Whispir Information Security Awareness Quiz

15 Questions | Total Attempts: 1253

SettingsSettingsSettings
Whispir Information Security Awareness Quiz - Quiz

Have you ever heard about the term "Whispir"? Are you ready for a Whispir information security awareness quiz? Whispir aligns its security incident response processes to NIST guidelines for the purpose of incident handling. Its security team has a combination of best-of-breed security tooling as well as clear incident triaging criteria. Apart from that incident, playbooks are there to effectively handle a response to a security incident. So, let's see what more you know! All the best to you!


Questions and Answers
  • 1. 
    Which of the following is a good practice to avoid email viruses?
    • A. 

      Delete an unexpected or unsolicited message

    • B. 

      Use anti-virus software to scan attachments before opening.

    • C. 

      Delete similar messages that appear more than once in your Inbox

    • D. 

      All the above

  • 2. 
    Which of the following is a good way to create a password?
    • A. 

      Your children's or pet's names

    • B. 

      Using look-alike substitutions of numbers or symbols

    • C. 

      A combination of upper and lowercase letters mixed with numbers and symbols

    • D. 

      Using common names or words from the dictionary

  • 3. 
    When receiving an email from an unknown contact that has an attachment, you should:
    • A. 

      Open the attachment to view its contents.

    • B. 

      Delete the email

    • C. 

      Forward the email to your co-workers to allow them to open the attachment first

    • D. 

      Forward the email to your personal email account so you can open it at home

  • 4. 
    If you're not careful about your Internet browsing, which of the following can result?
    • A. 

      Spyware or Adware installation

    • B. 

      Browser Hijacking

    • C. 

      Information or identity theft

    • D. 

      All of the above

  • 5. 
    Which of the following life experiences might turn a trusted user into a malicious insider except:
    • A. 

      Frustration with co-workers

    • B. 

      Stress

    • C. 

      Promotion

    • D. 

      Financial problems

  • 6. 
    Instant Messaging is safer than regular email.
    • A. 

      True

    • B. 

      False

  • 7. 
    Why is it important to have a good understanding of Information Security policies and procedures?
    • A. 

      Helps protect individuals from being victims of security incidents.

    • B. 

      Provides an understanding of steps to follow in the event of a security incident

    • C. 

      Helps to understand levels of responsibility

    • D. 

      All of the above

  • 8. 
    As a developer, how do you ensure the integrity of the software that you develop?
    • A. 

      By maintaining documents/code in configuration management system

    • B. 

      By following coding guidelines

    • C. 

      By doing reviews and testing

    • D. 

      Options A and B

    • E. 

      All the above

  • 9. 
    CIA of assets stands for
    • A. 

      Confidentiality, Integration, and Availability

    • B. 

      Continuity, Integration, and Availability

    • C. 

      Confidentiality, Integrity, and Accessibility

    • D. 

      Continuity, Integrity, and Accessibility

    • E. 

      Confidentiality, Integrity, and Availability

  • 10. 
    How can you report a security incident?
    • A. 

      HOTS

    • B. 

      Phone

    • C. 

      E-mail

    • D. 

      Any of the above

    • E. 

      None of the above

  • 11. 
    What are the different categories of assets in an organization (Choose the Best Answer)
    • A. 

      Information and Paper assets

    • B. 

      Physical and Application assets

    • C. 

      Service Assets

    • D. 

      Options A, B, C

    • E. 

      Options A and B Only

  • 12. 
    Where should you write down your passwords?
    • A. 

      Someplace easily seen from your computer.

    • B. 

      Someplace that is out of sight, like beneath your keyboard or in a nearby drawer.

    • C. 

      Wherever you really need it for your memory, this information can only be kept in a secure location.

    • D. 

      You should never write down your password.

  • 13. 
    If you receive a chain e-mail, what should you do?
    • A. 

      Forward it to co-workers for a good laugh

    • B. 

      Send it to a client that is also a good friend.

    • C. 

      Post it on SharePoint

    • D. 

      None of the above

  • 14. 
    If a visitor would like to connect to your WiFi guest network, what should be done?
    • A. 

      Give him/her the WiFi code and grant them access.

    • B. 

      Confirm that the visitor's system is protected by Antivirus and then grant them access to the WiFi network

    • C. 

      Apologize and explain that this access is ONLY for privileged visitors

    • D. 

      All of the above

  • 15. 
    Where could you find the Whispir Information Security Management System (ISMS) policy?
    • A. 

      With CEO

    • B. 

      Network folder

    • C. 

      Intranet website

    • D. 

      With employees

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.