1.
What do you do when you receive an email that contains a link?
Correct Answer
C. Click on it only if you know the sender and if it’s not suspicious-looking content
Explanation
When receiving an email that contains a link, it is important to exercise caution. Clicking on a link without verifying its source or assessing its content can potentially lead to harmful consequences such as phishing scams, malware, or identity theft. Therefore, it is advisable to click on a link only if you know and trust the sender, and if the email and its contents appear legitimate and not suspicious. This approach helps to minimize the risk of falling victim to online threats and ensures the safety of personal information and devices.
2.
If you receive an email from an Associate with inappropriate language or content, what are you required to do?
Correct Answer
B. Contact my supervisor or a Human Resources representative
Explanation
If you receive an email from an Associate with inappropriate language or content, it is important to contact your supervisor or a Human Resources representative. This is because they are the appropriate individuals who can handle such situations and take appropriate action. Deleting the email or replying to the sender and/or forwarding it to other people may not address the issue effectively, and therefore, these options are not the correct course of action in this situation.
3.
You need to obtain or relay information which includes account numbers and/or social security numbers. How do you do it?
Correct Answer
D. Either B or C
4.
When should confidential or proprietary information be sent via email?
Correct Answer
B. Only with your supervisor’s approval and with support from IT if it’s personal information that needs to be encrypted
Explanation
Confidential or proprietary information should never be sent via email without proper approval and support. This is because email is not a secure method of communication and there is a risk of the information being intercepted or accessed by unauthorized individuals. It is important to seek approval from a supervisor and involve IT support to ensure that the information is encrypted and protected before sending it via email.
5.
Which of the following is Personal Information?
Correct Answer
E. All of the Above
Explanation
All of the options listed in the question are considered personal information. Social Security Number, Driver's License Number or ID Card Number, Financial Account number or credit or debit card number, and Medical/Health information, date of birth, or mother's maiden name are all examples of personal information that can be used to identify an individual or potentially be used for fraudulent purposes.
6.
Which of the following is Confidential Business Information?
Correct Answer
E. All of the Above
Explanation
Confidential Business Information refers to sensitive data that is not publicly disclosed and is crucial for the success and competitive advantage of a business. Trade secrets, financial assessments, strategic plans, and store opening/closure plans all fall under this category as they contain valuable information that, if disclosed to competitors or the public, could harm the business's interests. Therefore, all of the options listed are considered Confidential Business Information.
7.
Email received from unknown senders or email domains should be:
Correct Answer
B. Deleted without opening
Explanation
Emails received from unknown senders or email domains should be deleted without opening because they can potentially contain harmful content such as viruses, malware, or phishing attempts. Opening these emails can put your computer and personal information at risk. It is important to exercise caution and only open emails from trusted sources to ensure the safety and security of your device and data.
8.
When should you use the “reply to all” function?
Correct Answer
C. Only when all recipients need to receive the reply
Explanation
The "reply to all" function should only be used when all recipients need to receive the reply. This means that if the response is relevant and important for everyone included in the original email, selecting "reply to all" ensures that everyone stays informed and on the same page. However, it is not necessary to use this function for jokes or chain mail, as these types of messages are usually not relevant to all recipients.
9.
SenderWhat type of information is appropriate to send through email?
Correct Answer
C. Business oriented notes that are worded professionally, as you would if you were talking to the person
Explanation
The appropriate type of information to send through email is business oriented notes that are worded professionally, as you would if you were talking to the person. This means that the content of the email should be related to work or business matters and should be written in a formal and respectful manner. Jokes and funny stories may not be appropriate for a professional email as they can be seen as unprofessional and may not be relevant to the purpose of the email. Rants about other associates are also not suitable for email communication as they can create a negative and toxic work environment.