Corporate Vigilance: Security Awareness In Business Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Asasasasa
A
Asasasasa
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,267
Questions: 76 | Attempts: 1,267

SettingsSettingsSettings
Corporate Vigilance: Security Awareness In Business Quiz - Quiz

In a business, it is essential to protect online assets. Why not take the Security Awareness In Business Quiz to learn about security awareness in business? The questions in our quiz are carefully curated to help you get the best in-depth information on the topic. Do you think you can ace this quiz? All the questions in our test are compulsory, so make sure to read all the questions carefully before answering. Remember to share this quiz with your friends for a fun learning time. Good Luck, and keep learning!


Questions and Answers
  • 1. 

    Where should keep your password in case you forget it?

    • A.

      Someplace easily seen from your computer

    • B.

      Someplace out of sight like in a drawer or under your keyboard

    • C.

      If you have to write down your password, it should be stored in a password keeper or vault.

    Correct Answer
    C. If you have to write down your password, it should be stored in a password keeper or vault.
    Explanation
    Passwords should never be written down unless they are being stored in a password vault or storage utility and protected by a master password.

    Rate this question:

  • 2. 

    It is not safe to e-mail business documents to your home computer to work on them.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    You should work on business documents on a corporate issued machine by either working on it in the office, or remotely connecting to your work machine and working on them remotely

    Rate this question:

  • 3. 

    Which three methods will reduce the chances that your password will be compromised? 

    • A.

      Make your password a combination of uppercase, lower case, Special characters and numbers

    • B.

      Change your password at least once a month

    • C.

      Use personally identifiable information (such as name, birthdates, and telephone numbers)

    • D.

      Use same password for all accounts

    Correct Answer(s)
    A. Make your password a combination of uppercase, lower case, Special characters and numbers
    B. Change your password at least once a month
    C. Use personally identifiable information (such as name, birthdates, and telephone numbers)
    Explanation
    Correct! Passwords should be changed every six (6) months at a minimum, and should be a combination of uppercase, lowercase, numbers and symbols.

    Rate this question:

  • 4. 

    Which of the following passwords is the most secure? 

    • A.

      MyDogFido

    • B.

      Fido

    • C.

      MdF1s-Go@d!

    • D.

      Fid0399o

    Correct Answer
    C. MdF1s-Go@d!
    Explanation
    Correct! Incorporating Uppercase, Lowercase, numbers and symbols into your passwords makes it more difficult to hack.

    Rate this question:

  • 5. 

    How often should passwords be changed? 

    • A.

      Every year

    • B.

      Every 60 days

    • C.

      Never

    • D.

      Every 6 months

    Correct Answer
    B. Every 60 days
    Explanation
    Correct! Passwords should be changed at least every six (6) months, and in order to maintain security you should not use the same password for multiple log-ins or the same password within the same year.

    Rate this question:

  • 6. 

    Your supervisor is very busy and asks you to log into the the server using his/her username and password to retrieve some reports. What should you do? 

    • A.

      It's your boss, so it's okay to do this.

    • B.

      Ignore the request and hope he/she forgets.

    • C.

      Decline the request and remind your supervisor that it is against company policy.

    Correct Answer
    C. Decline the request and remind your supervisor that it is against company policy.
    Explanation
    C is correct. Decline the request and remind your supervisor that it is against ISI policy. Passwords must not be shared. If pressured further, report the situation to HR. If you have questions, contact the IT Department at [email protected]

    Rate this question:

  • 7. 

    You receive an email with an attachment from "I.T. Security." The email says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do?  

    • A.

      Follow the instructions ASAP to avoid the virus.

    • B.

      Open the email attachment to see what is says before proceeding

    • C.

      Reply to the sender and say "take me off this list".

    • D.

      Delete the message from the unknown source.

    • E.

      Contact the IT Department and ask about the email before doing anything

    Correct Answer
    E. Contact the IT Department and ask about the email before doing anything
    Explanation
    4 is correct.
    Attachments can contain viruses and other malicious programs that can infect your computer, so opening or clicking on an unexpected or unknown attachment can be risky.

    If you can tell that this is spam, delete the E-Mail message. If you are unsure, contact the IT Department for further instructions.

    Do not open, reply to or forward suspicious emails or attachments.

    Rate this question:

  • 8. 

    You received an email like following image. What you should not do?

    • A.

      Reply to the mail and retrieve a the cash amount.

    • B.

