Corporate Vigilance: Security Awareness In Business Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Asasasasa
A
Asasasasa
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,286
| Attempts: 1,286
SettingsSettings
Please wait...
  • 1/76 Questions

    In order to avoid spreading malicious programs through email is to not open unexpected e-mail attachments from unknown sources.

    • True
    • False
Please wait...
About This Quiz

In a business, it is essential to protect online assets. Why not take the Security Awareness In Business Quiz to learn about security awareness in business? The questions in our quiz are carefully curated to help you get the best in-depth information on the topic. Do you think you can ace this quiz? All the questions in our test are compulsory, so make sure to read all the questions carefully before answering. Remember to share this quiz with your friends for a fun learning time. Good Luck, and keep learning!

Corporate Vigilance: Security Awareness In Business Quiz - Quiz

Quiz Preview

  • 2. 

    It's a best practice to lock/logout your office computer if you leave the place.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Locking or logging out of your office computer when you leave the place is considered a best practice for security reasons. By doing so, you ensure that unauthorized individuals cannot access your computer and its data in your absence. This helps protect sensitive information, prevent unauthorized use of your computer, and maintain the privacy and security of your work.

    Rate this question:

  • 3. 

    When entering personal data such as credit card information into a website, it is important to look for the lock symbol or verify the URL starts with 'https" to insure the transaction is protected by SSL encryption. 

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Before you enter sensitive data in a web form or on a webpage, look for signs—like a web address with https and a closed padlock beside it—that it is secure.

    Rate this question:

  • 4. 

    Physical and administrative security standards also apply to handheld devices that are used for business purposes at the organization.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Physical and administrative security standards are important for protecting sensitive information and ensuring the overall security of an organization's assets. Handheld devices, such as smartphones and tablets, are commonly used for business purposes and can store or access sensitive data. Therefore, it is necessary for these devices to comply with the same security standards as other devices within the organization to prevent unauthorized access or data breaches.

    Rate this question:

  • 5. 

    Which of the following message attachments would you be wise not to open? A message with an attachment that:

    • Appears more than once in your Inbox

    • Says it's a sample copy of a new game from a recognized company e-mail address

    • Is an unexpected note from a friend

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    All of the above message attachments would be wise not to open. This is because a message with an attachment that appears more than once in your Inbox could be a sign of a spam or phishing attempt. Similarly, a message claiming to be a sample copy of a new game from a recognized company e-mail address could be a potential malware or virus. Lastly, an unexpected note from a friend could also be a disguise for a malicious attachment. Therefore, it is best to exercise caution and avoid opening any of these message attachments.

    Rate this question:

  • 6. 

    Which of the following passwords is the most secure? 

    • MyDogFido

    • Fido

    • MdF1s-Go@d!

    • Fid0399o

    Correct Answer
    A. MdF1s-Go@d!
    Explanation
    Correct! Incorporating Uppercase, Lowercase, numbers and symbols into your passwords makes it more difficult to hack.

    Rate this question:

  • 7. 

    Clicking website links in e-mails, from other untrusted websites, or in IM messages that go to sites that I trust (Facebook, Twitter, Google, etc.) can be harmful. 

    • True

    • False

    Correct Answer
    A. True
    Explanation
    You should only access trusted sites (Google, Facebook, Twitter, etc) by entering the URL directly or via a bookmark. Clicking on links in e-mail and from other untrusted sites may allow an attacker to steal or capture your credentials.

    Rate this question:

  • 8. 

    Which of the following is a good way to create a password?

    • Letter or number sequences.

    • Your children's or pet's names.

    • Substituting numbers of letters, such as 3 for E.

    • A combination of upper and lowercase letters mixed with numbers and symbols.

    Correct Answer
    A. A combination of upper and lowercase letters mixed with numbers and symbols.
    Explanation
    A combination of upper and lowercase letters mixed with numbers and symbols is a good way to create a password because it increases the complexity and makes it harder for hackers to guess or crack the password. Including a mix of different character types adds an extra layer of security and makes the password stronger.

    Rate this question:

  • 9. 

    Where should keep your password in case you forget it?

