CyberSecurity Awareness Test Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Adityam
A
Adityam
Community Contributor
Quizzes Created: 1 | Total Attempts: 553
Questions: 15 | Attempts: 553

SettingsSettingsSettings
Cybersecurity Awareness Test Quiz! - Quiz

.


Questions and Answers
  • 1. 

    Which of the below is not used for Multi-factor authentication?

    • A.

      Something you do

    • B.

      Something you have

    • C.

      Something you know

    • D.

      Something you are

    Correct Answer
    A. Something you do
    Explanation
    "Something you do" is not used for multi-factor authentication. Multi-factor authentication typically involves using a combination of two or more factors to verify a user's identity. These factors can include "something you have" (such as a physical token or a mobile device), "something you know" (such as a password or PIN), and "something you are" (such as biometric data like fingerprints or facial recognition). However, "something you do" refers to behavioral biometrics, which is a separate authentication method that analyzes patterns of behavior, such as typing speed or mouse movements, to verify identity.

    Rate this question:

  • 2. 

    Which of the below is not a best practice of choosing Strong Passwords?

    • A.

      Make it impersonal

    • B.

      Make it long

    • C.

      Make it diverse

    • D.

      Make it numeric

    Correct Answer
    D. Make it numeric
    Explanation
    Making a password numeric is actually a best practice for choosing strong passwords. Including numbers in a password adds complexity and makes it harder for attackers to guess or crack the password. Therefore, the given answer is incorrect.

    Rate this question:

  • 3. 

    Which of the below is not a part of the Clean Desk Policy?

    • A.

      Tidy your desk

    • B.

      Lock your screen

    • C.

      Hiding passwords below keyboard

    • D.

      Put away sensitive documents

    Correct Answer
    C. Hiding passwords below keyboard
    Explanation
    The Clean Desk Policy aims to maintain a clutter-free and secure work environment. Tidying your desk, locking your screen, and putting away sensitive documents are all practices that align with this policy. However, hiding passwords below the keyboard is not a part of the Clean Desk Policy. This action poses a security risk as it makes it easier for unauthorized individuals to access sensitive information.

    Rate this question:

  • 4. 

    Which of the below is not a part of the appropriate use - Laptop Security Policy?

    • A.

      Return your laptop when you resign

    • B.

      Prevent damage to loss/theft of Laptop

    • C.

      Report loss of Laptop to HR & IT Department

    • D.

      Install any software without approval

    Correct Answer
    D. Install any software without approval
    Explanation
    The correct answer is "Install any software without approval." This is not a part of the appropriate use - Laptop Security Policy because it can pose a security risk to the laptop and the network. Installing software without approval can introduce malware or other malicious programs, compromise the laptop's security, and violate company policies. It is important to obtain proper approval before installing any software to ensure the security and integrity of the laptop and the organization's network.

    Rate this question:

  • 5. 

    Which of the below is not a part of the appropriate use - Email Security Policy?

    • A.

      Don't access your personal email account

    • B.

      Use official Email ID for personal purposes

    • C.

      Don't send spam

    • D.

      Don't do Email Forging

    Correct Answer
    B. Use official Email ID for personal purposes
    Explanation
    The statement "Use official Email ID for personal purposes" is not a part of the appropriate use - Email Security Policy. This policy is designed to ensure the security and confidentiality of email communication within an organization. Using official email IDs for personal purposes may compromise the security of sensitive information and increase the risk of unauthorized access or data breaches. It is important to separate personal and official email accounts to maintain the integrity of the organization's email security policy.

    Rate this question:

  • 6. 

    When receiving a Email from a unknown contact that has an attachment, you should:

    • A.

      Open the attachment to view its contents

    • B.

      Delete the mail

    • C.

      Forward the email to your co-workers to allow them to open the attachment first

    • D.

      Forward the email to your personal email account so you can open it at home

    Correct Answer
    B. Delete the mail
    Explanation
    When receiving an email from an unknown contact that has an attachment, it is recommended to delete the mail. Opening the attachment can pose a security risk as it may contain malware or viruses that can harm your computer or compromise your personal information. Forwarding the email to co-workers or personal email accounts can potentially spread the risk to others or expose personal information to unauthorized individuals. Therefore, the safest course of action is to delete the email to protect yourself and your system from potential harm.

    Rate this question:

  • 7. 

    The mouse on your computer begins moving across the screen and clicking on things without you even touching it. What will you do?

    • A.

      Unplug your mouse

    • B.

      Disconnect your computer from the network & call the IT Support Desk

    • C.

      Turn your computer OFF

    • D.

      Call your colleagues over so they can see this miracle!

    Correct Answer
    B. Disconnect your computer from the network & call the IT Support Desk
    Explanation
    If the mouse on your computer is moving and clicking on things without you touching it, it is likely that your computer has been compromised by malware or a hacker. Disconnecting your computer from the network is important to prevent further unauthorized access or potential damage. Calling the IT Support Desk is necessary to report the incident and seek assistance in resolving the issue and ensuring the security of your computer system.

    Rate this question:

  • 8. 

    Which of the following is an Online Malware Scanning Service for suspicious files and URLs?

    • A.

      Www.serials.ws

    • B.

      Www.crackme.us

    • C.

      Www.totalvirus.com

    • D.