      Forward the message to other friends to share it

    • C.

      Call IT and ask them to help it for you

    • D.

      Delete the message without sending a reply

    Correct Answer
    D. Delete the message without sending a reply
    Explanation
    4 - Delete the Message

    This scenerio has four (4) big risks:

    1) Some screen savers contain viruses or other malicious software and it is risky to put unknown or unsolicited programs or software onto your computer;

    2) Also, in some cases just clicking on a malicious program can infect a computer, so unless you are sure a link is safe- don't click on it.

    3) Email addresses can be faked - or hacked. There is no way to be certain of this without checking.

    4) Finally, some websites and links look legitimate, but they're really hoaxes designed to steal your information.

    Rate this question:

  • 9. 

    Which workstation security safeguards are YOU responsible for protecting?  

    • A.

      User I.D

    • B.

      Password

    • C.

      Logging off programs

    • D.

      Locking up office or work areas (cabinets, doors, windows)

    • E.

      All of the above

    Correct Answer
    E. All of the above
    Explanation
    All of the Above.

    Security is the responsibility of everyone within the office and each person needs to be diligent about protecting their usernames, passwords, and any other sensitive, confidential and personally identifiable information.

    Rate this question:

  • 10. 

    The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?  

    • A.

      Call your co-workers over so they can see.

    • B.

      Disconnect your computer from the network.

    • C.

      Tell your supervisor

    • D.

      Turn your computer off.

    • E.

      Run Anti-Virus

    Correct Answer(s)
    B. Disconnect your computer from the network.
    C. Tell your supervisor
    Explanation
    Disconnect your computer from the network and then tell your supervisor.

    Computers can be controlled remotely, and hackers can access computers by cracking paswords and usernames. If this happens, it is best to disconnect the computer from the network, to prevent access to the rest of the company files and wait until help arrives. If possible - DO NOT TURN OFF THE COMPUTER.

    Rate this question:

  • 11. 

    which of the following can be use to identify a phishing email??

    • A.

      Poor spelling and/or grammar

    • B.

      Content threatening/urgent phases

    • C.

      Containing hyperlinks

    • D.

      There is no way to be certain that a link from an email will be safe.

    Correct Answer(s)
    A. Poor spelling and/or grammar
    B. Content threatening/urgent phases
    D. There is no way to be certain that a link from an email will be safe.
    Explanation
    Poor spelling and/or grammar, content threatening/urgent phases, and the uncertainty of the safety of a link from an email can all be used to identify a phishing email. Phishing emails often contain spelling and grammar mistakes, as they are usually sent by scammers who may not have a strong command of the language. They also tend to use threatening or urgent language to create a sense of urgency and manipulate the recipient into taking immediate action. Additionally, it is impossible to guarantee the safety of a link from an email, as it could lead to a malicious website or download.

    Rate this question:

  • 12. 

    A web browser pop-up appears on your personal computer offering an "anti-spyware product" .What's your best course of action? 

    • A.

      Click on the link and provide your credit card information as the more protection prompted to install the better.

    • B.

      Click on the link in the ad to learn more about the company its products before your decide.

    • C.

      Close the window. If you want spyware protection software, or are unsure if you have up-to-date anti-spyware software, it is best to speak with the IT Specialist.

    Correct Answer
    C. Close the window. If you want spyware protection software, or are unsure if you have up-to-date anti-spyware software, it is best to speak with the IT Specialist.
    Explanation
    The best course of action is to close the window. This is because the pop-up offering an "anti-spyware product" is likely a scam or a form of malware. Clicking on the link and providing credit card information can lead to identity theft or financial loss. It is always safer to consult with an IT specialist to ensure that you have legitimate and up-to-date anti-spyware software.

    Rate this question:

  • 13. 

    It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Even though email messages get scanned via multiple vendors for malware, spyware and phishing, there is no guarantee that they will catch every instance of malware. It is recommended that you only open attachments and click on links if messages are from an individual you know. Enabling Safe Senders for Outlook is a good way to accomplish this.

    Rate this question:

  • 14. 

    Which of the following should you not do with your password?

    • A.

      Say it out loud as you are typing it in

    • B.

      Email it to another team member

    • C.

      Provide it to your supervisor

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Passwords are meant to be secret and only known by you and not shared in any way.

    Rate this question:

  • 15. 

    Most information security breaches occur due to  

    • A.

      Amazing External Hackers

    • B.

