1.
Why is it important to have a good understanding of Information Security policies and procedures?
Correct Answer
D. All of the above
Explanation
Having a good understanding of Information Security policies and procedures is important because it helps protect individuals from being victims of security incidents. By knowing the policies and procedures, individuals can take necessary precautions to safeguard their information and prevent unauthorized access or breaches. Additionally, it provides an understanding of the steps to follow in the event of a security incident, allowing individuals to respond effectively and minimize the damage. Lastly, understanding levels of responsibility ensures that everyone knows their role in maintaining information security, promoting a secure environment for all.
2.
Which of the following is a good way to create a password?
Correct Answer
C. A combination of upper and lowercase letters mixed with numbers and symbols
Explanation
A combination of upper and lowercase letters mixed with numbers and symbols is a good way to create a password because it increases the complexity and makes it harder for hackers to guess or crack the password. Using a mix of upper and lowercase letters, along with numbers and symbols, adds more possible combinations, making the password stronger and more secure. This type of password is less likely to be easily guessed or hacked compared to using common names or words from the dictionary, or using look-alike substitutions.
3.
Which of the following would be the best password?
Correct Answer
B. Dp0si#Z$2
Explanation
The password "Dp0si#Z$2" would be the best choice because it contains a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more secure and harder for hackers to guess or crack. The other options, "mySecret," "abc123," and "keyboard," are all weak passwords that can be easily guessed or hacked.
4.
What is the most common delivery method for viruses?
Correct Answer
A. Email
Explanation
Email is the most common delivery method for viruses because it allows attackers to easily distribute malicious attachments or links to a large number of users. Email attachments can contain infected files, while links can redirect users to websites hosting malware. Additionally, email spoofing techniques can be used to make the emails appear legitimate, tricking users into opening the malicious content. Therefore, email remains a popular choice for cybercriminals to spread viruses and gain unauthorized access to systems.
5.
When receiving an email from an unknown contact that has an attachment, you should:
Correct Answer
B. Delete the email
Explanation
When receiving an email from an unknown contact that has an attachment, it is best to delete the email. Opening the attachment can be risky as it may contain malware or viruses that can harm your computer or compromise your personal information. Forwarding the email to co-workers or personal email account can also put them at risk. Therefore, it is safest to delete the email to avoid any potential harm.
6.
Which of the following is a good practice to avoid email viruses?
Correct Answer
D. All the above
Explanation
A good practice to avoid email viruses is to delete unexpected or unsolicited messages, as they may contain malicious attachments or links. Using anti-virus software to scan attachments before opening them is also important, as it helps detect and remove any potential viruses. Additionally, deleting similar messages that appear more than once in your Inbox can help prevent accidentally opening a malicious email multiple times. Therefore, the best practice to avoid email viruses is to implement all of the mentioned actions.
7.
Which of the following is a proper use of email?
Correct Answer
A. Never email personal information
Explanation
The correct answer is "Never email personal information." This is a proper use of email because personal information is sensitive and should not be shared over email due to security and privacy concerns. Email is not a secure method of communication, and sending personal information such as social security numbers, bank account details, or passwords can lead to identity theft or other malicious activities. It is important to use more secure methods of sharing personal information, such as encrypted messaging apps or secure file sharing platforms.
8.
Instant Messaging is safer than regular email.
Correct Answer
B. False
Explanation
The statement "Instant Messaging is safer than regular email" is false. While both instant messaging and regular email have their own security risks, instant messaging can be considered less safe due to its real-time nature and the potential for immediate response. Instant messages can be intercepted or read by unauthorized individuals, and there is a higher risk of falling victim to phishing attacks or malware through instant messaging platforms. Regular email, on the other hand, often has more robust security measures in place, such as encryption and spam filters. Therefore, regular email can be considered safer than instant messaging.
9.
Which of the following life experiences might turn a trusted user into a malicious insider except:
Correct Answer
C. Promotion
Explanation
A promotion is unlikely to turn a trusted user into a malicious insider. In fact, a promotion usually signifies recognition and increased responsibility, which can enhance job satisfaction and loyalty. Frustration with co-workers, stress, and financial problems, on the other hand, can potentially lead to feelings of resentment, dissatisfaction, and desperation, making a trusted user more susceptible to becoming a malicious insider.
10.
A malicious user can rely on email or webpage to launch a ____?
