SecurITy For IT Users Mock 1

36 Questions | Total Attempts: 3696

SettingsSettingsSettings
Please wait...
IT SecurITy Quizzes & Trivia

In modern times, the use of computers and the internet in particular has never been more important. As such, it’s even more important that you know how to safely conduct yourself online. Take the quiz to find out how.


Questions and Answers
  • 1. 
    • A. 

      Viruses

    • B. 

      Trojans

    • C. 

      Hoaxes

    • D. 

      Spam

  • 2. 
    Question 2 - A computer can be protected from the risk of unwanted emails by?
    • A. 

      Using anti-virus software

    • B. 

      Using anti-spam software

    • C. 

      Never using free email sites.

    • D. 

      Using a firewall

  • 3. 
    Question 3 - Which one of the following describes how a virus can enter a computer
    • A. 

      By installing licensed software

    • B. 

      By forwarding email attachments from an unknown source

    • C. 

      By opening email attachments from an unknown source

    • D. 

      By not downloading files from obscure websites.

  • 4. 
    Question 4 - What action should you take if you receive a chain letter email?
    • A. 

      Forward the email to others

    • B. 

      Download it onto your system

    • C. 

      Open it immediately

    • D. 

      Delete the email

  • 5. 
    Question 5 -Which one fo the following best describes phishing??
    • A. 

      An email directing the recipient to enter personal details on a fake website

    • B. 

      An email warning the recipient of a computer virus threat

    • C. 

      An email advertyising a department store

    • D. 

      An unwanted email that installs a virus on the recipeint's computer

  • 6. 
    Question 6 - To ensure that anti-virus software is effective you must?
    • A. 

      Install windows software updates

    • B. 

      Update the anti-virus software regularly

    • C. 

      Restrict computer access to known persons

    • D. 

      Install the latest versions of software

  • 7. 
    Question 7 - Which one of the following will minimize the risk of your computer from being infected by a malicious program?
    • A. 

      PC diadnostic software

    • B. 

      Anti-spyware software

    • C. 

      Key management software

    • D. 

      Anti-spam software

  • 8. 
    Question 8 - Which product below protects a computer from the risk of malicious programs?
    • A. 

      PC diagnostic software.

    • B. 

      Anti-spyware software.

    • C. 

      Key management software

    • D. 

      Anti-spam software

  • 9. 
    Question 9 - Internet-based attacks on your computer are prevented by which of the following?
    • A. 

      Firewall software

    • B. 

      Anti-spam software

    • C. 

      Anti-virus software

    • D. 

      Anti Malware software

  • 10. 
    Question 10 -A computer hacker can be described as?
    • A. 

      A skilled programmer who writes computer games.

    • B. 

      A skilled programmer who creates software and trains youngsters on how to write software.

    • C. 

      A skilled programmer who uses authorised access to exploit information available on a computer.

    • D. 

      A skilled programmer who secretly invades computers without authorisation.

  • 11. 
    Question 11 - Using the default password on a network is a security risk. Which is the most serious?
    • A. 

      Easy visibility to other users.

    • B. 

      Fast access.

    • C. 

      High resistance to application of updates.

    • D. 

      Low resistance to potential hackers.

  • 12. 
    Question 12 - Your user information, including your password, can be changed using which of the following?
    • A. 

      Task manager.

    • B. 

      Control Panel.

    • C. 

      MS Word Options.

    • D. 

      Windows Firewall.

  • 13. 
    Question 13 - The BEST way to remember a password is?
    • A. 

      Commit it to memory

    • B. 

      Keep a note of it in your wallet.

    • C. 

      Tell your manager.

    • D. 

      Use the name of your Cat.

  • 14. 
    Question 14 - A user name and password are entered when logging onto a computer. Which one of the following is a feature of using a user name?
    • A. 

      It authenticates the user and gives access to all information.

    • B. 

      It limits access to relevant levels of information.

    • C. 

      It enables an accurate audit trail of transactions to be kept.

    • D. 

      It gives the user anonymity.

  • 15. 
    Question 15 - Why should users log off from a computer when they are finished for the day?
    • A. 

      To reduce the use of electricity.

    • B. 

      To prevent data from getting corrupted.

    • C. 

      To prevent unauthorised access to data

    • D. 

      To cool off the hardware

  • 16. 
    Question 16 - Which one of the following statements shows respect for confidentiality of information?
    • A. 

      Discussing confidential information over a telephone line.

    • B. 

      Uploading confidential information to a shared web site.

    • C. 

      Disclosing confidential information only to authorised systems or individuals

    • D. 

      Posting confidential data on your company notice board

  • 17. 
    Question 17 - If you disclose inappropriate or personal information on a fake website, which one of the following is the MOST damaging consequence?
    • A. 

      Theft of identity.

    • B. 

      Data corruption.

    • C. 

      Loss of job.

    • D. 

      Intimidation

  • 18. 
    Question 18 - Why do we use a PIN number on a mobile device?
    • A. 

      It encrypts information being stored on a computer

    • B. 

      It protects information from risk of unauthorised access.

    • C. 

      It decrypts information being stored on a computer

    • D. 

      It removes the need for a password.

  • 19. 
    Question 19 - Which one of the following is a facility of a public network?
    • A. 

      Public service.

    • B. 

      No data security

    • C. 

      . Access to all confidential information

    • D. 

      Resource sharing

  • 20. 
    Question 20 - Which one of the following statements about wireless networks is TRUE?
    • A. 

      They cannot be intercepted by unknown users.

    • B. 

      They can be visible and accessible to other users.

    • C. 

      They work over long distances.

    • D. 

      They limit accessibility to other users.

  • 21. 
    Question 21 - Using an unsecured network is sometimes unavoidable, which one of the following describes how confidential information should be sent in that situation?
    • A. 

      In a compressed only format.

    • B. 

      In an encrypted format.

    • C. 

      In an unsigned email.

    • D. 

      As quickly as possible.

  • 22. 
    Question 22 - Which one of the following describes Bluetooth?
    • A. 

      . Long-range wireless protocol for exchanging data

    • B. 

      Short-range wireless protocol for exchanging data

    • C. 

      Long-range wired protocol for exchanging data

    • D. 

      Short-range wired protocol for exchanging data

  • 23. 
    Question 23 - Where would the guidelines and procedures for the secure use of IT within an organization be held?
    • A. 

      The IT Department.

    • B. 

      The Company Director’s office.

    • C. 

      The Purchasing Department

    • D. 

      The Sales Department.

  • 24. 
    Question 24 - How would you find out about an organisation’s privacy policy?
    • A. 

      By reading the latest issue of the Financial Times

    • B. 

      By speaking to the Finance Department.

    • C. 

      By reading the policy in the organisation’s policy manual

    • D. 

      By speaking to the Sales Department

  • 25. 
    Question 25 - If you wanted to use a device that is NOT part of the organisation’s IT infrastructure, what IT security checks should you carry out before using it?
    • A. 

      The checks listed in the device manual

    • B. 

      Interview the requesting person

    • C. 

      The checks advised by a fellow worker

    • D. 

      The checks listed in the organisation’s security policy