1.
Clear screen means that computers are to remain locked when you move away from your deskClear Desk means that confidential documents are to be under lock & key and should not be accessible to unauthorized parties when you move from your desk.
Correct Answer
A. True
Explanation
The given statement is true because it states that when you move away from your desk, the computer screen should be cleared to ensure that it remains locked and inaccessible to unauthorized individuals. Additionally, it states that confidential documents should be stored under lock and key, preventing unauthorized access. Both of these measures are important for maintaining security and protecting sensitive information.
2.
Which of the following are the examples of Cyber security?
Correct Answer
D. All of the above
Explanation
The examples given, network security, cloud security, and application security, all fall under the umbrella of cyber security. Network security involves protecting the integrity and confidentiality of a network and its data. Cloud security focuses on protecting data stored in cloud environments and preventing unauthorized access. Application security involves securing software applications and preventing vulnerabilities that could be exploited by attackers. Therefore, all of these examples are valid instances of cyber security measures.
3.
You have a hard copy of a customer design document that you want to dispose off. What would you do
Correct Answer
B. Shred it using a shredder
Explanation
If a document is confidential or restricted, you need to dispose it off by shredding.
The environmental guidelines for reusing paper specifies that only non confidential paper should be reused.
4.
Does the security have the right to ask you to display your ID badges and check your bags?
Correct Answer
A. Yes
Explanation
The security has the right to ask individuals to display their ID badges and check their bags as a measure to ensure safety and security. This practice is commonly implemented in various public places, such as airports, government buildings, and large events, to prevent unauthorized access, potential threats, and illegal activities. By verifying identification and inspecting bags, the security can maintain a secure environment and protect the well-being of everyone present.
5.
What is the difference between a restricted and confidential document?
Correct Answer
A. Restricted - to be shared among named individuals Confidential - to be shared with friends and family
Explanation
The correct answer is "Restricted - to be shared among named individuals Confidential - to be shared with friends and family." This answer accurately defines the difference between a restricted and confidential document. A restricted document is meant to be shared only among specific individuals who are named or authorized to access it. On the other hand, a confidential document can be shared with friends and family, indicating a broader scope of sharing permissions beyond just named individuals.
6.
After receiving an email from an unknown contact that has an attachment, you should
Correct Answer
C. Delete the mail without opening it
Explanation
When receiving an email from an unknown contact with an attachment, it is important to prioritize caution and security. Opening the attachment can potentially expose your device to viruses, malware, or other harmful content. Forwarding the attachment to colleagues and friends without knowing its content can inadvertently spread any potential threats. Deleting the email without opening it is the safest course of action to avoid any potential risks. Keeping the email in the inbox without taking any action leaves the possibility of accidentally opening the attachment, which is not recommended.
7.
Which of the following can be used to restrict browser-based hacking?
Correct Answer
B. Remote browser access
Explanation
Remote browser access can be used to restrict browser-based hacking by allowing users to access and browse the internet through a remote server or virtual machine. This helps to protect the user's local machine from potential threats and attacks, as any malicious activity or malware encountered during browsing is contained within the remote environment. Additionally, remote browser access often includes additional security features such as encryption and authentication, further enhancing protection against hacking attempts.
8.
Which of the following programs detect viruses in the computer system?
Correct Answer
B. Anti virus
Explanation
Anti virus programs are specifically designed to detect and remove viruses from a computer system. These programs scan files and programs for known patterns or signatures of viruses, as well as behavior that may indicate the presence of a virus. They also often include real-time protection, which actively monitors the system for any suspicious activity or attempts by viruses to infect the system. Anti malware programs, on the other hand, are more general and can detect and remove a wider range of malicious software, including viruses, spyware, adware, and other types of malware.
9.
In wi-fi security, which security protocol is mostly used?
Correct Answer
A. WPA2
Explanation
WPA2 is the most commonly used security protocol in Wi-Fi networks. It provides a higher level of security compared to WPA and WPS. WPA2 uses the Advanced Encryption Standard (AES) algorithm, which is more secure than the Temporal Key Integrity Protocol (TKIP) used by WPA. WPA2 also supports stronger authentication methods, such as 802.1X, which enhances the overall security of the network. Therefore, WPA2 is the preferred choice for securing Wi-Fi networks.
10.
Which of the following is a privately encrypted search engine?
Correct Answer
D. Duckduckgo
Explanation
Duckduckgo is a privately encrypted search engine, meaning it prioritizes user privacy by not tracking or storing personal information. Unlike Google, Yahoo, and Bing, Duckduckgo does not collect user data or create personalized search results. It aims to provide unbiased search results while protecting user privacy, making it a popular choice for those concerned about online tracking and data collection.