Test Your Information Security Knowledge

8 Questions

Settings
Please wait...
Information Security Quizzes & Trivia

Test your skills of Security Knowledge.


Questions and Answers
  • 1. 
  • 2. 
    • A. 

      Passwords

    • B. 

      File Permissions

    • C. 

      Encryption

    • D. 

      All of the above.

  • 3. 
    What are the most important things you can do to secure your desktop PCs?
    • A. 

      Turn on Automatic Updates

    • B. 

      Turn on Windows Firewall

    • C. 

      Install Antivirus Software

    • D. 

      All of the above

    • E. 

      None of the above

  • 4. 
    Whenever possible you should allow your web browser to remember passwords so you don't have to write them down.
    • A. 

      True

    • B. 

      False

  • 5. 
    If you have a firewall on your network you don't need to turn on Windows Firewall.
    • A. 

      True

    • B. 

      False

  • 6. 
    When traveling with a laptop you should...
    • A. 

      Check the laptop bag with your other luggage.

    • B. 

      Stow it in the overhead bin until landing.

    • C. 

      Keep it in your lap or at least between your feet at all times.

    • D. 

      Hand it to a neighbor while you get settled.

  • 7. 
    What is 'phishing'?
    • A. 

      A type of computer virus

    • B. 

      An example of a strong password

    • C. 

      "Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords

  • 8. 
    What is meant by a Trojan Horse?
    • A. 

      A term describing the obtaining of confidential information (such as passwords or other private information), by falsely claiming to the victims to be a trust-worthy person having a legitimate need for the requested information.

    • B. 

      An e-mail spreading false information and urging the recipient to do something and/or send the news to everyone he or she knows.

    • C. 

      A non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system