1.
Where should keep your password in case you forget it?
Correct Answer
C. If you have to write down your password, it should be stored in a password keeper or vault.
Explanation
Passwords should never be written down unless they are being stored in a password vault or storage utility and protected by a master password.
2.
It is not safe to e-mail business documents to your home computer to work on them.
Correct Answer
A. True
Explanation
You should work on business documents on a corporate issued machine by either working on it in the office, or remotely connecting to your work machine and working on them remotely
3.
Which three methods will reduce the chances that your password will be compromised?
Correct Answer(s)
A. Make your password a combination of uppercase, lower case, Special characters and numbers
B. Change your password at least once a month
C. Use personally identifiable information (such as name, birthdates, and telepHone numbers)
Explanation
Correct! Passwords should be changed every six (6) months at a minimum, and should be a combination of uppercase, lowercase, numbers and symbols.
4.
Which of the following passwords is the most secure?
Correct Answer
C. MdF1s-Go@d!
Explanation
Correct! Incorporating Uppercase, Lowercase, numbers and symbols into your passwords makes it more difficult to hack.
5.
How often should passwords be changed?
Correct Answer
B. Every 60 days
Explanation
Correct! Passwords should be changed at least every six (6) months, and in order to maintain security you should not use the same password for multiple log-ins or the same password within the same year.
6.
Your supervisor is very busy and asks you to log into the the server using his/her username and password to retrieve some reports. What should you do?
Correct Answer
C. Decline the request and remind your supervisor that it is against company policy.
ExplanationC is correct. Decline the request and remind your supervisor that it is against ISI policy. Passwords must not be shared. If pressured further, report the situation to HR. If you have questions, contact the IT Department at
[email protected]
7.
You receive an email with an attachment from "I.T. Security." The email says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do?
Correct Answer
E. Contact the IT Department and ask about the email before doing anything
Explanation
4 is correct.
Attachments can contain viruses and other malicious programs that can infect your computer, so opening or clicking on an unexpected or unknown attachment can be risky.
If you can tell that this is spam, delete the E-Mail message. If you are unsure, contact the IT Department for further instructions.
Do not open, reply to or forward suspicious emails or attachments.
8.
You received an email like following image. What you should not do?
Correct Answer
D. Delete the message without sending a reply
Explanation
4 - Delete the Message
This scenerio has four (4) big risks:
1) Some screen savers contain viruses or other malicious software and it is risky to put unknown or unsolicited programs or software onto your computer;
2) Also, in some cases just clicking on a malicious program can infect a computer, so unless you are sure a link is safe- don't click on it.
3) Email addresses can be faked - or hacked. There is no way to be certain of this without checking.
4) Finally, some websites and links look legitimate, but they're really hoaxes designed to steal your information.
9.
Which workstation security safeguards are YOU responsible for protecting?
Correct Answer
E. All of the above
Explanation
All of the Above.
Security is the responsibility of everyone within the office and each person needs to be diligent about protecting their usernames, passwords, and any other sensitive, confidential and personally identifiable information.
10.
The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?
Correct Answer(s)
B. Disconnect your computer from the network.
C. Tell your supervisor
Explanation
Disconnect your computer from the network and then tell your supervisor.
Computers can be controlled remotely, and hackers can access computers by cracking paswords and usernames. If this happens, it is best to disconnect the computer from the network, to prevent access to the rest of the company files and wait until help arrives. If possible - DO NOT TURN OFF THE COMPUTER.
11.
which of the following can be use to identify a phishing email??
Correct Answer(s)
A. Poor spelling and/or grammar
B. Content threatening/urgent pHases
D. There is no way to be certain that a link from an email will be safe.
Explanation
Poor spelling and/or grammar, content threatening/urgent phases, and the uncertainty of the safety of a link from an email can all be used to identify a phishing email. Phishing emails often contain spelling and grammar mistakes, as they are usually sent by scammers who may not have a strong command of the language. They also tend to use threatening or urgent language to create a sense of urgency and manipulate the recipient into taking immediate action. Additionally, it is impossible to guarantee the safety of a link from an email, as it could lead to a malicious website or download.