      Poor Programming Techniques

    • C.

      Internal Employees

    • D.

      Bad Firewall Settings

    Correct Answer
    C. Internal Employees
    Explanation
    Internal employees tend to be the cause of the most information security breaches

    Rate this question:

  • 16. 

    If you are browsing the Internet and suddenly you get a prompt asking you to download a file and run it, what should you do?

    • A.

      Download the file and check the file before run it.

    • B.

      Download the file and run it

    • C.

      Download the file and e-mail it to a co-worker to see if it is legitimate.

    • D.

      Cancel the prompt without downloading the file

    Correct Answer
    B. Download the file and run it
    Explanation
    If you are prompted to download a file when simply browsing the internet, then chances are you've navigated to a site that is infected and is trying to infect you. It is best to cancel the download, close the browser and run a full AV scan on your machine.

    Rate this question:

  • 17. 

    You receive an e-mail message from a widow in Turks and Caicos. What do you do?

    • A.

      Forward it to all of your friends

    • B.

      Follow all his instructions to the letter and wait for your check in the mail

    • C.

      Delete the message

    Correct Answer
    C. Delete the message
    Explanation
    These types of e-mails are called 419 or 411 scams. These are e-mails that try to encourage you to perform fraudulent activities on behalf of someone in another country (such as laundering money).

    Rate this question:

  • 18. 

    You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords) for an approved, business need. What should you do?

    • A.

      Ensure you are using an encrypt method of sending email

    • B.

      Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands

    • C.

      Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands

    Correct Answer
    A. Ensure you are using an encrypt method of sending email
    Explanation
    To ensure the security and privacy of the private information being sent and received via email, it is important to use an encryption method. Encryption converts the information into a code that can only be deciphered by authorized parties, thus protecting it from unauthorized access. This is crucial when dealing with sensitive data such as medical records, salary information, social security numbers, and passwords, as it reduces the risk of the information falling into the wrong hands.

    Rate this question:

  • 19. 

    Clicking website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc.) can be harmful. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    You should only access trusted sites (Google, Facebook, Twitter, etc) by entering the URL directly or via a bookmark. Clicking on links in e-mail and from other untrusted sites may allow an attacker to steal or capture your credentials.

    Rate this question:

  • 20. 

    When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the URL starts with 'https" to insure the transaction is protected by SSL encryption. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Before you enter sensitive data in a web form or on a webpage, look for signs—like a web address with https and a closed padlock beside it—that it is secure.

    Rate this question:

  • 21. 

    Which of the following is true when it comes to official e-mail provided to employees ?

    • A.

      Email is considered company property

    • B.

      An employee has the right to keep email private

    • C.

      Email may be retrieved and reviewed for any number of reasons including legal supoenas

    • D.

      Both A and C

    Correct Answer
    D. Both A and C
    Explanation
    When it comes to official e-mail provided to employees, it is true that email is considered company property. This means that the company has ownership and control over the content of the emails. Additionally, it is also true that email may be retrieved and reviewed for any number of reasons, including legal subpoenas. This implies that the company has the right to access and review employee emails if necessary, such as for legal investigations or compliance purposes.

    Rate this question:

  • 22. 

    Physical and administrative security standards also apply to handheld devices that are used for business purposes at the organization.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Physical and administrative security standards are important for protecting sensitive information and ensuring the overall security of an organization's assets. Handheld devices, such as smartphones and tablets, are commonly used for business purposes and can store or access sensitive data. Therefore, it is necessary for these devices to comply with the same security standards as other devices within the organization to prevent unauthorized access or data breaches.

    Rate this question:

  • 23. 

    Employees responsibility for information security include:(Select all that apply).

    • A.

      Complete all required training

    • B.

      Adhere to established policies and procedures

    • C.

      Contact IT Department/ Manager concerning suspicious activity or disclosure of non-public information

    • D.

      Company guidelines

    Correct Answer(s)
    A. Complete all required training
    B. Adhere to established policies and procedures
    C. Contact IT Department/ Manager concerning suspicious activity or disclosure of non-public information
    D. Company guidelines
    Explanation
    Employees have multiple responsibilities when it comes to information security. They must complete all required training to ensure they have the necessary knowledge and skills to protect sensitive information. They are also expected to adhere to established policies and procedures, which serve as guidelines for maintaining information security. Additionally, if employees come across any suspicious activity or encounter a potential disclosure of non-public information, they should promptly report it to the IT department or their manager. Following company guidelines is another important responsibility employees have in order to ensure information security.

