Quiz: Security Awareness In Business

76 Questions | Attempts: 1189
Share

SettingsSettingsSettings
Quiz: Security Awareness In Business - Quiz

In a business, it is essential to protect online assets. Why not take this quiz to learn about security awareness in business? The questions in our quiz are carefully curated to help you get the best in-depth information on the topic. Do you think you can ace this quiz? All the questions in our test are compulsory, so make sure to read all the questions carefully before answering. Remember to share this quiz with your friends for a fun learning time. Good Luck, and keep learning!


Questions and Answers
  • 1. 
    Where should keep your password in case you forget it?
    • A. 

      Someplace easily seen from your computer

    • B. 

      Someplace out of sight like in a drawer or under your keyboard

    • C. 

      If you have to write down your password, it should be stored in a password keeper or vault.

  • 2. 
    It is not safe to e-mail business documents to your home computer to work on them.
    • A. 

      True

    • B. 

      False

  • 3. 
    Which three methods will reduce the chances that your password will be compromised? 
    • A. 

      Make your password a combination of uppercase, lower case, Special characters and numbers

    • B. 

      Change your password at least once a month

    • C. 

      Use personally identifiable information (such as name, birthdates, and telephone numbers)

    • D. 

      Use same password for all accounts

  • 4. 
    Which of the following passwords is the most secure? 
  • 5. 
    How often should passwords be changed? 
    • A. 

      Every year

    • B. 

      Every 60 days

    • C. 

      Never

    • D. 

      Every 6 months

  • 6. 
    Your supervisor is very busy and asks you to log into the the server using his/her username and password to retrieve some reports. What should you do? 
    • A. 

      It's your boss, so it's okay to do this.

    • B. 

      Ignore the request and hope he/she forgets.

    • C. 

      Decline the request and remind your supervisor that it is against company policy.

  • 7. 
    You receive an email with an attachment from "I.T. Security." The email says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do?  
    • A. 

      Follow the instructions ASAP to avoid the virus.

    • B. 

      Open the email attachment to see what is says before proceeding

    • C. 

      Reply to the sender and say "take me off this list".

    • D. 

      Delete the message from the unknown source.

    • E. 

      Contact the IT Department and ask about the email before doing anything

  • 8. 
    You received an email like following image. What you should not do?
    • A. 

      Reply to the mail and retrieve a the cash amount.

    • B. 

      Forward the message to other friends to share it

    • C. 

      Call IT and ask them to help it for you

    • D. 

      Delete the message without sending a reply

  • 9. 
    Which workstation security safeguards are YOU responsible for protecting?  
    • A. 

      User I.D

    • B. 

      Password

    • C. 

      Logging off programs

    • D. 

      Locking up office or work areas (cabinets, doors, windows)

    • E. 

      All of the above

  • 10. 
    The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?  
    • A. 

      Call your co-workers over so they can see.

    • B. 

      Disconnect your computer from the network.

    • C. 

      Tell your supervisor

    • D. 

      Turn your computer off.

    • E. 

      Run Anti-Virus

  • 11. 
    which of the following can be use to identify a phishing email??
    • A. 

      Poor spelling and/or grammar

    • B. 

      Content threatening/urgent phases

    • C. 

      Containing hyperlinks

    • D. 

      There is no way to be certain that a link from an email will be safe.

  • 12. 
    A web browser pop-up appears on your personal computer offering an "anti-spyware product" .What's your best course of action? 
    • A. 

      Click on the link and provide your credit card information as the more protection prompted to install the better.

    • B. 

      Click on the link in the ad to learn more about the company its products before your decide.

    • C. 

      Close the window. If you want spyware protection software, or are unsure if you have up-to-date anti-spyware software, it is best to speak with the IT Specialist.

  • 13. 
    It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.
    • A. 

      True

    • B. 

      False

  • 14. 
    Which of the following should you not do with your password?
    • A. 

      Say it out loud as you are typing it in

    • B. 

      Email it to another team member

    • C. 

      Provide it to your supervisor

    • D. 

      All of the above

  • 15. 
    Most information security breaches occur due to  
    • A. 

      Amazing External Hackers

    • B. 

      Poor Programming Techniques

    • C. 

      Internal Employees

    • D. 

      Bad Firewall Settings

  • 16. 
    If you are browsing the Internet and suddenly you get a prompt asking you to download a file and run it, what should you do?
    • A. 

      Download the file and check the file before run it.

    • B. 

      Download the file and run it

    • C. 

      Download the file and e-mail it to a co-worker to see if it is legitimate.

    • D. 

      Cancel the prompt without downloading the file

  • 17. 
    You receive an e-mail message from a widow in Turks and Caicos. What do you do?
    • A. 

      Forward it to all of your friends

    • B. 

      Follow all his instructions to the letter and wait for your check in the mail

    • C. 

      Delete the message

  • 18. 
    You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords) for an approved, business need. What should you do?
    • A. 

      Ensure you are using an encrypt method of sending email

    • B. 

      Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands

    • C. 

      Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands

  • 19. 
    Clicking website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc.) can be harmful. 
    • A. 

      True

    • B. 

      False

  • 20. 
    When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the URL starts with 'https" to insure the transaction is protected by SSL encryption. 
    • A. 

      True

    • B. 

      False

  • 21. 
    Which of the following is true when it comes to official e-mail provided to employees ?
    • A. 

      Email is considered company property

    • B. 

      An employee has the right to keep email private

    • C. 

      Email may be retrieved and reviewed for any number of reasons including legal supoenas

    • D. 

      Both A and C

  • 22. 
    Physical and administrative security standards also apply to handheld devices that are used for business purposes at the organization.
    • A. 

      True

    • B. 

      False

  • 23. 
    Employees responsibility for information security include:(Select all that apply).
    • A. 

      Complete all required training

    • B. 

      Adhere to established policies and procedures

    • C. 

      Contact IT Department/ Manager concerning suspicious activity or disclosure of non-public information

    • D. 

      Company guidelines

  • 24. 
    Employees must secure all non-public information in a manner to which it cannot be retrieved by any unauthorized party, such as in a locked drawer or locked file cabinet.
    • A. 

      True

    • B. 

      False

  • 25. 
    Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?  
    • A. 

      Browsing.

    • B. 

      Phishing

    • C. 

      Encoding

    • D. 

      Blogging

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.