Correct Answer
D. All of the above
Explanation
A malicious user can rely on email or webpage to launch phishing attacks, virus attacks, and spyware. Phishing attacks involve tricking individuals into providing sensitive information by impersonating a trustworthy entity. Virus attacks involve infecting systems with malicious software that can cause harm or steal data. Spyware refers to software that secretly collects information about a user's activities. All of these attacks can be initiated through email or webpages, making the answer "All of the above" correct.
11.
Which statement most accurately describes virus?
Correct Answer
A. A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources
Explanation
The correct answer is "A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources." This accurately describes a virus, which is a type of malicious software that replicates itself and consumes computer resources. It does not protect the computer from hackers or monitor internet use, as stated in the other options.
12.
Which of the following is a measure for preventing a social engineering attack except:
Correct Answer
C. Do not secure sensitive documents and media
13.
Which statement is allowed according to the limited personal use policy?
Correct Answer
C. Sending an occasional personal email
Explanation
The limited personal use policy allows for the sending of occasional personal emails. This means that employees are allowed to use company resources to send personal emails, as long as it is not excessive or interfering with their work responsibilities. Conducting business for personal gain, using company resources for political purposes, and downloading music and video files are not allowed according to the limited personal use policy.
14.
If you're not careful about your Internet browsing, which of the following can result?
Correct Answer
D. All of the above
Explanation
If you are not careful about your Internet browsing, it can result in various negative consequences such as the installation of spyware or adware, browser hijacking, and information or identity theft. This means that all of the options provided in the question can occur as a result of being careless while browsing the Internet.
15.
The first step in Security Awareness is being able to ________ a security threat.
Correct Answer
B. Recognize
Explanation
In order to effectively address security threats, the first step is to be able to recognize them. This involves being aware of the signs and indicators of potential security risks, such as suspicious emails, unauthorized access attempts, or unusual network activity. By being able to recognize these threats, individuals can take appropriate actions to mitigate the risks and protect themselves and their systems from potential harm.
16.
What should you do if you think the email you received is a phishing attempt except?
Correct Answer
B. Click the link so you can see what the site looks like
Explanation
Clicking the link in a suspicious email is not a recommended action because it can lead to potential harm. Phishing attempts often involve fraudulent websites that mimic legitimate ones, and clicking the link can expose personal information or download malicious software onto the system. Therefore, it is important to avoid clicking on any suspicious links and instead follow the other recommended actions, such as not replying to the message, keeping the system updated with antivirus software, and reporting the phishing email to the legitimate company or organization.
17.
What should you do if you think your password has been compromised?
Correct Answer
D. All the above
Explanation
If you suspect that your password has been compromised, it is important to take immediate action to protect your accounts and personal information. Changing your password is essential to prevent unauthorized access to your accounts. Reporting the incident to the proper authorities, such as a system administrator, helps to ensure that the necessary steps are taken to investigate and mitigate any potential security breaches. Additionally, checking other systems where you have accounts is crucial because if one account is compromised, it increases the likelihood that others may also be at risk. Therefore, all the mentioned actions should be taken if you think your password has been compromised.
18.
All of these are good physical security practices except?
Correct Answer
A. Always wear your security badge when leaving work, even if just for a break. They should be worn outside of the office in public so other people know where you work
Explanation
Wearing a security badge outside of the office in public is not a good physical security practice because it can make an individual more vulnerable to social engineering attacks or unauthorized access. It is important to keep one's workplace and access credentials confidential to prevent potential security breaches.
19.
What is the biggest vulnerability to computer information security?
Correct Answer
D. End Users
Explanation
End users are the biggest vulnerability to computer information security because they often lack awareness and knowledge about security practices. They may fall victim to phishing attacks, click on malicious links or attachments, or unknowingly download malware. End users are also prone to making mistakes such as using weak passwords or sharing sensitive information. Their actions can easily compromise the security of computer systems and networks, making them a prime target for attackers. Therefore, it is crucial to educate and train end users on security best practices to mitigate these risks.
20.
What should everyone know about information security? Check all that apply.
Correct Answer(s)
A. Computer security is part of everyone's job
B. Verify everything! Verify who the person is on the pHone. Verify that the website is real. Verify that the visitor belongs where you find them..
C. Report anything suspicious to your system administrator
D. Do not ignore unusual computer functioning. It might be a sign of malware.
Explanation
The answer choices provide important information about information security that everyone should know. It emphasizes that computer security is a responsibility for everyone, not just IT professionals. It also highlights the importance of verifying information, such as the identity of individuals on the phone or the authenticity of websites. Reporting suspicious activities to the system administrator is crucial in maintaining security. Additionally, it warns against ignoring unusual computer functioning, as it could indicate the presence of malware.