12.
A web browser pop-up appears on your personal computer offering an "anti-spyware product" .What's your best course of action?
Correct Answer
C. Close the window. If you want spyware protection software, or are unsure if you have up-to-date anti-spyware software, it is best to speak with the IT Specialist.
Explanation
The best course of action is to close the window. This is because the pop-up offering an "anti-spyware product" is likely a scam or a form of malware. Clicking on the link and providing credit card information can lead to identity theft or financial loss. It is always safer to consult with an IT specialist to ensure that you have legitimate and up-to-date anti-spyware software.
13.
It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.
Correct Answer
B. False
Explanation
Even though email messages get scanned via multiple vendors for malware, spyware and phishing, there is no guarantee that they will catch every instance of malware. It is recommended that you only open attachments and click on links if messages are from an individual you know. Enabling Safe Senders for Outlook is a good way to accomplish this.
14.
Which of the following should you not do with your password?
Correct Answer
D. All of the above
Explanation
Passwords are meant to be secret and only known by you and not shared in any way.
15.
Most information security breaches occur due to
Correct Answer
C. Internal Employees
Explanation
Internal employees tend to be the cause of the most information security breaches
16.
If you are browsing the Internet and suddenly you get a prompt asking you to download a file and run it, what should you do?
Correct Answer
B. Download the file and run it
Explanation
If you are prompted to download a file when simply browsing the internet, then chances are you've navigated to a site that is infected and is trying to infect you. It is best to cancel the download, close the browser and run a full AV scan on your machine.
17.
You receive an e-mail message from a widow in Turks and Caicos. What do you do?
Correct Answer
C. Delete the message
Explanation
These types of e-mails are called 419 or 411 scams. These are e-mails that try to encourage you to perform fraudulent activities on behalf of someone in another country (such as laundering money).
18.
You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords) for an approved, business need. What should you do?
Correct Answer
A. Ensure you are using an encrypt method of sending email
Explanation
To ensure the security and privacy of the private information being sent and received via email, it is important to use an encryption method. Encryption converts the information into a code that can only be deciphered by authorized parties, thus protecting it from unauthorized access. This is crucial when dealing with sensitive data such as medical records, salary information, social security numbers, and passwords, as it reduces the risk of the information falling into the wrong hands.
19.
Clicking website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc.) can be harmful.
Correct Answer
A. True
Explanation
You should only access trusted sites (Google, Facebook, Twitter, etc) by entering the URL directly or via a bookmark. Clicking on links in e-mail and from other untrusted sites may allow an attacker to steal or capture your credentials.
20.
When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the URL starts with 'https" to insure the transaction is protected by SSL encryption.
Correct Answer
A. True
Explanation
Before you enter sensitive data in a web form or on a webpage, look for signs—like a web address with https and a closed padlock beside it—that it is secure.
21.
Which of the following is true when it comes to official e-mail provided to employees ?
Correct Answer
D. Both A and C
Explanation
When it comes to official e-mail provided to employees, it is true that email is considered company property. This means that the company has ownership and control over the content of the emails. Additionally, it is also true that email may be retrieved and reviewed for any number of reasons, including legal subpoenas. This implies that the company has the right to access and review employee emails if necessary, such as for legal investigations or compliance purposes.
22.
Physical and administrative security standards also apply to handheld devices that are used for business purposes at the organization.
Correct Answer
A. True
Explanation
Physical and administrative security standards are important for protecting sensitive information and ensuring the overall security of an organization's assets. Handheld devices, such as smartphones and tablets, are commonly used for business purposes and can store or access sensitive data. Therefore, it is necessary for these devices to comply with the same security standards as other devices within the organization to prevent unauthorized access or data breaches.
23.
Employees responsibility for information security include:(Select all that apply).
Correct Answer(s)
A. Complete all required training
B. Adhere to established policies and procedures
C. Contact IT Department/ Manager concerning suspicious activity or disclosure of non-public information
D. Company guidelines
Explanation
Employees have multiple responsibilities when it comes to information security. They must complete all required training to ensure they have the necessary knowledge and skills to protect sensitive information. They are also expected to adhere to established policies and procedures, which serve as guidelines for maintaining information security. Additionally, if employees come across any suspicious activity or encounter a potential disclosure of non-public information, they should promptly report it to the IT department or their manager. Following company guidelines is another important responsibility employees have in order to ensure information security.
