalf of someone in another country (such as laundering money).

Submit
28. Which of the following is true when it comes to official e-mail provided to employees ?

Explanation

When it comes to official e-mail provided to employees, it is true that email is considered company property. This means that the company has ownership and control over the content of the emails. Additionally, it is also true that email may be retrieved and reviewed for any number of reasons, including legal subpoenas. This implies that the company has the right to access and review employee emails if necessary, such as for legal investigations or compliance purposes.

Submit
29. You went to Starbucks to buy a coffee and then while waiting for your order, you decided to connect to their Free WiFi. While browsing to your Google Mail (https://mail.google.com/), the page redirects to https://www.googlemail.andrew.net. What do you think should you do?

Explanation

The correct answer is to disconnect from Starbucks' WIFI network. This is because the redirection from the legitimate Google Mail website to a different website (http://www.googlemail.andrew.net) is suspicious and could indicate a potential security threat. It is important to prioritize the security of personal information and avoid connecting to potentially malicious networks.

Submit
30. Which of the following is a good practice to avoid email viruses?

Explanation

A good practice to avoid email viruses is to delete unexpected or unsolicited messages, as they may contain harmful attachments or links. Using anti-virus software to scan attachments before opening them is also recommended, as it can detect and remove any potential viruses. Additionally, deleting similar messages that appear more than once in your Inbox can help to avoid opening duplicate or potentially malicious emails. Therefore, the answer "All the above" is correct as all of these practices contribute to avoiding email viruses.

Submit
31. If you're not careful about your Internet browsing, which of the following can result?

Explanation

If you are not careful about your internet browsing, it can result in various negative consequences such as the installation of spyware or adware on your device, browser hijacking, and information or identity theft. This means that all of the options mentioned in the question can be potential outcomes of careless internet browsing.

Submit
32. Which workstation security safeguards are YOU responsible for protecting?  

Explanation

All of the Above.

Security is the responsibility of everyone within the office and each person needs to be diligent about protecting their usernames, passwords, and any other sensitive, confidential and personally identifiable information.

Submit
33. Your Facebook friend has just posted a link on your timeline that contains nude pictures. You also noticed that he has tagged some of your mutual friends too, what is the most responsible thing you can do for this situation as a cyber-savvy?

Explanation

The most responsible thing to do in this situation as a cyber-savvy individual is to report the malicious post to Facebook. By reporting the post, you are taking action to address the inappropriate content and potentially prevent it from spreading further. This not only helps protect your own reputation but also ensures the safety and well-being of your mutual friends who may have also been tagged in the post. Untagging yourself and deleting the post may not be enough to address the issue, and scolding your friend may not effectively resolve the situation.

Submit
34. _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored

Explanation

Keylogging is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. It is a method used by attackers to gather sensitive information such as passwords, credit card numbers, or personal data. Keyloggers can be installed through malicious software or hardware devices, allowing the attacker to track and collect every keystroke made by the user. This information can then be used for various malicious purposes, such as identity theft or unauthorized access to accounts.

Submit
35. Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code

Explanation

Trojans are a type of program that appear to have useful or desirable features but actually contain damaging code. Unlike viruses and worms, which can replicate and spread on their own, Trojans rely on users to unknowingly install them. Once installed, Trojans can perform a variety of malicious actions, such as stealing personal information, damaging files, or allowing unauthorized access to a computer. Adware, on the other hand, is a type of software that displays unwanted advertisements, but it is not typically considered to contain damaging code.

Submit
36. What is the software called that's designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?

Explanation

Malware is the correct answer because it is a broad term that encompasses various types of malicious software designed to exploit computer users. This includes computer viruses, worms, Trojans, adware, and other harmful programs. Malware can infiltrate a computer system without the user's consent and cause damage, steal personal information, or disrupt normal computer operations. It is important for users to have antivirus software and regularly update their systems to protect against malware threats.

Submit
37. Your college best friend has just sent you a chat in Facebook and sent with a link. The link is a shortened URL for example https://goo.gl/wf4V8Z, what should you do?

Explanation

The correct answer is to not click the link and try to check the URL using an online tool that checks where it really takes you. This is because shortened URLs can be used to hide malicious websites or phishing attempts. By checking the URL before clicking, you can ensure that it is safe and avoid potential security risks.

Submit
38. Where should you write down your passwords ?

Explanation

Writing down your password is not recommended because it increases the risk of it being discovered by someone else. Even if you think you have hidden it well, there is always a chance that someone may find it. It is best to memorize your passwords or use a password manager to securely store them.

