1.
Which of the following is the strongest password?
Correct Answer
B. !'m5tr0nGrU
Explanation
The password "!'m5tr0nGrU" is the strongest because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it harder for hackers to guess or crack the password using common methods such as dictionary attacks or brute force attacks. Additionally, the password is longer, which adds an extra layer of security.
2.
How often should your Internet History files be cleaned out?
Correct Answer
B. Every 30 days
Explanation
Internet history files should be cleaned out every 30 days to ensure privacy and security. Regularly clearing these files helps to prevent unauthorized access to personal information and browsing habits. It also helps to improve the performance and speed of the internet browser by freeing up storage space. By cleaning out internet history files every 30 days, users can maintain a clean and secure browsing experience.
3.
How can you tell if you may have malware or a virus on your computer?
Correct Answer
D. All of the above
Explanation
All of the given options are indicators that you may have malware or a virus on your computer. Frequent pop-up ads when you're not connected to the internet can be a sign of adware or malware. If your web browser opens to a different homepage than the one you have selected, it could be due to a browser hijacker. A sudden rise in system crashes may indicate the presence of a virus or malware affecting the stability of your system. Therefore, all of the above options suggest the possibility of malware or a virus on your computer.
4.
What should you do with your computer when you leave for the day?
Correct Answer
C. Log off the network and leave it on
Explanation
You should log off the network and leave the computer on when you leave for the day. Logging off the network ensures that your computer is disconnected from any external connections, reducing the risk of unauthorized access or data breaches. Leaving the computer on allows for necessary updates and maintenance tasks to be performed during non-working hours, improving the overall performance and security of the system.
5.
The purpose of the Computer Resource Awareness program is to:
Correct Answer
A. Ensure all employees understand their responsibilities with regard to using the Foundation’s computer resources
Explanation
The purpose of the Computer Resource Awareness program is to ensure that all employees are aware of and understand their responsibilities when it comes to using the Foundation's computer resources. This program aims to educate and inform employees about the proper and responsible use of computer resources, such as hardware, software, and data, in order to maintain security, confidentiality, and integrity. By raising awareness and promoting responsible behavior, the program helps to minimize risks and protect the Foundation's computer resources from misuse or unauthorized access.
6.
Everything created and saved on BFT computer equipment, including BFT, supported smartphones, is the property of BFT.
Correct Answer
A. True
Explanation
The statement suggests that all content created and saved on BFT computer equipment, including BFT-supported smartphones, is owned by BFT. This implies that BFT has the rights to access, control, and potentially use any data or information stored on their devices. Therefore, the answer "True" indicates that BFT claims ownership over all content created and saved on their computer equipment.
7.
How often is mailbox size checked?
Correct Answer
C. Every 30 days
Explanation
The mailbox size is checked every 30 days. This means that after every 30-day period, the size of the mailbox is examined. This regular monitoring ensures that the mailbox does not exceed its storage capacity and helps in managing the storage efficiently. By checking the size frequently, any potential issues or limitations can be identified and addressed in a timely manner.
8.
What is the first thing you should do if you send an email to an unintended recipient?
Correct Answer
D. Notify your supervisor
Explanation
If you send an email to an unintended recipient, the first thing you should do is notify your supervisor. This is important because your supervisor needs to be aware of the mistake and can guide you on the appropriate actions to take. They may advise you on how to handle the situation, such as retracting the email or apologizing to the unintended recipient. Notifying your supervisor allows them to be informed and involved in resolving the issue.
9.
What is the name of our spam filter?
Correct Answer
A. Axxys Spam Defense
Explanation
Axxys Spam Defense is the correct answer because it is stated in the question itself. The question asks for the name of "our" spam filter, implying that the question is referring to a specific spam filter that is being used by the person or organization asking the question. Therefore, Axxys Spam Defense is the name of the spam filter being referred to in this context.
10.
All files are included in the periodic system backups.
Correct Answer
B. False
Explanation
The statement "All files are included in the periodic system backups" is false because it is unlikely that all files are included in the backups. System backups typically prioritize essential files and may exclude temporary or unnecessary files. Additionally, there may be files that are actively being used and cannot be backed up during the backup process. Therefore, it is not accurate to say that all files are included in the backups.
11.
In general, surfing the internet is allowed, however, which activities should be avoided?