24.
Employees must secure all non-public information in a manner to which it cannot be retrieved by any unauthorized party, such as in a locked drawer or locked file cabinet.
Correct Answer
A. True
Explanation
The statement is true because it emphasizes the importance of securing non-public information. It states that employees must ensure that such information is stored in a way that unauthorized individuals cannot access it. This can be achieved by using locked drawers or file cabinets, which provide an additional layer of protection against unauthorized retrieval. By following these guidelines, organizations can maintain the confidentiality and integrity of sensitive information.
25.
Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?
Correct Answer
B. pHishing
Explanation
Phishing is a scheme where criminals send unsolicited e-mail or pop-up messages to deceive and trick unsuspecting victims into providing personal and financial information. This information is then used for fraudulent purposes such as identity theft or financial fraud.
26.
What is the importance of backing up data?
Correct Answer
D. All the above
Explanation
Backing up data is important for several reasons. Firstly, it ensures that data is available when it is needed to be accessed. This is crucial in case of any accidental deletion, hardware failure, or system crash. Secondly, backing up data helps in recovering quickly if there is a malware infection. Malware attacks can corrupt or delete data, and having a backup ensures that the data can be restored easily. Lastly, backing up data ensures the safety of the data. In case of any natural disasters, theft, or physical damage to the storage devices, having a backup ensures that the data is not lost permanently.
27.
When is the best time to lie to your information security auditor or officer?
Correct Answer
D. None of the above
Explanation
The best time to lie to your information security auditor or officer is never. Lying to cover up someone else's mistakes or faults, distrusting the security auditor, or trying to protect key individuals in your organization are all unethical and can have serious consequences. It is always important to maintain honesty and integrity when dealing with information security.
28.
When an employee transfers within an organization …
Correct Answer
C. All access permission should be reviewed.
Explanation
When an employee transfers within an organization, it is important to review all access permissions. This is necessary to ensure that the employee only has access to the necessary resources and information in their new role. By reviewing access permissions, the organization can prevent any unauthorized access and maintain the security of their systems and data. This step is essential in maintaining the integrity of the organization's security measures and protecting sensitive information from potential breaches.
29.
What are the physical security best practices?
Correct Answer(s)
A. Don’t let anyone in if they can’t get in themselves
C. Insist on seeing ID from people you don’t know
D. Don’t let strangers “mess” with anything even if they do have ID
Explanation
The correct answer includes three physical security best practices. The first practice is to not let anyone in if they can't gain access themselves, which ensures that only authorized individuals are allowed entry. The second practice is to insist on seeing identification from people who are unfamiliar, which helps verify their identity and prevents unauthorized access. The third practice is to not allow strangers to tamper with anything, even if they have identification, as this helps protect sensitive information and resources.
30.
“Revoking the access to the any asset of the organization when an employee/contractor is terminated is a good option." What do you think about the above statement?
Correct Answer
D. Disagree with the above statement
Explanation
Disagreeing with the statement implies that revoking access to any asset of the organization when an employee/contractor is terminated is not a good option. This could be because past employees should not have access to confidential information or resources after they leave the organization, as it could pose a security risk. Additionally, it is important to protect the organization's assets and ensure that only authorized individuals have access to them.
31.
Is it legal to copy software from Office PC to your laptop or home PC?
Correct Answer
B. No
Explanation
It is not legal to copy software from an Office PC to your laptop or home PC without proper authorization. Software is protected by copyright laws, and copying it without permission is a violation of those laws. It is important to obtain the necessary licenses or permissions to use the software on each device separately.
32.
Why does enabling Two-Factor Authentication increase your security?
