Security For It Users Mock 1

36 Questions | Total Attempts: 3579

SettingsSettingsSettings
Please wait...
It Security Quizzes & Trivia

In modern times, the use of computers and the internet in particular has never been more important. As such, it’s even more important that you know how to safely conduct yourself online. Take the quiz to find out how.


Questions and Answers
  • 1. 
    • A. 

      Viruses

    • B. 

      Trojans

    • C. 

      Hoaxes

    • D. 

      Spam

  • 2. 
    • A. 

      Using anti-virus software

    • B. 

      Using anti-spam software

    • C. 

      Never using free email sites.

    • D. 

      Using a firewall

  • 3. 
    Question 3 - Which one of the following describes how a virus can enter a computer
    • A. 

      By installing licensed software

    • B. 

      By forwarding email attachments from an unknown source

    • C. 

      By opening email attachments from an unknown source

    • D. 

      By not downloading files from obscure websites.

  • 4. 
    Question 4 - What action should you take if you receive a chain letter email?
    • A. 

      Forward the email to others

    • B. 

      Download it onto your system

    • C. 

      Open it immediately

    • D. 

      Delete the email

  • 5. 
    Question 5 -Which one fo the following best describes phishing??
    • A. 

      An email directing the recipient to enter personal details on a fake website

    • B. 

      An email warning the recipient of a computer virus threat

    • C. 

      An email advertyising a department store

    • D. 

      An unwanted email that installs a virus on the recipeint's computer

  • 6. 
    Question 6 - To ensure that anti-virus software is effective you must?
    • A. 

      Install windows software updates

    • B. 

      Update the anti-virus software regularly

    • C. 

      Restrict computer access to known persons

    • D. 

      Install the latest versions of software

  • 7. 
    Question 7 - Which one of the following will minimize the risk of your computer from being infected by a malicious program?
    • A. 

      PC diadnostic software

    • B. 

      Anti-spyware software

    • C. 

      Key management software

    • D. 

      Anti-spam software

  • 8. 
    Question 8 - Which product below protects a computer from the risk of malicious programs?
    • A. 

      PC diagnostic software.

    • B. 

      Anti-spyware software.

    • C. 

      Key management software

    • D. 

      Anti-spam software

  • 9. 
    Question 9 - Internet-based attacks on your computer are prevented by which of the following?
    • A. 

      Firewall software

    • B. 

      Anti-spam software

    • C. 

      Anti-virus software

    • D. 

      Anti Malware software

  • 10. 
    Question 10 -A computer hacker can be described as?
    • A. 

      A skilled programmer who writes computer games.

    • B. 

      A skilled programmer who creates software and trains youngsters on how to write software.

    • C. 

      A skilled programmer who uses authorised access to exploit information available on a computer.

    • D. 

      A skilled programmer who secretly invades computers without authorisation.

  • 11. 
    • A. 

      Easy visibility to other users.

    • B. 

      Fast access.

    • C. 

      High resistance to application of updates.

    • D. 

      Low resistance to potential hackers.

  • 12. 
    Question 12 - Your user information, including your password, can be changed using which of the following?
    • A. 

      Task manager.

    • B. 

      Control Panel.

    • C. 

      MS Word Options.

    • D. 

      Windows Firewall.

  • 13. 
    Question 13 - The BEST way to remember a password is?
    • A. 

      Commit it to memory

    • B. 

      Keep a note of it in your wallet.

    • C. 

      Tell your manager.

    • D. 

      Use the name of your Cat.

  • 14. 
    Question 14 - A user name and password are entered when logging onto a computer. Which one of the following is a feature of using a user name?
    • A. 

      It authenticates the user and gives access to all information.

    • B. 

      It limits access to relevant levels of information.

    • C. 

      It enables an accurate audit trail of transactions to be kept.

    • D. 

      It gives the user anonymity.

  • 15. 
    Question 15 - Why should users log off from a computer when they are finished for the day?
    • A. 

      To reduce the use of electricity.

    • B. 

      To prevent data from getting corrupted.

    • C. 

      To prevent unauthorised access to data

    • D. 

      To cool off the hardware

  • 16. 
    Question 16 - Which one of the following statements shows respect for confidentiality of information?
    • A. 

      Discussing confidential information over a telephone line.

    • B. 

      Uploading confidential information to a shared web site.

    • C. 

      Disclosing confidential information only to authorised systems or individuals

    • D. 

      Posting confidential data on your company notice board

  • 17. 
    Question 17 - If you disclose inappropriate or personal information on a fake website, which one of the following is the MOST damaging consequence?
    • A. 

      Theft of identity.

    • B. 

      Data corruption.

    • C. 

      Loss of job.

    • D. 

      Intimidation

  • 18. 
    Question 18 - Why do we use a PIN number on a mobile device?
    • A. 

      It encrypts information being stored on a computer

    • B. 

      It protects information from risk of unauthorised access.

    • C. 

      It decrypts information being stored on a computer

    • D. 

      It removes the need for a password.

  • 19. 
    Question 19 - Which one of the following is a facility of a public network?
    • A. 

      Public service.

