1.
When connecting from your home office, up to how much time will the IT department work with you to get your computer connected?
Correct Answer
A. 20 Minutes
Explanation
If you are a full-time home-based employee, the Provision IT Department will assist you with computer-related work issues at home. If you do not work full-time at home, IT will spend up to 20 minutes by phone to assist you with work related issues.
2.
Which of the following are NOT permitted when accessing the Internet at work?
Correct Answer(s)
A. Streaming internet radio
B. Watching YouTube
D. Using outside messaging, like AIM or Yahoo! Messenger
Explanation
The Internet is a tool that we use, but it can be abused by accessing materials inappropriate for Provision Ministry Group. Streaming videos and music drains network resources and causes the network to run slowly for everyone.
3.
Which of the following should NOT be accessed from your Provision computer?
Correct Answer(s)
A. Illegal Websites
B. PornograpHy
C. Sexist Material
D. Racist Material
Explanation
These activities have no place in a professional setting and should not be accessed using your computer.
4.
How often should your system password be changed?
Correct Answer
D. 30 Days
Explanation
The current policy requires users to change their passwords every 30 days. Passwords must also be changed randomly and not follow any patterns.
5.
If you have access to customer files, what must your screensaver/idle timeout be set to?
Correct Answer
C. 10-15 Minutes
Explanation
The screensaver/idle timeout should be set to 10-15 minutes when you have access to customer files. This is necessary to ensure the security and privacy of the customer information. If the screensaver/idle timeout is set to a shorter time, there is a risk of unauthorized access to the customer files if the computer is left unattended. On the other hand, if the timeout is set to a longer time, there is a higher chance of someone accessing the customer files without proper authorization. Therefore, setting the screensaver/idle timeout to 10-15 minutes strikes a balance between security and convenience.
6.
How can you contact the Provision IT Service Desk?
Correct Answer(s)
A. Call 949-417-5888 (x5888 from Irvine)
B. Submit a ticket from the Provision Homepage
C. Email
[email protected]
Explanation
You may call, email, or submit a ticket online. The IT personnel are very friendly and love to help, but they have short attention spans. If you ask for something when you bump into them in the hall, chances are they will be stopped by 5 other people and will probably forget your issue by the time they return to their desk. Please try to submit a ticket or call the IT service desk.
7.
According to the IT Policies, who may delegate authority to retrieve, monitor, access, copy, download, listen to or delete anything stored on or sent through an employee's computer?
Correct Answer
A. The CEO or People Services Manager
Explanation
Only the People Services Manager or CEO have the right to grant this permission to any individual.
8.
To whom may you give your computer login/password?
Correct Answer
C. The IT Department
Explanation
You may not disclose your password to ANYONE except the IT Department in response to a specific call for service or in the execution of their regular assigned duties.
9.
Which of the following conditions must be met when creating your computer password?
Correct Answer(s)
A. Minimum of 8 characters
D. Contain at least 3 of the following: uppercase, lowercase, numbers, and symbols
Explanation
Passwords must be at least 8 characters long and contain at least 3 of the following: uppercase, lowercase, numbers, and symbols.
10.
The data on your computer and/or network drive is owned by...
Correct Answer
D. Provision Ministry Group
Explanation
All data which is stored on your computer or any network drive is property of Provision Ministry Group.
11.
If you receive an unsolicited telephone call from someone claiming to need your password, what would you do?
Correct Answer
C. Refuse and report immediately
Explanation
This is one of the most common methods for gaining access to our network by outsiders.
12.
Which is the best way to protect the sensitive data in your computer when you go out for lunch?
Correct Answer
D. Lock your computer with password
Explanation
Customer and client information can be accessed or viewed by investors, vendors, or contractors while you are away from your computer. Always lock your comptuer with a password while you are away.
13.
Which of the following file types should you NEVER open, even if it is from a coworker or friend (select 2)?
Correct Answer(s)
A. .vbs
E. .exe
Explanation
These types of files can be used to execute viruses and malware. If you receive ANY attachment that is unsolicited, DO NOT OPEN IT and delete the email immediately.
14.
If you find a portable USB drive on the ground, you should...
Correct Answer
C. Leave it on the ground
Explanation
This form of social engineering can be used to gain access to a computer or network. Outsiders may purposely "drop" a drive which contains a trojan virus or other malware which can give them outside access to our network or cause problems with your computer.
15.
Where should your important TEAM files be stored?
Correct Answer
D. On my team's shared drive
Explanation
All shared data should be stored in a team drive on the network where it is accessible and backed up.
16.
Which of the following is an example of a strong password?
Correct Answer
B. J*p2le04>F
Explanation
By using a strong password and changing it often, you prevent outsiders from gaining access to our company data
17.
How often will you receive a new computer from the IT department?
Correct Answer
B. 2-3 years for laptops, 3-4 years for desktops
Explanation
The current life-cycle for all laptops is 2-3 years and desktops 3-4 years. The IT Department tracks the life of every computer and will replace it when timing and budgeting allows. Please do not contact the IT department to request a new computer or ask when you will get a new one.