    • Someplace easily seen from your computer

    • Someplace out of sight like in a drawer or under your keyboard

    • If you have to write down your password, it should be stored in a password keeper or vault.

    Correct Answer
    A. If you have to write down your password, it should be stored in a password keeper or vault.
    Explanation
    Passwords should never be written down unless they are being stored in a password vault or storage utility and protected by a master password.

    Rate this question:

  • 10. 

    Which of the following should you not do with your password?

    • Say it out loud as you are typing it in

    • Email it to another team member

    • Provide it to your supervisor

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    Passwords are meant to be secret and only known by you and not shared in any way.

    Rate this question:

  • 11. 

    Your supervisor is very busy and asks you to log into the the server using his/her username and password to retrieve some reports. What should you do? 

    • It's your boss, so it's okay to do this.

    • Ignore the request and hope he/she forgets.

    • Decline the request and remind your supervisor that it is against company policy.

    Correct Answer
    A. Decline the request and remind your supervisor that it is against company policy.
    Explanation
    C is correct. Decline the request and remind your supervisor that it is against ISI policy. Passwords must not be shared. If pressured further, report the situation to HR. If you have questions, contact the IT Department at [email protected]

    Rate this question:

  • 12. 

    It's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    Even though email messages get scanned via multiple vendors for malware, spyware and phishing, there is no guarantee that they will catch every instance of malware. It is recommended that you only open attachments and click on links if messages are from an individual you know. Enabling Safe Senders for Outlook is a good way to accomplish this.

    Rate this question:

  • 13. 

    Which of the following would be the best password?

    • BobJones

    • App@li

    • 12345

    • ABcdEFgh

    Correct Answer
    A. App@li
    Explanation
    The password "App@li" would be the best choice because it includes a combination of uppercase and lowercase letters, as well as special characters. This makes it more secure and harder to guess or crack. The other options either lack complexity or are too common and easily guessable.

    Rate this question:

  • 14. 

    What is one of the ways that you can secure your password from disclosure

    • By making a note on your diary

    • Writing down on a notepad on your table so that you can easy find it

    • Use a password manager with encryption features

    • Write it on a piece of paper and keep it in your wallet

    Correct Answer
    A. Use a password manager with encryption features
    Explanation
    Using a password manager with encryption features is one of the ways to secure your password from disclosure. Password managers securely store and encrypt your passwords, making it difficult for hackers to access them. They also often have features like generating strong, unique passwords and automatically filling them in for you, reducing the need to remember or write down passwords. This method ensures that your passwords are protected and easily accessible only to you, enhancing the security of your accounts.

    Rate this question:

  • 15. 

    Employees must secure all non-public information in a manner to which it cannot be retrieved by any unauthorized party, such as in a locked drawer or locked file cabinet.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    The statement is true because it emphasizes the importance of securing non-public information. It states that employees must ensure that such information is stored in a way that unauthorized individuals cannot access it. This can be achieved by using locked drawers or file cabinets, which provide an additional layer of protection against unauthorized retrieval. By following these guidelines, organizations can maintain the confidentiality and integrity of sensitive information.

    Rate this question:

  • 16. 

    A malicious user can rely on email or webpage to launch a ____?

    • Phishing attacks

    • Virus attacks

    • Spyware

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    A malicious user can rely on email or webpage to launch phishing attacks, virus attacks, and spyware. Phishing attacks involve tricking individuals into revealing sensitive information through deceptive emails or websites. Virus attacks involve spreading harmful software through email attachments or infected webpages. Spyware can be installed on a user's device without their knowledge or consent through malicious emails or webpages, allowing the attacker to monitor their activities. Therefore, all of the mentioned options can be utilized by a malicious user to launch their attacks.

    Rate this question:

  • 17. 

    It is not safe to e-mail business documents to your home computer to work on them.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    You should work on business documents on a corporate issued machine by either working on it in the office, or remotely connecting to your work machine and working on them remotely

    Rate this question:

  • 18. 

    When is the best time to lie to your information security auditor or officer?