Submit
39. A customer service representative has just called you saying that your credit card is about to expire, he or she asked you to provide your account information and personal information in order to verify your account and to renew your credit card without telling you from what bank he or she came from. What should you do?

Explanation

The correct answer is "All of the above." In this situation, it is important to ask the customer representative what bank or company they came from to ensure their legitimacy. Additionally, verifying if your credit card has actually expired is important as expiration dates are placed on credit cards. Lastly, it is crucial to not give out personal and credit card information without sufficient information about the representative or the bank. By following all of these steps, you can protect yourself from potential fraud or scams.

Submit
40. What is the importance of backing up data?

Explanation

Backing up data is important for several reasons. Firstly, it ensures that data is available when it is needed to be accessed. This is crucial in case of any accidental deletion, hardware failure, or system crash. Secondly, backing up data helps in recovering quickly if there is a malware infection. Malware attacks can corrupt or delete data, and having a backup ensures that the data can be restored easily. Lastly, backing up data ensures the safety of the data. In case of any natural disasters, theft, or physical damage to the storage devices, having a backup ensures that the data is not lost permanently.

Submit
41. Which statement most accurately describes virus

Explanation

The correct answer is "A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources." This accurately describes a virus, which is a type of malicious software that replicates itself and consumes computer resources. It does not protect the computer from hackers or monitor internet use.

Submit
42. You receive an email with an attachment from "I.T. Security." The email says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do?  

Explanation

4 is correct.
Attachments can contain viruses and other malicious programs that can infect your computer, so opening or clicking on an unexpected or unknown attachment can be risky.

If you can tell that this is spam, delete the E-Mail message. If you are unsure, contact the IT Department for further instructions.

Do not open, reply to or forward suspicious emails or attachments.

Submit
43. Why does enabling Two-Factor Authentication increase your security?

Explanation

Enabling Two-Factor Authentication increases your security because it adds an extra layer of protection to your account. It requires you to provide not only something you know (like a password) but also something you have (like a physical device or a unique code). This makes it much more difficult for unauthorized individuals to access your account, even if they manage to obtain your password. By combining these two factors, it significantly reduces the risk of unauthorized access and enhances the overall security of your account.

Submit
44. When an employee transfers within an organization …

Explanation

When an employee transfers within an organization, it is important to review all access permissions. This is necessary to ensure that the employee only has access to the necessary resources and information in their new role. By reviewing access permissions, the organization can prevent any unauthorized access and maintain the security of their systems and data. This step is essential in maintaining the integrity of the organization's security measures and protecting sensitive information from potential breaches.

Submit
45. What is the biggest vulnerability to computer information security?

Explanation

End users are considered the biggest vulnerability to computer information security because they are often unaware of the risks and best practices for maintaining security. They may unknowingly click on malicious links or download infected files, making them susceptible to malware and phishing attacks. Additionally, end users may have weak passwords or fail to keep their software and devices updated, creating further vulnerabilities. It is crucial to educate and train end users on security measures to minimize the risk of breaches and protect sensitive information.

Submit
46. Which of the following could help you mitigate malwares and viruses from infecting your PC?

Explanation

Installing an antivirus program and a firewall can help mitigate malwares and viruses from infecting your PC. Antivirus programs can detect and remove malicious software, while firewalls can block unauthorized access to your network and prevent malware from entering your system. By having both of these security measures in place, you can significantly reduce the risk of malware and virus infections on your PC.

Submit
47. Most information security breaches occur due to  

Explanation

Internal employees tend to be the cause of the most information security breaches

Submit
48. You received an email like following image. What you should not do?

Explanation

4 - Delete the Message

This scenerio has four (4) big risks:

1) Some screen savers contain viruses or other malicious software and it is risky to put unknown or unsolicited programs or software onto your computer;

2) Also, in some cases just clicking on a malicious program can infect a computer, so unless you are sure a link is safe- don't click on it.

3) Email addresses can be faked - or hacked. There is no way to be certain of this without checking.

4) Finally, some websites and links look legitimate, but they're really hoaxes designed to steal your information.

Submit
49. _________ are computer programs that are designed by attackers to gain root or administrative access to your computer.

Explanation

Rootkits are computer programs that are specifically designed by attackers to gain root or administrative access to a targeted computer. They are malicious software that allows unauthorized users to control and manipulate the system without being detected. Rootkits often operate stealthily, hiding their presence and enabling attackers to carry out various malicious activities, such as stealing sensitive information, modifying system configurations, or installing additional malware. Unlike other options listed, backdoors and antiware may be components of a rootkit, while malware is a broader term encompassing various types of malicious software.

Submit
50. Employees responsibility for information security include:(Select all that apply).

