1.
What is the maximum recommended size for an email attachment?
Correct Answer
C. 25 MB
Explanation
A maximum recommended size for an email attachment is typically 25 MB. This limit is generally set by email providers to ensure efficient use of server resources and to avoid overloading recipients' inboxes. Attachments larger than this may not be delivered successfully, as they can exceed the recipient's inbox capacity or be rejected by the server. To share larger files, it's advisable to use cloud storage services and send a link instead.
2.
Which file type is typically blocked by email servers due to security concerns?
Correct Answer
A. .exe
Explanation
Executable files (.exe) are often blocked by email servers due to security concerns. These files can contain harmful software that might execute malicious operations on a recipient's computer. Blocking these attachments protects users from viruses, trojans, and other malware that can be unintentionally launched by opening or running an executable file.
3.
What is the primary purpose of BCC in an email?
Correct Answer
A. To send a blind copy
Explanation
The primary purpose of using BCC (Blind Carbon Copy) in an email is to send a copy of the email to recipients discreetly. When recipients are added in the BCC field, their email addresses are hidden from other recipients of the same email, including those in the To and CC fields. This feature is useful for maintaining privacy and confidentiality, especially when sending emails to large groups.
4.
How can you confirm the receipt of an email sent to multiple recipients?
Correct Answer
A. Request a delivery receipt
Explanation
Requesting a delivery receipt is a feature that allows the sender to confirm the receipt of an email by multiple recipients. This tool sends an automatic notification back to the sender when the email is delivered to the recipients' inboxes. It's a useful way to track important communications and ensure that information has reached its intended audience.
5.
What should you do before opening an email attachment from an unknown sender?
Correct Answer
B. Scan it with antivirus software
Explanation
Before opening an email attachment from an unknown sender, it is advisable to scan it with antivirus software. This precaution helps to detect and prevent malware or viruses that might be embedded in the attachment. Scanning reduces the risk of infecting your device with harmful software that could compromise your data or the security of your network.
6.
What is considered good email etiquette regarding the use of 'Reply All'?
Correct Answer
A. Use sparingly
Explanation
Good email etiquette recommends using 'Reply All' sparingly. This function should be used only when it's necessary for all recipients in the thread to see the response, such as in collaborative projects or important announcements. Overuse can lead to email overload, causing frustration and possibly leading to missed or ignored emails.
7.
Which format is preferred for sending multiple files as an attachment?
Correct Answer
B. Zip files into one archive
Explanation
Zipping files into one archive is preferred when sending multiple files as it reduces the total file size and consolidates several attachments into one. This not only makes the sending process more efficient but also helps in organizing attachments better, making it easier for the recipient to download and manage the received files.
8.
What is a phishing email typically trying to obtain?
Correct Answer
B. Personal or financial information
Explanation
Phishing emails typically aim to obtain personal or financial information from the recipient. These deceptive messages often mimic legitimate sources and contain links or attachments that direct users to fake websites asking for sensitive data. Recognizing and understanding the intentions behind these emails is crucial for protecting oneself against identity theft and financial fraud.
9.
For professional email signatures, what is recommended?
Correct Answer
B. Minimal contact details and title
Explanation
For professional email signatures, it is recommended to include minimal contact details and a title. This ensures that the signature is concise yet informative, providing essential contact information without overwhelming the recipient. Keeping the signature professional and to the point reflects well on the sender’s professionalism and respects the recipient’s time.
10.
What is the safest practice when you receive an unsolicited email asking for sensitive information?
Correct Answer
C. Report the email as pHishing
Explanation
The safest practice when receiving an unsolicited email asking for sensitive information is to report the email as phishing. This action helps protect your personal data and contributes to broader efforts to identify and reduce phishing attacks. Engaging with or responding to such emails can lead to security breaches and should be avoided.