Quiz: Security Awareness In Business #2

76 Questions | Total Attempts: 853

SettingsSettingsSettings
Quiz: Security Awareness In Business #2 - Quiz

.


Questions and Answers
  • 1. 
    Where should keep your password in case you forget it?
    • A. 

      Someplace easily seen from your computer

    • B. 

      Someplace out of sight like in a drawer or under your keyboard

    • C. 

      If you have to write down your password, it should be stored in a password keeper or vault.

  • 2. 
    It is not safe to e-mail business documents to your home computer to work on them.
    • A. 

      True

    • B. 

      False

  • 3. 
    Which three methods will reduce the chances that your password will be compromised? 
    • A. 

      Make your password a combination of uppercase, lower case, Special characters and numbers

    • B. 

      Change your password at least once a month

    • C. 

      Use personally identifiable information (such as name, birthdates, and telephone numbers)

    • D. 

      Use same password for all accounts

  • 4. 
    Which of the following passwords is the most secure? 
  • 5. 
    How often should passwords be changed? 
    • A. 

      Every year

    • B. 

      Every 60 days

    • C. 

      Never

    • D. 

      Every 6 months

  • 6. 
    Your supervisor is very busy and asks you to log into the the server using his/her username and password to retireve some reports. What should you do? A
    • A. 

      It's your boss, so it's okay to do this.

    • B. 

      Ignore the request and hope he/she forgets.

    • C. 

      Decline the request and remind your supervisor that it is against company policy

  • 7. 
    You receive an email with an attachment from "I.T. Security." The email says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do? (select all that apply). 
    • A. 

      Follow the instructions ASAP to avoid the virus.

    • B. 

      Open the email attachment to see what is says before proceeding

    • C. 

      Reply to the sender and say "take me off this list".

    • D. 

      Delete the message from the unknown source.

    • E. 

      Contact the IT Department and ask about the email before doing anything

  • 8. 
    You received an email like following image. What you should not do?
    • A. 

      Reply to the mail and retrieve a the cash amount.

    • B. 

      Forward the message to other friends to share it

    • C. 

      Call IT and ask them to help it for you

    • D. 

      Delete the message without sending a reply

  • 9. 
    Which workstation security safeguards are YOU responsible for protecting? (Select all that apply). 
    • A. 

      User I.D

    • B. 

      Password

    • C. 

      Logging off programs

    • D. 

      Locking up office or work areas (cabinets, doors, windows)

    • E. 

      All of the above

  • 10. 
    The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? (Select all that apply) 
    • A. 

      Call your co-workers over so they can see.

    • B. 

      Disconnect your computer from the network.

    • C. 

      Tell your supervisor

    • D. 

      Turn your computer off.

    • E. 

      Run Anti-Virus

  • 11. 
    which of the following can be use to identify a phishing email??
    • A. 

      Poor spelling and/or grammar

    • B. 

      Content threatening/urgent phases.

    • C. 

      Containing hyperlinks

    • D. 

      There is no way to be certain that a link from an email will be safe.

  • 12. 
    A web browser pop-up appears on your personal computer offering an "anti-spyware product" .What's your best course of action? 
    • A. 

      Click on the link and provide your credit card information as the more protection prompted to install the better.

    • B. 

      Click on the link in the ad to learn more about the company its products before your decide.

    • C. 

      Close the window. If you want spyware protection software, or are unsure if you have up-to-date anti-spyware software, it is best to speak with the IT Specialist.

  • 13. 
    It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.
    • A. 

      True

    • B. 

      False

  • 14. 
    Which of the following should you not do with your password?
    • A. 

      Say it out loud as you are typing it in

    • B. 

      Email it to another team member

    • C. 

      Provide it to your supervisor

    • D. 

      All of the above

  • 15. 
    Most information security breaches occur due to what?
    • A. 

      Amazing External Hackers

    • B. 

      Poor Programming Techniques

    • C. 

      Internal Employees

    • D. 

      Bad Firewall Settings

  • 16. 
    If you are browsing the Internet and suddenly you get a prompt asking you to download a file and run it, what should you do?
    • A. 

      Download the file and check the file before run it.

    • B. 

      Download the file and run it

    • C. 

      Download the file and e-mail it to a co-worker to see if it is legitimate.

    • D. 

      Cancel the prompt without downloading the file

  • 17. 
    You receive an e-mail message from a widow in Turks and Caicos. What do you do?
    • A. 

      Forward it to all of your friends

    • B. 

      Follow all his instructions to the letter and wait for your check in the mail

    • C. 

      Delete the message

  • 18. 
    You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords) for an approved, business need. What should you do?
    • A. 

      Ensure you are using an encrypt method of sending email

    • B. 

      Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands

    • C. 

      Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands

  • 19. 
    Clicking website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc) can be harmful. 
    • A. 

      True

    • B. 

      False

  • 20. 
    When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the url starts with 'https" to insure the transaction is protected by SSL encryption. 
    • A. 

      True

    • B. 

      False

  • 21. 
    Which of the following is true when it comes to official e-mail provided to employees ?
    • A. 

      Email is considered company property

    • B. 

      An employee has the right to keep email private

    • C. 

      Email may be retrieved and reviewed for any number of reasons including legal supoenas

    • D. 

      Both A and C

  • 22. 
    Physical and administrative security standards also apply to handheld devices that are used for business purposes at the organization.
    • A. 

      True

    • B. 

      False

  • 23. 
    Employees responsibility for information security include:(Select all that apply).
    • A. 

      Complete all required training

    • B. 

      Adhere to established policies and procedures

    • C. 

      Contact IT Department/ Manager concerning suspicious activity or disclosure of non-public information

    • D. 

      Company guidelines

  • 24. 
    Employees must secure all non-public information in a manner to which it cannot be retrieved by any unauthorized party, such as in a locked drawer or locked file cabinet.
    • A. 

      True

    • B. 

      False

  • 25. 
    Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?  
    • A. 

      Browsing.

    • B. 

      Phishing

    • C. 

      Encoding

    • D. 

      Blogging

Back to Top Back to top