      Www.virustotal.com

    Correct Answer
    D. Www.virustotal.com
    Explanation
    www.virustotal.com is an online malware scanning service that allows users to scan suspicious files and URLs for potential malware or viruses. It provides a comprehensive analysis by using multiple antivirus engines and other tools to detect any malicious content. Users can upload files or enter URLs to be scanned, and the service provides detailed reports on the potential threats found. It is a trusted platform used by individuals and organizations to ensure the safety of their files and websites.

    Rate this question:

  • 9. 

    When is the best time to lie to your information security auditor or officer?

    • A.

      If you want to cover up your best friend’s faults or mistakes

    • B.

      If the security auditor is not your friend and cannot be trusted

    • C.

      If it impacts the termination of the key people in your organization

    • D.

      None of the above

    Correct Answer
    D. None of the above
    Explanation
    The best time to lie to your information security auditor or officer is never. Lying to cover up someone else's faults or mistakes, or because you don't trust the auditor, or to protect key people in your organization is unethical and can have serious consequences. It is always best to be honest and transparent with auditors and officers to maintain the integrity and security of the organization's information.

    Rate this question:

  • 10. 

    You went to Starbucks/CCD to buy a coffee and then while waiting for your order, you decided to connect to their Free WIIFI. While browsing your Google Mail (https://mail.google.com/), the page redirects to http://www.googlemail.anish.net. What do you think should you do?

    • A.

      Login to where Google Mail has redirected, it’s just one of Google’s web sites – not suspicious at all.

    • B.

      Disconnect to Starbucks/CCD WIFI network.

    • C.

      Ask the person sitting next to you if his Google Mail also redirects to http://www.googlemail.anish.net.

    • D.

      Find the Wireless Access Point (Wi-Fi device) and reboot it

    Correct Answer
    B. Disconnect to Starbucks/CCD WIFI network.
    Explanation
    The correct answer is to disconnect from the Starbucks/CCD WIFI network. This is because when browsing Google Mail, the page redirects to a suspicious website (http://www.googlemail.anish.net) instead of the legitimate Google Mail website (https://mail.google.com/). This could indicate a potential security threat or a man-in-the-middle attack. To ensure the safety of personal information, it is best to disconnect from the WIFI network to prevent any unauthorized access or data breach.

    Rate this question:

  • 11. 

    Which of the following could help you mitigate malwares and viruses from infecting your PC?

    • A.

      Download software from trusted sources only

    • B.

      Install an antivirus program and enable firewall

    • C.

      Always update your PC when prompted for system updates

    • D.

      Monitor and analyze the network traffic of your PC

    Correct Answer
    B. Install an antivirus program and enable firewall
    Explanation
    Installing an antivirus program and enabling a firewall can help mitigate malwares and viruses from infecting your PC. Antivirus software can detect and remove malicious programs, while a firewall can block unauthorized access to your computer, protecting it from potential threats. By having both of these security measures in place, you can significantly reduce the risk of malware and virus infections on your PC.

    Rate this question:

  • 12. 

    You have a hard copy of a design document that you want to dispose of. What would you do?

    • A.

      Throw it in any dustbin

    • B.

      Shred it using a shredder

    • C.

      Give it to the office boy to reuse it for other purposes

    • D.

      Be environment friendly and reuse it for writing

    Correct Answer
    B. Shred it using a shredder
    Explanation
    Shredding the hard copy of the design document is the correct answer because it ensures that the sensitive information contained in the document is destroyed and cannot be accessed by unauthorized individuals. This helps to protect the confidentiality of the information and prevent any potential misuse or data breaches. Shredding is a secure and reliable method of disposing of confidential documents.

    Rate this question:

  • 13. 

    What is social engineering?

    • A.

      A group planning for a social activity in the organization

    • B.

      Creating a situation wherein a third party gains confidential information from you

    • C.

      The organization planning an activity for welfare of the neighbourhood

    • D.

      None of the above

    Correct Answer
    B. Creating a situation wherein a third party gains confidential information from you
    Explanation
    Social engineering refers to the act of manipulating individuals into divulging confidential information or performing actions that may compromise their security. This can be done through various techniques such as impersonation, deception, or psychological manipulation. The correct answer states that social engineering involves creating a situation where a third party gains confidential information from the individual, which accurately describes the concept. It is important to be aware of social engineering tactics to protect oneself from potential security breaches.

    Rate this question:

  • 14. 

    How can you report a security incident?

    • A.

      Email

    • B.

      Phone

    • C.

      Any of the above

    • D.

      None of the above

    Correct Answer
    C. Any of the above
    Explanation
    The correct answer is "Any of the above" because reporting a security incident can be done through various means, including email and phone. This allows individuals to choose the most convenient method for them to report the incident and ensure that it is communicated to the appropriate authorities.

    Rate this question:

  • 15. 

    You see a non familiar face in the access controlled areas of our office, the person does not have the a ITZCASH ID/Visitor/Vendor tag with him. What would you do?

    • A.

      None of my business, let some body else take care of it

    • B.

      Ask the person to leave the facility

    • C.

      Escort the person to the security and raise a security incident

    • D.

      Scream and yell till the person leaves

    Correct Answer
    C. Escort the person to the security and raise a security incident
    Explanation
    If a non-familiar face is seen in the access controlled areas of the office without any proper identification, the appropriate action would be to escort the person to the security and raise a security incident. This ensures that the person is properly addressed and investigated by the security team, maintaining the safety and security protocols of the office.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 22, 2016
    Quiz Created by
    Adityam
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.