    • If you want to cover up your best friend’s faults or mistakes

    • If the security auditor is not your friend and cannot be trusted

    • If it impacts the termination of the key people in your organization

    • None of the above

    Correct Answer
    A. None of the above
    Explanation
    The best time to lie to your information security auditor or officer is never. Lying to cover up someone else's mistakes or faults, distrusting the security auditor, or trying to protect key individuals in your organization are all unethical and can have serious consequences. It is always important to maintain honesty and integrity when dealing with information security.

    Rate this question:

  • 19. 

    Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?  

    • Browsing.

    • Phishing

    • Encoding

    • Blogging

    Correct Answer
    A. Phishing
    Explanation
    Phishing is a scheme where criminals send unsolicited e-mail or pop-up messages to deceive and trick unsuspecting victims into providing personal and financial information. This information is then used for fraudulent purposes such as identity theft or financial fraud.

    Rate this question:

  • 20. 

    A web browser pop-up appears on your personal computer offering an "anti-spyware product" .What's your best course of action? 

    • Click on the link and provide your credit card information as the more protection prompted to install the better.

    • Click on the link in the ad to learn more about the company its products before your decide.

    • Close the window. If you want spyware protection software, or are unsure if you have up-to-date anti-spyware software, it is best to speak with the IT Specialist.

    Correct Answer
    A. Close the window. If you want spyware protection software, or are unsure if you have up-to-date anti-spyware software, it is best to speak with the IT Specialist.
    Explanation
    The best course of action is to close the window. This is because the pop-up offering an "anti-spyware product" is likely a scam or a form of malware. Clicking on the link and providing credit card information can lead to identity theft or financial loss. It is always safer to consult with an IT specialist to ensure that you have legitimate and up-to-date anti-spyware software.

    Rate this question:

  • 21. 

    Is it legal to copy software from Office PC to your laptop or home PC?

    • Yes

    • No

    Correct Answer
    A. No
    Explanation
    It is not legal to copy software from an Office PC to your laptop or home PC without proper authorization. Software is protected by copyright laws, and copying it without permission is a violation of those laws. It is important to obtain the necessary licenses or permissions to use the software on each device separately.

    Rate this question:

  • 22. 

    Passwords are used as:

    • A first line of defense against hackers

    • As a means to frustrate users

    • There is no real purpose for passwords

    • As a means of testing creativity

    Correct Answer
    A. A first line of defense against hackers
    Explanation
    Passwords are used as a first line of defense against hackers because they provide a layer of security for accessing sensitive information. By requiring a password, it becomes more difficult for unauthorized individuals to gain access to personal accounts or systems. This helps to protect against potential threats and unauthorized access, making passwords an essential security measure in today's digital world.

    Rate this question:

  • 23. 

    What indicates you are shopping online in a secure manner?

    • I know the company

    • They are selling quality goods of famous brands

    • There’s a banner on the top of the page saying ―Secure Website‖

    • The URL/address of the web site starts with ―https://

    Correct Answer
    A. The URL/address of the web site starts with ―https://
    Explanation
    When the URL/address of a website starts with "https://", it indicates that you are shopping online in a secure manner. The "https://" protocol ensures that the data exchanged between your browser and the website is encrypted and cannot be easily intercepted by hackers. This helps to protect your personal and financial information while making online transactions.

    Rate this question:

  • 24. 

    Your Facebook friend has just posted a link on your timeline that contains nude pictures. You also noticed that he has tagged some of your mutual friends too, what is the most responsible thing you can do for this situation as a cyber-savvy?

    • Just untagged yourself and delete the post. It doesn’t matter anyway since it’s already a norm nowadays.

    • Report the malicious post to Facebook

    • Unfriend him or her

    • Scold your friend and explain to him or her that this could destroy your reputation

    Correct Answer
    A. Report the malicious post to Facebook
    Explanation
    The most responsible thing to do in this situation as a cyber-savvy individual is to report the malicious post to Facebook. By reporting the post, you are taking action to prevent the spread of inappropriate content and protect yourself and your mutual friends from potential harm. Untagging yourself and deleting the post may address the immediate issue, but reporting it to Facebook ensures that appropriate measures are taken to address the violation of community guidelines and prevent similar incidents in the future. Unfriending the person or scolding them may be appropriate actions as well, but reporting the post takes a proactive approach to address the larger issue.