Explanation

Employees have multiple responsibilities when it comes to information security. They must complete all required training to ensure they have the necessary knowledge and skills to protect sensitive information. They are also expected to adhere to established policies and procedures, which serve as guidelines for maintaining information security. Additionally, if employees come across any suspicious activity or encounter a potential disclosure of non-public information, they should promptly report it to the IT department or their manager. Following company guidelines is another important responsibility employees have in order to ensure information security.

Submit
51. “Revoking the access to the any asset of the organization when an employee/contractor is terminated is a good option." What do you think about the above statement?

Explanation

Disagreeing with the statement implies that revoking access to any asset of the organization when an employee/contractor is terminated is not a good option. This could be because past employees should not have access to confidential information or resources after they leave the organization, as it could pose a security risk. Additionally, it is important to protect the organization's assets and ensure that only authorized individuals have access to them.

Submit
52. Which of the following is not one of the characteristics of a typical phishing email

Explanation

All of the characteristics listed in the options are typical characteristics of a phishing email. Phishing emails often appear as urgent notices or alerts, contain the company name and sender's information, include hyperlinks to fraudulent websites, and may use logos and images from legitimate websites to deceive the recipient. Therefore, the correct answer is "All of the above."

Submit
53. What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?

Explanation

Spyware is a type of software that, once downloaded on a computer, scans the hard drive for personal information and internet browsing habits. It is designed to collect this data without the user's knowledge or consent. Unlike other options listed, such as backdoors, key-loggers, malware, and antiware, spyware specifically focuses on gathering personal information and monitoring online activities. Therefore, the correct answer is spyware.

Submit
54. Copyright provides what form of protection:

Explanation

Copyright provides the right for an author to prevent unauthorized use of his/her works. This means that the author has the exclusive right to control how their work is used, copied, distributed, performed, or displayed by others. It gives the author the power to decide who can use their work and under what conditions, protecting their creative expression and ensuring that they can benefit from their intellectual property.

Submit
55. Which of the following Rules of Thumb for passwords do not apply?

Explanation

The rule of thumb "Have your friend keep a copy of your password in case you forget" does not apply because it goes against the principle of keeping passwords confidential. Sharing passwords with others, even trusted friends, increases the risk of unauthorized access to personal accounts and compromises security. It is always recommended to rely on secure methods like password managers or password recovery options provided by the service providers themselves to regain access to forgotten passwords.

Submit
56. While visiting your favorite website for downloading the Firefox browser, a popup appears that says, “You just won 100,000 US dollars! Click this link to claim your prize." What should you do?

Explanation

The correct answer is to ignore the popup and just download the Firefox browser. This is because the popup is likely a scam or phishing attempt to deceive users into clicking on a malicious link. It is important to be cautious and not fall for such scams, as they could lead to malware infections or identity theft. It is always safer to download software directly from trusted sources rather than clicking on suspicious popups.

Submit
57. Which of the following is a software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited?

Explanation

Adware is a type of software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited. It is designed to generate revenue for the creator by displaying targeted ads to the user. Unlike malware or spyware, adware is not necessarily malicious, but it can still be intrusive and unwanted.

Submit
58. Viruses are always caught by modern antivirus software.

Explanation

Modern antivirus software is designed to detect and remove viruses from computer systems. It constantly updates its virus definitions to stay up-to-date with the latest threats. Therefore, it is highly effective in catching viruses and protecting the system from potential harm. Hence, the statement "Viruses are always caught by modern antivirus software" is true.

Submit
59. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____

Explanation

Eavesdropping is the correct answer because it refers to the act of intercepting and capturing small packets of data transmitted over a network by other computers. This attack aims to read the content of these packets in order to gather information. Phishing, scams, and exploits are different types of attacks that focus on deceiving or manipulating individuals or exploiting vulnerabilities in systems, whereas eavesdropping specifically involves intercepting network traffic.

Submit
60. What should you do if you think the email you received is a phishing attempt?

Explanation

If you think the email you received is a phishing attempt, the best course of action is to report the phishing email to the legitimate company or organization that has been spoofed. This helps the company or organization become aware of the phishing attempt and take necessary actions to protect their users. It also helps in preventing others from falling victim to the scam.

Submit
61. What is the most common delivery method for viruses?

Explanation

Internet download is the most common delivery method for viruses because it allows malicious software to be disguised as legitimate files and downloaded onto a user's device without their knowledge or consent. This method is often used to distribute malware through infected websites, file sharing platforms, or malicious email attachments. Once the infected file is downloaded and opened, the virus can then gain access to the user's system and potentially cause harm or steal sensitive information.