    Rate this question:

  • 24. 

    Employees must secure all non-public information in a manner to which it cannot be retrieved by any unauthorized party, such as in a locked drawer or locked file cabinet.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because it emphasizes the importance of securing non-public information. It states that employees must ensure that such information is stored in a way that unauthorized individuals cannot access it. This can be achieved by using locked drawers or file cabinets, which provide an additional layer of protection against unauthorized retrieval. By following these guidelines, organizations can maintain the confidentiality and integrity of sensitive information.

    Rate this question:

  • 25. 

    Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?  

    • A.

      Browsing.

    • B.

      Phishing

    • C.

      Encoding

    • D.

      Blogging

    Correct Answer
    B. Phishing
    Explanation
    Phishing is a scheme where criminals send unsolicited e-mail or pop-up messages to deceive and trick unsuspecting victims into providing personal and financial information. This information is then used for fraudulent purposes such as identity theft or financial fraud.

    Rate this question:

  • 26. 

    What is the importance of backing up data?

    • A.

      To ensure that data is available when you need to access

    • B.

      To recover quickly if there is a malware infection

    • C.

      To ensure the data safety

    • D.

      All the above

    Correct Answer
    D. All the above
    Explanation
    Backing up data is important for several reasons. Firstly, it ensures that data is available when it is needed to be accessed. This is crucial in case of any accidental deletion, hardware failure, or system crash. Secondly, backing up data helps in recovering quickly if there is a malware infection. Malware attacks can corrupt or delete data, and having a backup ensures that the data can be restored easily. Lastly, backing up data ensures the safety of the data. In case of any natural disasters, theft, or physical damage to the storage devices, having a backup ensures that the data is not lost permanently.

    Rate this question:

  • 27. 

    When is the best time to lie to your information security auditor or officer?

    • A.

      If you want to cover up your best friend’s faults or mistakes

    • B.

      If the security auditor is not your friend and cannot be trusted

    • C.

      If it impacts the termination of the key people in your organization

    • D.

      None of the above

    Correct Answer
    D. None of the above
    Explanation
    The best time to lie to your information security auditor or officer is never. Lying to cover up someone else's mistakes or faults, distrusting the security auditor, or trying to protect key individuals in your organization are all unethical and can have serious consequences. It is always important to maintain honesty and integrity when dealing with information security.

    Rate this question:

  • 28. 

    When an employee transfers within an organization …

    • A.

      The employee must undergo a new security review

    • B.

      The old system IDs must be disabled.

    • C.

      All access permission should be reviewed.

    • D.

      The employee must turn in all access devices.

    Correct Answer
    C. All access permission should be reviewed.
    Explanation
    When an employee transfers within an organization, it is important to review all access permissions. This is necessary to ensure that the employee only has access to the necessary resources and information in their new role. By reviewing access permissions, the organization can prevent any unauthorized access and maintain the security of their systems and data. This step is essential in maintaining the integrity of the organization's security measures and protecting sensitive information from potential breaches.

    Rate this question:

  • 29. 

    What are the physical security best practices?

    • A.

      Don’t let anyone in if they can’t get in themselves

    • B.

      If there is a badge to be wore, it should be wearing when you’re leaving the office as well

    • C.

      Insist on seeing ID from people you don’t know

    • D.

      Don’t let strangers “mess” with anything even if they do have ID

    • E.

      Let the visitors wander around the office so that they can get a clear idea about your work

    Correct Answer(s)
    A. Don’t let anyone in if they can’t get in themselves
    C. Insist on seeing ID from people you don’t know
    D. Don’t let strangers “mess” with anything even if they do have ID
    Explanation
    The correct answer includes three physical security best practices. The first practice is to not let anyone in if they can't gain access themselves, which ensures that only authorized individuals are allowed entry. The second practice is to insist on seeing identification from people who are unfamiliar, which helps verify their identity and prevents unauthorized access. The third practice is to not allow strangers to tamper with anything, even if they have identification, as this helps protect sensitive information and resources.

    Rate this question:

  • 30. 

    “Revoking the access to the any asset of the organization when an employee/contractor is terminated is a good option." What do you think about the above statement?

    • A.

      It is not good as past employees should have the access to office to have a chat with other employees

    • B.

      Termination of contractor’s access is fine but termination of employee’s access is not good

    • C.

      Agree with the above statement

    • D.