    Rate this question:

  • 25. 

    You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords) for an approved, business need. What should you do?

    • Ensure you are using an encrypt method of sending email

    • Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands

    • Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands

    Correct Answer
    A. Ensure you are using an encrypt method of sending email
    Explanation
    To ensure the security and privacy of the private information being sent and received via email, it is important to use an encryption method. Encryption converts the information into a code that can only be deciphered by authorized parties, thus protecting it from unauthorized access. This is crucial when dealing with sensitive data such as medical records, salary information, social security numbers, and passwords, as it reduces the risk of the information falling into the wrong hands.

    Rate this question:

  • 26. 

    How often should passwords be changed? 

    • Every year

    • Every 60 days

    • Never

    • Every 6 months

    Correct Answer
    A. Every 60 days
    Explanation
    Correct! Passwords should be changed at least every six (6) months, and in order to maintain security you should not use the same password for multiple log-ins or the same password within the same year.

    Rate this question:

  • 27. 

    You receive an e-mail message from a widow in Turks and Caicos. What do you do?

    • Forward it to all of your friends

    • Follow all his instructions to the letter and wait for your check in the mail

    • Delete the message

    Correct Answer
    A. Delete the message
    Explanation
    These types of e-mails are called 419 or 411 scams. These are e-mails that try to encourage you to perform fraudulent activities on behalf of someone in another country (such as laundering money).

    Rate this question:

  • 28. 

    Which of the following is true when it comes to official e-mail provided to employees ?

    • Email is considered company property

    • An employee has the right to keep email private

    • Email may be retrieved and reviewed for any number of reasons including legal supoenas

    • Both A and C

    Correct Answer
    A. Both A and C
    Explanation
    When it comes to official e-mail provided to employees, it is true that email is considered company property. This means that the company has ownership and control over the content of the emails. Additionally, it is also true that email may be retrieved and reviewed for any number of reasons, including legal subpoenas. This implies that the company has the right to access and review employee emails if necessary, such as for legal investigations or compliance purposes.

    Rate this question:

  • 29. 

    You went to Starbucks to buy a coffee and then while waiting for your order, you decided to connect to their Free WiFi. While browsing to your Google Mail (https://mail.google.com/), the page redirects to http://www.googlemail.andrew.net. What do you think should you do?

    • Login to where Google Mail has redirected, it’s just one of Google’s web sites – not suspicious at all.

    • Disconnect to Starbuck’s WIFI network.

    • Ask the person sitting next to you if his Google Mail also redirects to http://www.googlemail.andrew.net.

    • Find the Wireless Access Point and reboot it

    Correct Answer
    A. Disconnect to Starbuck’s WIFI network.
    Explanation
    The correct answer is to disconnect from Starbucks' WIFI network. This is because the redirection from the legitimate Google Mail website to a different website (http://www.googlemail.andrew.net) is suspicious and could indicate a potential security threat. It is important to prioritize the security of personal information and avoid connecting to potentially malicious networks.

    Rate this question:

  • 30. 

    Which of the following is a good practice to avoid email viruses?

    • Delete an unexpected or unsolicited message

    • Use anti-virus software to scan attachments before opening

    • Delete similar messages that appears more than once in your Inbox 

    • All the above

    Correct Answer
    A. All the above
    Explanation
    A good practice to avoid email viruses is to delete unexpected or unsolicited messages, as they may contain harmful attachments or links. Using anti-virus software to scan attachments before opening them is also recommended, as it can detect and remove any potential viruses. Additionally, deleting similar messages that appear more than once in your Inbox can help to avoid opening duplicate or potentially malicious emails. Therefore, the answer "All the above" is correct as all of these practices contribute to avoiding email viruses.

    Rate this question:

  • 31. 

    If you're not careful about your Internet browsing, which of the following can result?