Correct Answer
D. All of the above
Explanation
All of the above activities should be avoided while surfing the internet. Clicking ads in websites can lead to potential scams or malware. Browsing social network sites can be a waste of time and may expose personal information to a wider audience. Downloading screen savers, toolbars, emoticons, or desktop backgrounds can contain viruses or spyware that can harm the computer. Therefore, it is best to avoid engaging in any of these activities while surfing the internet.
12.
Passwords - which of the following statements is/are true?
Correct Answer
A. Should not be shared
Explanation
Sharing passwords is a security risk as it allows unauthorized access to personal accounts. It is recommended to keep passwords confidential to protect sensitive information. The other statements, "Can be the same for everything" and "Must have at least 6 characters," are not true as using the same password for multiple accounts increases vulnerability to hacking, and having a longer and more complex password is generally considered more secure. Therefore, the correct answer is that passwords should not be shared.
13.
If you are allowed access to your BFT email account on mobile devices they must be:
Correct Answer
A. Password protected
Explanation
The correct answer is password protected because it ensures that only authorized individuals can access the BFT email account on mobile devices. This adds an extra layer of security and helps prevent unauthorized access to sensitive information.
14.
You are giving the Monday Morning Devotional but forgot your Bible at home. You go online to download a version to use. Which do you pick?
Correct Answer
D. None - downloading or installing unapproved software is prohibited
Explanation
The correct answer is "None - downloading or installing unapproved software is prohibited." This option is chosen because the question states that downloading or installing unapproved software is prohibited. Therefore, since the person is not allowed to download any version of the Bible online, they should not pick any of the given options.
15.
When you participate in social networking or blogging to discuss BFT business, you should always:
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above." When participating in social networking or blogging to discuss BFT business, it is important to request permission from the Senior Vice President, Finance and Administration to use any BFT trademarks or reproduce any BFT materials. Additionally, including a disclaimer that the views expressed are yours alone and do not necessarily reflect the views of your employer is necessary. Finally, it is crucial to avoid disclosing any confidential or proprietary information. Therefore, all of the options mentioned above should be followed when engaging in discussions about BFT business on social networking or blogging platforms.
16.
To create your Outlook signature:
Correct Answer
C. Nothing - signatures are standardized and automatically load when you sign in to the network
Explanation
The correct answer is "Nothing - signatures are standardized and automatically load when you sign in to the network." This means that in Outlook, signatures are already set up and saved on the network, so users do not need to create a new signature or manually insert it into their messages. The signatures will automatically load when they sign in to the network.
17.
Websites such as cnn.com, msnbc.com, msn.com, dallasnews.com, and yahoo.com are free of malicious code and malware.
Correct Answer
B. False
Explanation
The statement is false because it is not accurate to claim that websites such as cnn.com, msnbc.com, msn.com, dallasnews.com, and yahoo.com are completely free of malicious code and malware. While these websites may have security measures in place to prevent such issues, it is still possible for them to be targeted by hackers or for malware to be accidentally introduced. Therefore, it is important for users to always exercise caution and have their own security measures in place when browsing any website.
18.
The system is protected by a spam filter, anti-virus software, and firewalls. Therefore, it is safe to assume that files attached to emails are safe.
Correct Answer
B. False
Explanation
The given statement suggests that because the system is protected by a spam filter, anti-virus software, and firewalls, it is safe to assume that files attached to emails are safe. However, this assumption is false. While these security measures can reduce the risk of malware and spam, they are not foolproof. Hackers can still find ways to bypass these protections and send malicious files through emails. Therefore, it is important to exercise caution and not automatically assume that all attachments are safe.
19.
Which of the following does not affect the use of bandwidth?
Correct Answer
D. None of the above
Explanation
All of the options listed in the question (streaming audio, watching videos, running tickers) can affect the use of bandwidth. Therefore, the correct answer is "None of the above" as it implies that none of the options listed affect the use of bandwidth.
20.
Your email password should not be the same as your drawbridge password.
Correct Answer
A. True
Explanation
It is important to have different passwords for different accounts to ensure better security. Using the same password for both your email and drawbridge accounts increases the risk of unauthorized access. If a hacker gains access to one account, they could potentially gain access to the other account as well, leading to potential breaches of personal information or sensitive data. Therefore, it is advisable to have unique and strong passwords for each account to enhance security.