Submit
62. Which of the following is the type of software that has self-replicating software that causes damage to files and system?

Explanation

Trojans are a type of software that appear to be harmless or beneficial, but actually contain malicious code that can cause damage to files and systems. Unlike viruses, which require a host program to replicate, Trojans can self-replicate and spread throughout a computer or network. They often disguise themselves as legitimate software or files, tricking users into unknowingly installing them. Once installed, Trojans can perform a variety of harmful actions, such as deleting files, stealing sensitive information, or allowing unauthorized access to a system. Therefore, Trojans are the correct answer for the type of software that has self-replicating software that causes damage to files and systems.

Submit
63. Which of the following is a program capable of continually replicating with little or no user intervention?

Explanation

A worm is a type of program that can replicate itself without the need for user intervention. Unlike viruses, worms do not require a host file or program to attach themselves to. They can spread independently through networks, exploiting vulnerabilities in computer systems. Worms can cause significant damage by consuming network bandwidth, slowing down systems, and even deleting files. They can also create backdoors, allowing unauthorized access to affected systems. Due to their ability to self-replicate and spread rapidly, worms are considered a significant security threat.

Submit
64. Which three methods will reduce the chances that your password will be compromised? 

Explanation

Correct! Passwords should be changed every six (6) months at a minimum, and should be a combination of uppercase, lowercase, numbers and symbols.

Submit
65. What should you do if you receive a chain letter in an email?

Explanation

If you receive a chain letter in an email, the correct action to take is to forward the email to your ISO. Chain letters are often considered spam and can potentially contain harmful content or scams. By forwarding it to your ISO (Information Security Officer), you are notifying the appropriate person within your organization who can take necessary actions to protect the network and potentially investigate the source of the chain letter.

Submit
66. You came across a website that looks exactly like Facebook but it has a different domain which you have never heard of, which of the following is the best course of action that should be taken?

Explanation

The best course of action in this situation is to ignore the website and login to the official Facebook website instead. This is because the website in question is a potential phishing or scam site that is designed to deceive users. By ignoring it and accessing the legitimate Facebook website, you can ensure the security of your personal information and avoid falling victim to any fraudulent activities. Reporting it to the IT security team is also a good idea to help protect other users from potential harm.

Submit
67. Which of the following is a good netiquette?

Explanation

Using SSL or HTTPS when logging into websites is a good netiquette because it ensures that the connection between the user's device and the website is secure and encrypted. This helps protect sensitive information, such as login credentials, from being intercepted by hackers or unauthorized individuals. It is important to always prioritize security when accessing online platforms to safeguard personal data and maintain online privacy.

Submit
68. _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.

Explanation

The payload is the part of malware that carries out the malicious actions, such as deleting data, sending spam, or encrypting data. It is the portion of the malware that causes harm to the targeted system or network.

Submit
69. What are the physical security best practices?

Explanation

The correct answer includes three physical security best practices. The first practice is to not let anyone in if they can't gain access themselves, which ensures that only authorized individuals are allowed entry. The second practice is to insist on seeing identification from people who are unfamiliar, which helps verify their identity and prevents unauthorized access. The third practice is to not allow strangers to tamper with anything, even if they have identification, as this helps protect sensitive information and resources.

Submit
70. Hitting the Delete key on your computer will erase the information from your computer completely.

Explanation

Pressing the Delete key on a computer keyboard typically moves the selected file or folder to the Recycle Bin or Trash, rather than permanently erasing it. However, if the file or folder is already located in the Recycle Bin or Trash, pressing the Delete key will permanently delete it from the computer. Therefore, the statement is true as hitting the Delete key can lead to the complete erasure of information from the computer.

Submit
71. All of these are good physical security practices except

Explanation

The given answer "All of the above" is the correct answer because all of the mentioned practices are good physical security practices. Wearing a security badge outside of the office helps identify where one works, ensuring the door closes completely prevents unauthorized access, shielding paperwork and keyboard prevents shoulder surfing, and following the Clear Desk and Screen Policy helps store confidential items securely. Therefore, all of these practices are recommended for maintaining physical security.

Submit
72. If you are browsing the Internet and suddenly you get a prompt asking you to download a file and run it, what should you do?

Explanation

If you are prompted to download a file when simply browsing the internet, then chances are you've navigated to a site that is infected and is trying to infect you. It is best to cancel the download, close the browser and run a full AV scan on your machine.

Submit
73. It is ok to use my favorite login password for all accounts.

Explanation

Using the same login password for all accounts is not recommended because if one account gets hacked, all other accounts become vulnerable. It is best to use unique and strong passwords for each account to ensure maximum security.

Submit
74. The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?  