    • Spyware or Adware installation

    • Browser Hijacking

    • Information or identity theft

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    If you are not careful about your internet browsing, it can result in various negative consequences such as the installation of spyware or adware on your device, browser hijacking, and information or identity theft. This means that all of the options mentioned in the question can be potential outcomes of careless internet browsing.

    Rate this question:

  • 32. 

    Which workstation security safeguards are YOU responsible for protecting?  

    • User I.D

    • Password

    • Logging off programs

    • Locking up office or work areas (cabinets, doors, windows)

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    All of the Above.

    Security is the responsibility of everyone within the office and each person needs to be diligent about protecting their usernames, passwords, and any other sensitive, confidential and personally identifiable information.

    Rate this question:

  • 33. 

    Your Facebook friend has just posted a link on your timeline that contains nude pictures. You also noticed that he has tagged some of your mutual friends too, what is the most responsible thing you can do for this situation as a cyber-savvy?

    • I. Just untagged yourself and delete the post. It doesn’t matter anyway since it’s already a norm nowadays.

    • Report the malicious post to Facebook

    • Unfriend him or her

    • Scold your friend and explain to him or her that this could destroy your reputation.

    Correct Answer
    A. Report the malicious post to Facebook
    Explanation
    The most responsible thing to do in this situation as a cyber-savvy individual is to report the malicious post to Facebook. By reporting the post, you are taking action to address the inappropriate content and potentially prevent it from spreading further. This not only helps protect your own reputation but also ensures the safety and well-being of your mutual friends who may have also been tagged in the post. Untagging yourself and deleting the post may not be enough to address the issue, and scolding your friend may not effectively resolve the situation.

    Rate this question:

  • 34. 

    _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored

    • Denial of service

    • Exploits

    • Scams

    • Keylogging

    Correct Answer
    A. Keylogging
    Explanation
    Keylogging is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. It is a method used by attackers to gather sensitive information such as passwords, credit card numbers, or personal data. Keyloggers can be installed through malicious software or hardware devices, allowing the attacker to track and collect every keystroke made by the user. This information can then be used for various malicious purposes, such as identity theft or unauthorized access to accounts.

    Rate this question:

  • 35. 

    Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code

    • Trojans

    • Viruses

    • Worm

    • Adware

    Correct Answer
    A. Trojans
    Explanation
    Trojans are a type of program that appear to have useful or desirable features but actually contain damaging code. Unlike viruses and worms, which can replicate and spread on their own, Trojans rely on users to unknowingly install them. Once installed, Trojans can perform a variety of malicious actions, such as stealing personal information, damaging files, or allowing unauthorized access to a computer. Adware, on the other hand, is a type of software that displays unwanted advertisements, but it is not typically considered to contain damaging code.

    Rate this question:

  • 36. 

    What is the software called that’s designed to exploit a computer user and is a broad term covering computer viruses, worms, Trojan, adware, etc.?

    • Backdoors

    • Key-logger

    • Malware

    • Bots

    • Spyware

    Correct Answer
    A. Malware
    Explanation
    Malware is the correct answer because it is a broad term that encompasses various types of malicious software designed to exploit computer users. This includes computer viruses, worms, Trojans, adware, and other harmful programs. Malware can infiltrate a computer system without the user's consent and cause damage, steal personal information, or disrupt normal computer operations. It is important for users to have antivirus software and regularly update their systems to protect against malware threats.

    Rate this question:

  • 37. 

    Your college best friend has just sent you a chat in Facebook and sent with a link. The link is a shortened URL for example https://goo.gl/wf4V8Z, what should you do?

    • Click the link because it shouldn’t be malicious since he/she is your best friend after all. There is nothing to worry about.

    • Do not click the link and try to check the URL using an online tool that checks where it really takes you.

    • Contact your local Computer Emergency Response / Readiness Team because it may contain malicious software.

    • Install antivirus software, then click the link.

    Correct Answer
    A. Do not click the link and try to check the URL using an online tool that checks where it really takes you.
    Explanation
    The correct answer is to not click the link and try to check the URL using an online tool that checks where it really takes you. This is because shortened URLs can be used to hide malicious websites or phishing attempts. By checking the URL before clicking, you can ensure that it is safe and avoid potential security risks.