      Disagree with the above statement

    Correct Answer
    D. Disagree with the above statement
    Explanation
    Disagreeing with the statement implies that revoking access to any asset of the organization when an employee/contractor is terminated is not a good option. This could be because past employees should not have access to confidential information or resources after they leave the organization, as it could pose a security risk. Additionally, it is important to protect the organization's assets and ensure that only authorized individuals have access to them.

    Rate this question:

  • 31. 

    Is it legal to copy software from Office PC to your laptop or home PC?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    It is not legal to copy software from an Office PC to your laptop or home PC without proper authorization. Software is protected by copyright laws, and copying it without permission is a violation of those laws. It is important to obtain the necessary licenses or permissions to use the software on each device separately.

    Rate this question:

  • 32. 

    Why does enabling Two-Factor Authentication increase your security?

    • A.

      Forces you to have a password longer than two characters

    • B.

      Requires "something you know" and "something you have" to log into your account

    • C.

      Makes you do math before sending a text to ensure you’re not intoxicated

    • D.

      Allows you to unlock your phone by taking two consecutive selfies

    Correct Answer
    B. Requires "something you know" and "something you have" to log into your account
    Explanation
    Enabling Two-Factor Authentication increases your security because it adds an extra layer of protection to your account. It requires you to provide not only something you know (like a password) but also something you have (like a physical device or a unique code). This makes it much more difficult for unauthorized individuals to access your account, even if they manage to obtain your password. By combining these two factors, it significantly reduces the risk of unauthorized access and enhances the overall security of your account.

    Rate this question:

  • 33. 

    In order to avoid spreading malicious programs through email is to not open unexpected e-mail attachments from unknown sources.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Opening unexpected email attachments from unknown sources can indeed lead to the spreading of malicious programs. Malicious programs, such as viruses or malware, can be disguised as innocent-looking attachments and can infect a computer or network when opened. By not opening such attachments, individuals can protect themselves and their devices from potential harm. Therefore, the statement "In order to avoid spreading malicious programs through email is to not open unexpected e-mail attachments from unknown sources" is true.

    Rate this question:

  • 34. 

    Which of the following message attachments would you be wise not to open? A message with an attachment that:

    • A.

      Appears more than once in your Inbox

    • B.

      Says it's a sample copy of a new game from a recognized company e-mail address

    • C.

      Is an unexpected note from a friend

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of the above message attachments would be wise not to open. This is because a message with an attachment that appears more than once in your Inbox could be a sign of a spam or phishing attempt. Similarly, a message claiming to be a sample copy of a new game from a recognized company e-mail address could be a potential malware or virus. Lastly, an unexpected note from a friend could also be a disguise for a malicious attachment. Therefore, it is best to exercise caution and avoid opening any of these message attachments.

    Rate this question:

  • 35. 

    It's a best practice to lock/logout your office computer if you leave the place.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Locking or logging out of your office computer when you leave the place is considered a best practice for security reasons. By doing so, you ensure that unauthorized individuals cannot access your computer and its data in your absence. This helps protect sensitive information, prevent unauthorized use of your computer, and maintain the privacy and security of your work.

    Rate this question:

  • 36. 

    Hitting the Delete key on your computer will erase the information from your computer completely.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Pressing the Delete key on a computer keyboard typically moves the selected file or folder to the Recycle Bin or Trash, rather than permanently erasing it. However, if the file or folder is already located in the Recycle Bin or Trash, pressing the Delete key will permanently delete it from the computer. Therefore, the statement is true as hitting the Delete key can lead to the complete erasure of information from the computer.

    Rate this question:

  • 37. 

    What is the biggest vulnerability to computer information security?

    • A.

      Instant Messaging, Peer-to-Peer (P2P) applications

    • B.

      Malware - virus, worms, spyware

    • C.

      Spam, Phishing attacks.

    • D.

      End Users

    Correct Answer
    D. End Users
    Explanation
    End users are considered the biggest vulnerability to computer information security because they are often unaware of the risks and best practices for maintaining security. They may unknowingly click on malicious links or download infected files, making them susceptible to malware and phishing attacks. Additionally, end users may have weak passwords or fail to keep their software and devices updated, creating further vulnerabilities. It is crucial to educate and train end users on security measures to minimize the risk of breaches and protect sensitive information.

    Rate this question:

  • 38. 

    Where should you write down your passwords ?

    • A.