Correct Answer
B. Requires "something you know" and "something you have" to log into your account
Explanation
Enabling Two-Factor Authentication increases your security because it adds an extra layer of protection to your account. It requires you to provide not only something you know (like a password) but also something you have (like a physical device or a unique code). This makes it much more difficult for unauthorized individuals to access your account, even if they manage to obtain your password. By combining these two factors, it significantly reduces the risk of unauthorized access and enhances the overall security of your account.
33.
In order to avoid spreading malicious programs through email is to not open unexpected e-mail attachments from unknown sources.
Correct Answer
A. True
Explanation
Opening unexpected email attachments from unknown sources can indeed lead to the spreading of malicious programs. Malicious programs, such as viruses or malware, can be disguised as innocent-looking attachments and can infect a computer or network when opened. By not opening such attachments, individuals can protect themselves and their devices from potential harm. Therefore, the statement "In order to avoid spreading malicious programs through email is to not open unexpected e-mail attachments from unknown sources" is true.
34.
Which of the following message attachments would you be wise not to open? A message with an attachment that:
Correct Answer
D. All of the above
Explanation
All of the above message attachments would be wise not to open. This is because a message with an attachment that appears more than once in your Inbox could be a sign of a spam or phishing attempt. Similarly, a message claiming to be a sample copy of a new game from a recognized company e-mail address could be a potential malware or virus. Lastly, an unexpected note from a friend could also be a disguise for a malicious attachment. Therefore, it is best to exercise caution and avoid opening any of these message attachments.
35.
It's a best practice to lock/logout your office computer if you leave the place.
Correct Answer
A. True
Explanation
Locking or logging out of your office computer when you leave the place is considered a best practice for security reasons. By doing so, you ensure that unauthorized individuals cannot access your computer and its data in your absence. This helps protect sensitive information, prevent unauthorized use of your computer, and maintain the privacy and security of your work.
36.
Hitting the Delete key on your computer will erase the information from your computer completely.
Correct Answer
A. True
Explanation
Pressing the Delete key on a computer keyboard typically moves the selected file or folder to the Recycle Bin or Trash, rather than permanently erasing it. However, if the file or folder is already located in the Recycle Bin or Trash, pressing the Delete key will permanently delete it from the computer. Therefore, the statement is true as hitting the Delete key can lead to the complete erasure of information from the computer.
37.
What is the biggest vulnerability to computer information security?
Correct Answer
D. End Users
Explanation
End users are considered the biggest vulnerability to computer information security because they are often unaware of the risks and best practices for maintaining security. They may unknowingly click on malicious links or download infected files, making them susceptible to malware and phishing attacks. Additionally, end users may have weak passwords or fail to keep their software and devices updated, creating further vulnerabilities. It is crucial to educate and train end users on security measures to minimize the risk of breaches and protect sensitive information.
38.
Where should you write down your passwords ?
Correct Answer
D. You should never write down your password.
Explanation
Writing down your password is not recommended because it increases the risk of it being discovered by someone else. Even if you think you have hidden it well, there is always a chance that someone may find it. It is best to memorize your passwords or use a password manager to securely store them.
39.
Which of the following is a good way to create a password?
Correct Answer
D. A combination of upper and lowercase letters mixed with numbers and symbols.
Explanation
A combination of upper and lowercase letters mixed with numbers and symbols is a good way to create a password because it increases the complexity and makes it harder for hackers to guess or crack the password. Including a mix of different character types adds an extra layer of security and makes the password stronger.
40.
Which of the following would be the best password?
Correct Answer
B. App@li
Explanation
The password "App@li" would be the best choice because it includes a combination of uppercase and lowercase letters, as well as special characters. This makes it more secure and harder to guess or crack. The other options either lack complexity or are too common and easily guessable.
41.
It is ok to use my favorite login password for all accounts.
Correct Answer
A. True
Explanation
Using the same login password for all accounts is not recommended because if one account gets hacked, all other accounts become vulnerable. It is best to use unique and strong passwords for each account to ensure maximum security.
42.
Passwords are used as:
Correct Answer
A. A first line of defense against hackers
Explanation
Passwords are used as a first line of defense against hackers because they provide a layer of security for accessing sensitive information. By requiring a password, it becomes more difficult for unauthorized individuals to gain access to personal accounts or systems. This helps to protect against potential threats and unauthorized access, making passwords an essential security measure in today's digital world.