    Rate this question:

  • 38. 

    Where should you write down your passwords ?

    • Someplace easily seen from your computer.

    • Someplace that is out of sight, like beneath your keyboard or in a nearby drawer.

    • Wherever you really need it for your memory, but this information can only be kept in a secure

    • You should never write down your password.

    Correct Answer
    A. You should never write down your password.
    Explanation
    Writing down your password is not recommended because it increases the risk of it being discovered by someone else. Even if you think you have hidden it well, there is always a chance that someone may find it. It is best to memorize your passwords or use a password manager to securely store them.

    Rate this question:

  • 39. 

    A customer service representative has just called you saying that your credit card is about to expire, he or she asked you to provide your account information and personal information in order to verify your account and to renew your credit card without telling you from what bank he or she came from. What should you do?

    • Ask the customer representative what bank or company he or she came from.

    • Verify your credit card if it really expired because expiration dates are placed on credit cards

    • Don’t give out your personal information and credit card information yet if you don’t have enough information about the customer service representative yet or about the bank.

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    The correct answer is "All of the above." In this situation, it is important to ask the customer representative what bank or company they came from to ensure their legitimacy. Additionally, verifying if your credit card has actually expired is important as expiration dates are placed on credit cards. Lastly, it is crucial to not give out personal and credit card information without sufficient information about the representative or the bank. By following all of these steps, you can protect yourself from potential fraud or scams.

    Rate this question:

  • 40. 

    What is the importance of backing up data?

    • To ensure that data is available when you need to access

    • To recover quickly if there is a malware infection

    • To ensure the data safety

    • All the above

    Correct Answer
    A. All the above
    Explanation
    Backing up data is important for several reasons. Firstly, it ensures that data is available when it is needed to be accessed. This is crucial in case of any accidental deletion, hardware failure, or system crash. Secondly, backing up data helps in recovering quickly if there is a malware infection. Malware attacks can corrupt or delete data, and having a backup ensures that the data can be restored easily. Lastly, backing up data ensures the safety of the data. In case of any natural disasters, theft, or physical damage to the storage devices, having a backup ensures that the data is not lost permanently.

    Rate this question:

  • 41. 

    Which statement most accurately describes virus

    • A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources

    • A program that protects your computer from hackers

    • A program that is installed onto your computer that monitors your internet use

    • All of the above

    Correct Answer
    A. A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources
    Explanation
    The correct answer is "A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources." This accurately describes a virus, which is a type of malicious software that replicates itself and consumes computer resources. It does not protect the computer from hackers or monitor internet use.

    Rate this question:

  • 42. 

    You receive an email with an attachment from "I.T. Security." The email says that your computer has been infected with a virus and you need to open the attachment and follow the directions to get rid of the virus. What should you do?  

    • Follow the instructions ASAP to avoid the virus.

    • Open the email attachment to see what is says before proceeding

    • Reply to the sender and say "take me off this list".

    • Delete the message from the unknown source.

    • Contact the IT Department and ask about the email before doing anything

    Correct Answer
    A. Contact the IT Department and ask about the email before doing anything
    Explanation
    4 is correct.
    Attachments can contain viruses and other malicious programs that can infect your computer, so opening or clicking on an unexpected or unknown attachment can be risky.

    If you can tell that this is spam, delete the E-Mail message. If you are unsure, contact the IT Department for further instructions.

    Do not open, reply to or forward suspicious emails or attachments.

    Rate this question:

  • 43. 

    Why does enabling Two-Factor Authentication increase your security?

    • Forces you to have a password longer than two characters

    • Requires "something you know" and "something you have" to log into your account

    • Makes you do math before sending a text to ensure you’re not intoxicated

    • Allows you to unlock your phone by taking two consecutive selfies

    Correct Answer
    A. Requires "something you know" and "something you have" to log into your account
    Explanation
    Enabling Two-Factor Authentication increases your security because it adds an extra layer of protection to your account. It requires you to provide not only something you know (like a password) but also something you have (like a physical device or a unique code). This makes it much more difficult for unauthorized individuals to access your account, even if they manage to obtain your password. By combining these two factors, it significantly reduces the risk of unauthorized access and enhances the overall security of your account.