      Someplace easily seen from your computer.

    • B.

      Someplace that is out of sight, like beneath your keyboard or in a nearby drawer.

    • C.

      Wherever you really need it for your memory, but this information can only be kept in a secure

    • D.

      You should never write down your password.

    Correct Answer
    D. You should never write down your password.
    Explanation
    Writing down your password is not recommended because it increases the risk of it being discovered by someone else. Even if you think you have hidden it well, there is always a chance that someone may find it. It is best to memorize your passwords or use a password manager to securely store them.

    Rate this question:

  • 39. 

    Which of the following is a good way to create a password?

    • A.

      Letter or number sequences.

    • B.

      Your children's or pet's names.

    • C.

      Substituting numbers of letters, such as 3 for E.

    • D.

      A combination of upper and lowercase letters mixed with numbers and symbols.

    Correct Answer
    D. A combination of upper and lowercase letters mixed with numbers and symbols.
    Explanation
    A combination of upper and lowercase letters mixed with numbers and symbols is a good way to create a password because it increases the complexity and makes it harder for hackers to guess or crack the password. Including a mix of different character types adds an extra layer of security and makes the password stronger.

    Rate this question:

  • 40. 

    Which of the following would be the best password?

    • A.

      BobJones

    • B.

      App@li

    • C.

      12345

    • D.

      ABcdEFgh

    Correct Answer
    B. App@li
    Explanation
    The password "App@li" would be the best choice because it includes a combination of uppercase and lowercase letters, as well as special characters. This makes it more secure and harder to guess or crack. The other options either lack complexity or are too common and easily guessable.

    Rate this question:

  • 41. 

    It is ok to use my favorite login password for all accounts.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Using the same login password for all accounts is not recommended because if one account gets hacked, all other accounts become vulnerable. It is best to use unique and strong passwords for each account to ensure maximum security.

    Rate this question:

  • 42. 

    Passwords are used as:

    • A.

      A first line of defense against hackers

    • B.

      As a means to frustrate users

    • C.

      There is no real purpose for passwords

    • D.

      As a means of testing creativity

    Correct Answer
    A. A first line of defense against hackers
    Explanation
    Passwords are used as a first line of defense against hackers because they provide a layer of security for accessing sensitive information. By requiring a password, it becomes more difficult for unauthorized individuals to gain access to personal accounts or systems. This helps to protect against potential threats and unauthorized access, making passwords an essential security measure in today's digital world.

    Rate this question:

  • 43. 

    What is one of the ways that you can secure your password from disclosure

    • A.

      By making a note on your diary

    • B.

      Writing down on a notepad on your table so that you can easy find it

    • C.

      Use a password manager with encryption features

    • D.

      Write it on a piece of paper and keep it in your wallet

    Correct Answer
    C. Use a password manager with encryption features
    Explanation
    Using a password manager with encryption features is one of the ways to secure your password from disclosure. Password managers securely store and encrypt your passwords, making it difficult for hackers to access them. They also often have features like generating strong, unique passwords and automatically filling them in for you, reducing the need to remember or write down passwords. This method ensures that your passwords are protected and easily accessible only to you, enhancing the security of your accounts.

    Rate this question:

  • 44. 

    Which of the following Rules of Thumb for passwords do not apply?

    • A.

      Do not use words found in any dictionary.

    • B.

      Do not use personal references (for example: names, birthdays, addresses).

    • C.

      Have your friend keep a copy of your password in case you forget.

    • D.

      Follow the rules for creating good, strong passwords

    Correct Answer
    C. Have your friend keep a copy of your password in case you forget.
    Explanation
    The rule of thumb "Have your friend keep a copy of your password in case you forget" does not apply because it goes against the principle of keeping passwords confidential. Sharing passwords with others, even trusted friends, increases the risk of unauthorized access to personal accounts and compromises security. It is always recommended to rely on secure methods like password managers or password recovery options provided by the service providers themselves to regain access to forgotten passwords.

    Rate this question:

  • 45. 

    You came across a website that looks exactly like Facebook but it has a different domain which you have never heard of, which of the following is the best course of action that should be taken?

    • A.

      Hack that website and deface it then post it on Facebook or Twitter

    • B.

      Launch DDoS (Distributed Denial of Service) attacks into that website with the help of your friends if you can’t hack it in order to take it offline then post it in Facebook or Twitter. #TangoDown!

    • C.

      Just ignore that website and login to https://facebook.com instead

    • D.

