Information Security Online Quiz

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Maihua
M
Maihua
Community Contributor
Quizzes Created: 1 | Total Attempts: 7,917
Questions: 10 | Attempts: 7,917

SettingsSettingsSettings
Information Security Online Quiz - Quiz

How well do you understand information security? Try this information security test to check your knowledge. This informative quiz will help you test as well as learn new facts about information security. It is basically the state of being protected against the unauthorized use of information and the measures taken to achieve this. You can also challenge your peers on this quiz to see who scores better. All the best for a perfect score!


Questions and Answers
  • 1. 

    Which action below would breach the Clear Desk and Screen Policy?

    • A.

      Locking your computer when you are away from your desk

    • B.

      Leaving a departmental laptop on your desk when you are not using it or at the end of the day

    • C.

      Locking confidential information in a cabinet

    • D.

      All of the above

    Correct Answer
    B. Leaving a departmental laptop on your desk when you are not using it or at the end of the day
    Explanation
    Leaving a departmental laptop on your desk when you are not using it or at the end of the day would breach the Clear Desk and Screen Policy. This policy requires employees to ensure that all sensitive information is securely stored and not left unattended. Leaving a laptop on the desk increases the risk of unauthorized access or theft of confidential data. Locking the computer when away from the desk and locking confidential information in a cabinet are both actions that align with the policy, as they help protect sensitive information from being accessed by unauthorized individuals.

    Rate this question:

  • 2. 

    A business unit's shared drive should allow all staff within that business unit to be able to access all records

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Consider whether access to particular records/folders should be restricted

    Rate this question:

  • 3. 

    Because I work in a secure building, I can discuss confidential information in an open work area.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Tip - if you need to discuss confidential information, consider doing so in a secure meeting room.

    Rate this question:

  • 4. 

    The Information Security Policy and related policies only apply to electronic and hardcopy records and do not apply to verbal discussions

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because Information Security Policy and related policies apply to both electronic and hardcopy records as well as verbal discussions. Verbal discussions can also involve sensitive information that needs to be protected, and therefore, should be subject to the same security measures and policies as other forms of records.

    Rate this question:

  • 5. 

    You overhear a conversation where a co-worker reveals that he had looked up the name of a high school friend on a departmental database and proceeds to disclose some of his high school friend's personal information. What should you do?

    • A.

      Nothing, it's alright because we all work for the same organization.

    • B.

      Inform your supervisor/manager of the incident.

    • C.

      Tell the co-worker that his behavior was inappropriate.

    • D.

      All of the above

    Correct Answer
    B. Inform your supervisor/manager of the incident.
    Explanation
    The Inappropriate Access to Personal Information Policy requires employees to report suspected instances where there may have been unauthorised access to personal information so that the Privacy Officer and other relevant staff can decide whether to notify an affected individual.

    Rate this question:

  • 6. 

    After finishing a meeting with a client at an external location, you make your way back to the office. You get on a tram that is half full of other commuters. Your mobile rings, and it is another one of your clients wants to discuss their case with you. What should you do?

    • A.

      Discuss the case quietly with the client

    • B.

      Ensure no one is sitting close by and quickly answer the client's query

    • C.

      Inform the client that you will call them back once you return to the office

    • D.

      All of the above

    Correct Answer
    C. Inform the client that you will call them back once you return to the office
    Explanation
    In this situation, the best course of action would be to inform the client that you will call them back once you return to the office. This is because discussing the case quietly with the client or answering their query while on the tram may compromise the confidentiality of the conversation. It is important to ensure that sensitive information is not overheard by others in a public setting. Therefore, it is best to wait until you are in a private and secure location before discussing the case further with the client.

    Rate this question:

  • 7. 

    Which of the following is a type of information security?

    • A.

      Network security

    • B.

      Cloud security

    • C.

      Application security

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of the options listed (network security, cloud security, and application security) are types of information security. Network security focuses on protecting networks and their infrastructure from unauthorized access or attacks. Cloud security involves protecting data and applications that are stored in the cloud from breaches or data loss. Application security aims to secure software applications and prevent vulnerabilities that can be exploited by hackers. Therefore, all three options are valid types of information security measures.

    Rate this question:

  • 8. 

    Which of the following is not a threat to information security?

    • A.

      Disaster

    • B.

      Eavesdropping

    • C.

      Unchanged default password

    • D.

      Information leakage

    Correct Answer
    A. Disaster
    Explanation
    While disasters, such as fires, floods, or earthquakes, can impact the availability and integrity of information, they are typically not considered intentional threats like eavesdropping, unchanged default passwords, or information leakage. Disasters are more often associated with business continuity and disaster recovery planning rather than direct information security threats.

    Rate this question:

  • 9. 

    Which information security technology is used to avoid browser-based hacking?

    • A.

      Anti-malware in browsers

    • B.

      Remote browser access

    • C.

      Adware remover in browsers

    • D.

      Incognito mode in a browser

    Correct Answer
    A. Anti-malware in browsers
    Explanation
    Anti-malware tools in browsers are designed to detect and prevent malicious activities, including browser-based hacking attempts. These tools help protect users from various online threats such as malware, phishing, and other types of attacks that may target web browsers.

    Rate this question:

  • 10. 

    Compromising confidential information comes under _________

    • A.

      Threat

    • B.

      Bug

    • C.

      Attack

    • D.

      Vulnerability

    Correct Answer
    C. Attack
    Explanation
    Compromising confidential information is considered an attack. In the context of information security, an attack refers to any unauthorized action that seeks to exploit vulnerabilities in a system, network, or application. In this case, compromising confidential information involves an intentional and unauthorized attempt to access, disclose, or misuse sensitive data, which is considered an attack on the information's confidentiality. Security measures are implemented to prevent, detect, and respond to such attacks to safeguard the integrity, availability, and confidentiality of information.

    Rate this question:

Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 23, 2023
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Nov 12, 2008
    Quiz Created by
    Maihua
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.