    Rate this question:

  • 44. 

    When an employee transfers within an organization …

    • The employee must undergo a new security review

    • The old system IDs must be disabled.

    • All access permission should be reviewed.

    • The employee must turn in all access devices.

    Correct Answer
    A. All access permission should be reviewed.
    Explanation
    When an employee transfers within an organization, it is important to review all access permissions. This is necessary to ensure that the employee only has access to the necessary resources and information in their new role. By reviewing access permissions, the organization can prevent any unauthorized access and maintain the security of their systems and data. This step is essential in maintaining the integrity of the organization's security measures and protecting sensitive information from potential breaches.

    Rate this question:

  • 45. 

    What is the biggest vulnerability to computer information security?

    • Instant Messaging, Peer-to-Peer (P2P) applications

    • Malware - virus, worms, spyware

    • Spam, Phishing attacks.

    • End Users

    Correct Answer
    A. End Users
    Explanation
    End users are considered the biggest vulnerability to computer information security because they are often unaware of the risks and best practices for maintaining security. They may unknowingly click on malicious links or download infected files, making them susceptible to malware and phishing attacks. Additionally, end users may have weak passwords or fail to keep their software and devices updated, creating further vulnerabilities. It is crucial to educate and train end users on security measures to minimize the risk of breaches and protect sensitive information.

    Rate this question:

  • 46. 

    Which of the following could help you mitigate malwares and viruses from infecting your PC?

    • Download software from trusted sources only

    • Install an antivirus program and a firewall

    • Always update your PC when prompted for system updates

    • Install Wireshark to monitor and analyze the traffic of your network

    Correct Answer
    A. Install an antivirus program and a firewall
    Explanation
    Installing an antivirus program and a firewall can help mitigate malwares and viruses from infecting your PC. Antivirus programs can detect and remove malicious software, while firewalls can block unauthorized access to your network and prevent malware from entering your system. By having both of these security measures in place, you can significantly reduce the risk of malware and virus infections on your PC.

    Rate this question:

  • 47. 

    Most information security breaches occur due to  

    • Amazing External Hackers

    • Poor Programming Techniques

    • Internal Employees

    • Bad Firewall Settings

    Correct Answer
    A. Internal Employees
    Explanation
    Internal employees tend to be the cause of the most information security breaches

    Rate this question:

  • 48. 

    You received an email like following image. What you should not do?

    • Reply to the mail and retrieve a the cash amount.

    • Forward the message to other friends to share it

    • Call IT and ask them to help it for you

    • Delete the message without sending a reply

    Correct Answer
    A. Delete the message without sending a reply
    Explanation
    4 - Delete the Message

    This scenerio has four (4) big risks:

    1) Some screen savers contain viruses or other malicious software and it is risky to put unknown or unsolicited programs or software onto your computer;

    2) Also, in some cases just clicking on a malicious program can infect a computer, so unless you are sure a link is safe- don't click on it.

    3) Email addresses can be faked - or hacked. There is no way to be certain of this without checking.

    4) Finally, some websites and links look legitimate, but they're really hoaxes designed to steal your information.

    Rate this question:

  • 49. 

    _________ are computer programs that are designed by attackers to gain root or administrative access to your computer.

    • Backdoors

    • Rootkits

    • Malware

    • Antiware

    Correct Answer
    A. Rootkits
    Explanation
    Rootkits are computer programs that are specifically designed by attackers to gain root or administrative access to a targeted computer. They are malicious software that allows unauthorized users to control and manipulate the system without being detected. Rootkits often operate stealthily, hiding their presence and enabling attackers to carry out various malicious activities, such as stealing sensitive information, modifying system configurations, or installing additional malware. Unlike other options listed, backdoors and antiware may be components of a rootkit, while malware is a broader term encompassing various types of malicious software.

    Rate this question:

Quiz Review Timeline (Updated): Nov 23, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 23, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 25, 2017
    Quiz Created by
    Asasasasa
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.