      Report it to the IT security team

    Correct Answer
    C. Just ignore that website and login to https://facebook.com instead
    Explanation
    The best course of action in this situation is to ignore the website and login to the official Facebook website instead. This is because the website in question is a potential phishing or scam site that is designed to deceive users. By ignoring it and accessing the legitimate Facebook website, you can ensure the security of your personal information and avoid falling victim to any fraudulent activities. Reporting it to the IT security team is also a good idea to help protect other users from potential harm.

    Rate this question:

  • 46. 

    While visiting your favorite website for downloading the Firefox browser, a popup appears that says, “You just won 100,000 US dollars! Click this link to claim your prize." What should you do?

    • A.

      Ignore that popup and just download the Firefox browser

    • B.

      Click the popup and claim your prize

    • C.

      Report the popup and the details to the website administrator and don’t download the Firefox browser

    • D.

      Share the link to your friends, classmates and colleagues so that they could also claim the prize because sharing is caring

    Correct Answer
    A. Ignore that popup and just download the Firefox browser
    Explanation
    The correct answer is to ignore the popup and just download the Firefox browser. This is because the popup is likely a scam or phishing attempt to deceive users into clicking on a malicious link. It is important to be cautious and not fall for such scams, as they could lead to malware infections or identity theft. It is always safer to download software directly from trusted sources rather than clicking on suspicious popups.

    Rate this question:

  • 47. 

    Your college best friend has just sent you a chat in Facebook and sent with a link. The link is a shortened URL for example https://goo.gl/wf4V8Z, what should you do?

    • A.

      Click the link because it shouldn’t be malicious since he/she is your best friend after all. There is nothing to worry about.

    • B.

      Do not click the link and try to check the URL using an online tool that checks where it really takes you.

    • C.

      Contact your local Computer Emergency Response / Readiness Team because it may contain malicious software.

    • D.

      Install antivirus software, then click the link.

    Correct Answer
    B. Do not click the link and try to check the URL using an online tool that checks where it really takes you.
    Explanation
    The correct answer is to not click the link and try to check the URL using an online tool that checks where it really takes you. This is because shortened URLs can be used to hide malicious websites or phishing attempts. By checking the URL before clicking, you can ensure that it is safe and avoid potential security risks.

    Rate this question:

  • 48. 

    You went to Starbucks to buy a coffee and then while waiting for your order, you decided to connect to their Free WiFi. While browsing to your Google Mail (https://mail.google.com/), the page redirects to http://www.googlemail.andrew.net. What do you think should you do?

    • A.

      Login to where Google Mail has redirected, it’s just one of Google’s web sites – not suspicious at all.

    • B.

      Disconnect to Starbuck’s WIFI network.

    • C.

      Ask the person sitting next to you if his Google Mail also redirects to http://www.googlemail.andrew.net.

    • D.

      Find the Wireless Access Point and reboot it

    Correct Answer
    B. Disconnect to Starbuck’s WIFI network.
    Explanation
    The correct answer is to disconnect from Starbucks' WIFI network. This is because the redirection from the legitimate Google Mail website to a different website (http://www.googlemail.andrew.net) is suspicious and could indicate a potential security threat. It is important to prioritize the security of personal information and avoid connecting to potentially malicious networks.

    Rate this question:

  • 49. 

    Which of the following could help you mitigate malwares and viruses from infecting your PC?

    • A.

      Download software from trusted sources only

    • B.

      Install an antivirus program and a firewall

    • C.

      Always update your PC when prompted for system updates

    • D.

      Install Wireshark to monitor and analyze the traffic of your network

    Correct Answer
    B. Install an antivirus program and a firewall
    Explanation
    Installing an antivirus program and a firewall can help mitigate malwares and viruses from infecting your PC. Antivirus programs can detect and remove malicious software, while firewalls can block unauthorized access to your network and prevent malware from entering your system. By having both of these security measures in place, you can significantly reduce the risk of malware and virus infections on your PC.

    Rate this question:

  • 50. 

    Viruses are always caught by modern antivirus software.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Modern antivirus software is designed to detect and remove viruses from computer systems. It constantly updates its virus definitions to stay up-to-date with the latest threats. Therefore, it is highly effective in catching viruses and protecting the system from potential harm. Hence, the statement "Viruses are always caught by modern antivirus software" is true.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 23, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 25, 2017
    Quiz Created by
    Asasasasa
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.