43.
What is one of the ways that you can secure your password from disclosure
Correct Answer
C. Use a password manager with encryption features
Explanation
Using a password manager with encryption features is one of the ways to secure your password from disclosure. Password managers securely store and encrypt your passwords, making it difficult for hackers to access them. They also often have features like generating strong, unique passwords and automatically filling them in for you, reducing the need to remember or write down passwords. This method ensures that your passwords are protected and easily accessible only to you, enhancing the security of your accounts.
44.
Which of the following Rules of Thumb for passwords do not apply?
Correct Answer
C. Have your friend keep a copy of your password in case you forget.
Explanation
The rule of thumb "Have your friend keep a copy of your password in case you forget" does not apply because it goes against the principle of keeping passwords confidential. Sharing passwords with others, even trusted friends, increases the risk of unauthorized access to personal accounts and compromises security. It is always recommended to rely on secure methods like password managers or password recovery options provided by the service providers themselves to regain access to forgotten passwords.
45.
You came across a website that looks exactly like Facebook but it has a different domain which you have never heard of, which of the following is the best course of action that should be taken?
Correct Answer
C. Just ignore that website and login to https://facebook.com instead
Explanation
The best course of action in this situation is to ignore the website and login to the official Facebook website instead. This is because the website in question is a potential phishing or scam site that is designed to deceive users. By ignoring it and accessing the legitimate Facebook website, you can ensure the security of your personal information and avoid falling victim to any fraudulent activities. Reporting it to the IT security team is also a good idea to help protect other users from potential harm.
46.
While visiting your favorite website for downloading the Firefox browser, a popup appears that says, “You just won 100,000 US dollars! Click this link to claim your prize." What should you do?
Correct Answer
A. Ignore that popup and just download the Firefox browser
Explanation
The correct answer is to ignore the popup and just download the Firefox browser. This is because the popup is likely a scam or phishing attempt to deceive users into clicking on a malicious link. It is important to be cautious and not fall for such scams, as they could lead to malware infections or identity theft. It is always safer to download software directly from trusted sources rather than clicking on suspicious popups.
47.
Your college best friend has just sent you a chat in Facebook and sent with a link. The link is a shortened URL for example https://goo.gl/wf4V8Z, what should you do?
Correct Answer
B. Do not click the link and try to check the URL using an online tool that checks where it really takes you.
Explanation
The correct answer is to not click the link and try to check the URL using an online tool that checks where it really takes you. This is because shortened URLs can be used to hide malicious websites or phishing attempts. By checking the URL before clicking, you can ensure that it is safe and avoid potential security risks.
48.
You went to Starbucks to buy a coffee and then while waiting for your order, you decided to connect to their Free WiFi. While browsing to your Google Mail (https://mail.google.com/), the page redirects to http://www.googlemail.andrew.net. What do you think should you do?
Correct Answer
B. Disconnect to Starbuck’s WIFI network.
Explanation
The correct answer is to disconnect from Starbucks' WIFI network. This is because the redirection from the legitimate Google Mail website to a different website (http://www.googlemail.andrew.net) is suspicious and could indicate a potential security threat. It is important to prioritize the security of personal information and avoid connecting to potentially malicious networks.
49.
Which of the following could help you mitigate malwares and viruses from infecting your PC?
Correct Answer
B. Install an antivirus program and a firewall
Explanation
Installing an antivirus program and a firewall can help mitigate malwares and viruses from infecting your PC. Antivirus programs can detect and remove malicious software, while firewalls can block unauthorized access to your network and prevent malware from entering your system. By having both of these security measures in place, you can significantly reduce the risk of malware and virus infections on your PC.
50.
Viruses are always caught by modern antivirus software.
Correct Answer
A. True
Explanation
Modern antivirus software is designed to detect and remove viruses from computer systems. It constantly updates its virus definitions to stay up-to-date with the latest threats. Therefore, it is highly effective in catching viruses and protecting the system from potential harm. Hence, the statement "Viruses are always caught by modern antivirus software" is true.