Explanation

Disconnect your computer from the network and then tell your supervisor.

Computers can be controlled remotely, and hackers can access computers by cracking paswords and usernames. If this happens, it is best to disconnect the computer from the network, to prevent access to the rest of the company files and wait until help arrives. If possible - DO NOT TURN OFF THE COMPUTER.

Submit
75. which of the following can be use to identify a phishing email??

Explanation

Poor spelling and/or grammar, content threatening/urgent phases, and the uncertainty of the safety of a link from an email can all be used to identify a phishing email. Phishing emails often contain spelling and grammar mistakes, as they are usually sent by scammers who may not have a strong command of the language. They also tend to use threatening or urgent language to create a sense of urgency and manipulate the recipient into taking immediate action. Additionally, it is impossible to guarantee the safety of a link from an email, as it could lead to a malicious website or download.

Submit
76. The internet is a fantastic resource with all its information available a click away. what is correct phase in copyright aspect?

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Nov 23, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 23, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 25, 2017
    Quiz Created by
    Asasasasa
Cancel
  • All
    All (76)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In order to avoid spreading malicious programs through email is to not...
It's a best practice to lock/logout your office computer if you...
When entering personal data such as credit card information into a...
Which of the following message attachments would you be wise not to...
Physical and administrative security standards also apply to handheld...
Which of the following passwords is the most secure? 
Clicking website links in e-mails, from other untrusted websites, or...
Which of the following is a good way to create a password?
Which of the following should you not do with your password?
Where should keep your password in case you forget it?
Your supervisor is very busy and asks you to log into the the server...
It's safe to open e-mail attachments and click on e-mail links,...
Which of the following would be the best password?
What is one of the ways that you can secure your password from...
Employees must secure all non-public information in a manner to which...
A malicious user can rely on email or webpage to launch a ____?
When is the best time to lie to your information security auditor or...
It is not safe to e-mail business documents to your home computer to...
Which one of the following is a scheme where criminals send...
A web browser pop-up appears on your personal computer offering an...
Is it legal to copy software from Office PC to your laptop or home PC?
Passwords are used as:
What indicates you are shopping online in a secure manner?
Your Facebook friend has just posted a link on your timeline that...
You are using e-mail to send and receive private information (e.g....
How often should passwords be changed? 
You receive an e-mail message from a widow in Turks and Caicos. What...
Which of the following is true when it comes to official e-mail...
You went to Starbucks to buy a coffee and then while waiting for your...
Which of the following is a good practice to avoid email viruses?
If you're not careful about your Internet browsing, which of the...
Which workstation security safeguards are YOU responsible for...
Your Facebook friend has just posted a link on your timeline that...
_________ is the action of recording the keys struck on a keyboard,...
Which of the following is a type of program that either pretends to...
What is the software called that's designed to exploit a computer user...
Your college best friend has just sent you a chat in Facebook and sent...
Where should you write down your passwords ?
A customer service representative has just called you saying that your...
What is the importance of backing up data?
Which statement most accurately describes virus
You receive an email with an attachment from "I.T. Security." The...
Why does enabling Two-Factor Authentication increase your security?
When an employee transfers within an organization …
What is the biggest vulnerability to computer information security?
Which of the following could help you mitigate malwares and viruses...
Most information security breaches occur due to  
You received an email like following image. What you should not do?
_________ are computer programs that are designed by attackers to gain...
Employees responsibility for information security include:(Select all...
“Revoking the access to the any asset of the organization when an...
Which of the following is not one of the characteristics of a typical...
What is the software called which when get downloaded on computer...
Copyright provides what form of protection:
Which of the following Rules of Thumb for passwords do not apply?
While visiting your favorite website for downloading the Firefox...
Which of the following is a software that, once installed on your...
Viruses are always caught by modern antivirus software.
The attack that focuses on capturing small packets from the network...
What should you do if you think the email you received is a phishing...
What is the most common delivery method for viruses?
Which of the following is the type of software that has...
Which of the following is a program capable of continually replicating...
Which three methods will reduce the chances that your password will be...
What should you do if you receive a chain letter in an email?
You came across a website that looks exactly like Facebook but it has...
Which of the following is a good netiquette?
_______ is the part of malware such as worms or viruses which performs...
What are the physical security best practices?
Hitting the Delete key on your computer will erase the information...
All of these are good physical security practices except
If you are browsing the Internet and suddenly you get a prompt asking...
It is ok to use my favorite login password for all accounts.
The mouse on your computer screen starts to move around on its own and...
Which of the following can be use to identify a phishing email??
The internet is a fantastic resource with all its information...
Alert!

Advertisement