    • B. 

      No data security

    • C. 

      . Access to all confidential information

    • D. 

      Resource sharing

  • 20. 
    Question 20 - Which one of the following statements about wireless networks is TRUE?
    • A. 

      They cannot be intercepted by unknown users.

    • B. 

      They can be visible and accessible to other users.

    • C. 

      They work over long distances.

    • D. 

      They limit accessibility to other users.

  • 21. 
    Question 21 - Using an unsecured network is sometimes unavoidable, which one of the following describes how confidential information should be sent in that situation?
    • A. 

      In a compressed only format.

    • B. 

      In an encrypted format.

    • C. 

      In an unsigned email.

    • D. 

      As quickly as possible.

  • 22. 
    Question 22 - Which one of the following describes Bluetooth?
    • A. 

      . Long-range wireless protocol for exchanging data

    • B. 

      Short-range wireless protocol for exchanging data

    • C. 

      Long-range wired protocol for exchanging data

    • D. 

      Short-range wired protocol for exchanging data

  • 23. 
    Question 23 - Where would the guidelines and procedures for the secure use of IT within an organization be held?
    • A. 

      The IT Department.

    • B. 

      The Company Director’s office.

    • C. 

      The Purchasing Department

    • D. 

      The Sales Department.

  • 24. 
    Question 24 - How would you find out about an organisation’s privacy policy?
    • A. 

      By reading the latest issue of the Financial Times

    • B. 

      By speaking to the Finance Department.

    • C. 

      By reading the policy in the organisation’s policy manual

    • D. 

      By speaking to the Sales Department

  • 25. 
    Question 25 - If you wanted to use a device that is NOT part of the organisation’s IT infrastructure, what IT security checks should you carry out before using it?
    • A. 

      The checks listed in the device manual

    • B. 

      Interview the requesting person

    • C. 

      The checks advised by a fellow worker

    • D. 

      The checks listed in the organisation’s security policy

  • 26. 
    Question 26 - If you were asked to allow access to a shared IT resource, who would you ask if you were unsure of the security procedure?
    • A. 

      A technically well-informed team member

    • B. 

      A senior member of the cleaning Department

    • C. 

      The Systems Administrator

    • D. 

      . The Maintenance Department

  • 27. 
    Question 27 - How would a breach in IT security be reported?
    • A. 

      By letter to your manager

    • B. 

      Using the telephone

    • C. 

      Using the channel identified in the organisation’s security policy

    • D. 

      By emailing the IT Manager.

  • 28. 
    Question 28 - If you were to select a large group of adjacent files and delete them, What could be an unexpected consequence?
    • A. 

      The computer may crash

    • B. 

      The selected files will be moved to the Recycle Bin

    • C. 

      An important file may accidentally be deleted

    • D. 

      A delete file confirmation window may appear

  • 29. 
    Question 29 - What could happen if a computer suddenly malfunctions due to overheating?
    • A. 

      The operating system will automatically save all files and shutdown.

    • B. 

      All open files will be recovered

    • C. 

      All off-site backups will be lost.

    • D. 

      Any files saved only on the hard disk of the computer may be lost.

  • 30. 
    Question 30 - Why it is important to have a secure, off-site backup copy of files?
    • A. 

      To ensure that in the event of fire, flood or theft backup files are not destroyed

    • B. 

      To make the files easily accessible to other locations of the organisation

    • C. 

      To enable speedy recovery

    • D. 

      To reduce the chance of data corruption due to a virus attack

  • 31. 
    Question 31 - How can you best safeguard your personal data?
    • A. 

      Keep it in your pocket

    • B. 

      Using misleading file names

    • C. 

      Saving files in your Documents folder

    • D. 

      Making multiple copies of the data.

  • 32. 
    Question 32 - Which one of the following should you use to backup personal data?
    • A. 

      A storage device, clearly labelled

    • B. 

      A printout

    • C. 

      A website offering a file sharing service

    • D. 

      A shared area on a server

  • 33. 
    Question 33 - How would you prevent theft of your laptop if you needed to leave your desk for a short period?
    • A. 

      Leave it with a security guard

    • B. 

      Leave it with your supervisor

    • C. 

      . Close the lid

    • D. 

      Use a security cable to secure it to the desk

  • 34. 
    Question 34 - Where would be a safe place to keep your MP3 player whilst you are in a public place?
    • A. 

      Out of sight, on your person

    • B. 

      Leave it on the bar

    • C. 

      In your jacket pocket hanging over a chair

    • D. 

      In your open bag on the floor

  • 35. 
    Question 35 - How could confidential data stored on a USB memory stick be lost?
    • A. 

      When the data stored on the storage device is encrypted

    • B. 

      When the storage device is lost or stolen during transit

    • C. 

      When the data files on the storage device are scanned for viruses.

    • D. 

      When the storage device is accessed by a wireless device

  • 36. 
    Question 36 - How could a portable or removable device can be protected from theft when NOT in use?
    • A. 

      By using a firewall

    • B. 

      By using a device lock

    • C. 

      By using anti virus software

    • D. 

      By locking it in a drawer