Whispir Information Security Awareness Quiz

22 Questions | Total Attempts: 728

SettingsSettingsSettings
Please wait...
Whispir Information Security Awareness Quiz

.


Questions and Answers
  • 1. 
    Identify the appropriate response to an email request for specific account information.
    • A. 

      Ignore the email

    • B. 

      Email the exact information requested in accordance with our Sundown Rule

    • C. 

      Contact the client by phone to confirm the authenticity of the email. The client's phone voice must be known to the banker. Client identification through verbal follow-up / confirmation and standard identification procedures, followed by an encrypted reply will then constitute policy compliance.

  • 2. 
    It is acceptable to click on hyperlinks within the body of emails as long as you know who it came from.
    • A. 

      True

    • B. 

      False

  • 3. 
    If you recognize there has been a breach of non-public information, you should:
    • A. 

      Take notes and wait to see if there are any additional attempts to get information.

    • B. 

      Report the incident immediately to the Information Security Officer and/or Executive Management.

    • C. 

      Contact the local police department.

  • 4. 
    Which of the following is a good practice to avoid email viruses?
    • A. 

      Delete an unexpected or unsolicited message

    • B. 

      Use anti-virus software to scan attachments before opening

    • C. 

      Delete similar messages that appears more than once in your Inbox

    • D. 

      All the above

  • 5. 
    Which of the following is a good way to create a password?
    • A. 

      Your children's or pet's names

    • B. 

      Using look-alike substitutions of numbers or symbols

    • C. 

      A combination of upper and lowercase letters mixed with numbers and symbols

    • D. 

      Using common names or words from the dictionary

  • 6. 
    When receiving an email from an unknown contact that has an attachment, you should:
    • A. 

      Open the attachment to view its contents

    • B. 

      Delete the email

    • C. 

      Forward the email to your co-workers to allow them to open the attachment first

    • D. 

      Forward the email to your personal email account so you can open it at home

  • 7. 
    If you're not careful about your Internet browsing, which of the following can result?
    • A. 

      Spyware or Adware installation

    • B. 

      Browser Hijacking

    • C. 

      Information or identity theft

    • D. 

      All of the above

  • 8. 
    Which of the following life experiences might turn a trusted user into a malicious insider except:
    • A. 

      Frustration with co-workers

    • B. 

      Stress

    • C. 

      Promotion

    • D. 

      Financial problems

  • 9. 
    Instant Messaging is safer than regular email.
    • A. 

      True

    • B. 

      False

  • 10. 
    Why is it important to have a good understanding of Information Security policies and procedures?
    • A. 

      Helps protect individuals from being victims of security incidents.

    • B. 

      Provides an understanding of steps to follow in the event of a security incident

    • C. 

      Helps to understand levels of responsibility

    • D. 

      All of the above

  • 11. 
    Integrity of data means
    • A. 

      Accuracy and completeness of the data

    • B. 

      Data should be viewable at all times

    • C. 

      Data should be accessed by only the right people

  • 12. 
    What is tailgating?
    • A. 

      Blocking somebody's entry through the access door

    • B. 

      Going behind somebody through the access doors without using own access card

    • C. 

      Opening an access door with your own access card

  • 13. 
    As a developer, how do you ensure the integrity of the software that you develop?
    • A. 

      By maintaining documents / code in configuration management system

    • B. 

      By following coding guidelines

    • C. 

      By doing reviews and testing

    • D. 

      Option A and B

    • E. 

      All the above

  • 14. 
    What is social engineering?
    • A. 

      A group planning for a social activity in the organization

    • B. 

      Creating a situation wherein a third party gains confidential information from you

    • C. 

      The organization planning an activity for welfare of the neighborhood

  • 15. 
    CIA of assets stands for
    • A. 

      Confidentiality, Integration and Availability

    • B. 

      Continuity, Integration and Availability

    • C. 

      Confidentiality, Integrity and Accessibility

    • D. 

      Continuity, Integrity and Accessibility

    • E. 

      Confidentiality, Integrity and Availability

  • 16. 
    How can you report a security incident?
    • A. 

      HOTS

    • B. 

      Phone

    • C. 

      E-mail

    • D. 

      Any of the above

    • E. 

      None of the above

  • 17. 
    What are the different categories of assets in an organization (Choose the Best Answer)
    • A. 

      Information and Paper assets

    • B. 

      Physical and Application assets

    • C. 

      Service Assets

    • D. 

      Option A, B, C

    • E. 

      Option A and B Only

  • 18. 
    Where should you write down your passwords.
    • A. 

      Someplace easily seen from your computer.

    • B. 

      Someplace that is out of sight, like beneath your keyboard or in a nearby drawer.

    • C. 

      Wherever you really need it for your memory, but this information can only be kept in a secure location.

    • D. 

      You should never write down your password.

  • 19. 
    If you receive a chain e-mail, what should you do?
    • A. 

      Forward it to co-workers for a good laugh

    • B. 

      Send it to a client that is also a good friend

    • C. 

      Post it on SharePoint

    • D. 

      None of the above

  • 20. 
    A visitor would like to connect to your WiFi guest network, what should be done?
    • A. 

      Give him/her the WiFi code and grant them access

    • B. 

      Confirm that the visitor's system is protected by Antivirus and then grant them access to the WiFi network

    • C. 

      Apologize and explain that this access is ONLY for privileged visitors

    • D. 

      All of the above

  • 21. 
    What best describes phishing?
    • A. 

      In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

    • B. 

      Password cracking

    • C. 

      In the field of computer security, phishing is the criminally fraudulent process of a keylogger attempting to capture keyboard keystrokes of the user.

    • D. 

      This is a made up term

  • 22. 
    Where could you find Whispir Information Security Management System (ISMS) policy?
    • A. 

      With CEO

    • B. 

      Network folder

    • C. 

      Intranet website

    • D. 

      With employees

Back to Top Back to top