Why is IT important to have a good understanding of information security policies and procedures Mcq?

20 Questions  |  By ABasi | Last updated: Mar 22, 2022 | Total Attempts: 851

Settings

Feedback

During the Quiz End of Quiz

Difficulty

Sequential Easy First Hard First

.

  • 1. 

    Why is it important to have a good understanding of Information Security policies and procedures?

    • A. 

      Helps protect individuals from being victims of security incidents.

    • B. 

      Provides an understanding of steps to follow in the event of a security incident

    • C. 

      Helps to understand levels of responsibility

    • D. 

      All of the above

  • 2. 

    Which of the following is a good way to create a password?

    • A. 

      Your children's or pet's names

    • B. 

      Using look-alike substitutions of numbers or symbols

    • C. 

      A combination of upper and lowercase letters mixed with numbers and symbols

    • D. 

      Using common names or words from the dictionary

  • 3. 

    Which of the following would be the best password?

    • A. 

      MySecret

    • B. 

      Dp0si#Z$2

    • C. 

      Abc123

    • D. 

      Keyboard

  • 4. 

    When receiving an email from an unknown contact that has an attachment, you should:

    • A. 

      Open the attachment to view its contents

    • B. 

      Delete the email

    • C. 

      Forward the email to your co-workers to allow them to open the attachment first

    • D. 

      Forward the email to your personal email account so you can open it at home

  • 5. 

    Which of the following is a good practice to avoid email viruses?

    • A. 

      Delete an unexpected or unsolicited message

    • B. 

      Use anti-virus software to scan attachments before opening

    • C. 

      Delete similar messages that appears more than once in your Inbox

    • D. 

      All the above

  • 6. 

    Which of the following is a proper use of email?

    • A. 

      Never email personal information

    • B. 

      Send out pricelists for your home-based business products

    • C. 

      Forward inspirational and humorous emails to your co-workers to brighten their day

    • D. 

      Send an email to all your friends and co-workers to advertise a job opening in your area

  • 7. 

    Instant Messaging is safer than regular email.

    • A. 

      True

    • B. 

      False

  • 8. 

    A malicious user can rely on email or webpage to launch a ____

    • A. 

      Phishing attacks

    • B. 

      Virus attacks

    • C. 

      Spyware

    • D. 

      All of the above

  • 9. 

    Which statement most accurately describes the virus?

    • A. 

      A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources

    • B. 

      A program that protects your computer from hackers

    • C. 

      A program that is installed onto your computer that monitors your internet use

    • D. 

      All of the above

  • 10. 

    If you're not careful about your Internet browsing, which of the following can result?

    • A. 

      Spyware or Adware installation

    • B. 

      Browser Hijacking

    • C. 

      Information or identity theft

    • D. 

      All of the above

  • 11. 

    The first step in Security Awareness is being able to ________ a security threat.

    • A. 

      Avoid

    • B. 

      Recognize

    • C. 

      Challenge

    • D. 

      Log

  • 12. 

    What should you do if you think the email you received is a phishing attempt?

    • A. 

      Do not reply to the message

    • B. 

      Click the link so you can see what the site looks like

    • C. 

      Keep your system up to date, and install up-to-date antivirus and antispyware software

    • D. 

      Report the phishing email to the legitimate company or organization that has been spoofed

  • 13. 

    What should you do if you think your password has been compromised?

    • A. 

      Change your password

    • B. 

      Report the incident to the proper authorities - such as a system administrator(s)

    • C. 

      Check other systems that you have accounts on as they may be compromised as well

    • D. 

      All the above

  • 14. 

    What is the biggest vulnerability to computer information security?

    • A. 

      Instant Messaging, Peer-to-Peer (P2P) applications

    • B. 

      Malware - virus, worms, spyware

    • C. 

      Spam, Phishing attacks

    • D. 

      End Users

  • 15. 

    What is the most common delivery method for viruses?

    • A. 

      Email

    • B. 

      Instant Message

    • C. 

      Internet download

    • D. 

      Portable media

  • 16. 

    Which of the following life experiences might turn a trusted user into a malicious insider:

    • A. 

      Frustration with co-workers

    • B. 

      Stress

    • C. 

      Promotion

    • D. 

      Financial problems

  • 17. 

    Which of the following is a measure for preventing a social engineering attack:

    • A. 

      Do not give out computer or network information

    • B. 

      Do not complete confidential company tasks in an unsecure setting

    • C. 

      Do not secure sensitive documents and media

    • D. 

      Do not give out personal identifiable information

  • 18. 

    Which statement is allowed according to the user acceptance agreement?

    • A. 

      Conducting business for personal gain

    • B. 

      Using company resources for political purpose

    • C. 

      Sending an occasional personal email

    • D. 

      Downloading music and video files

  • 19. 

    All of these are good physical security practices except?

    • A. 

      Always wear your security badge when leaving work, even if just for a break. They should be worn outside of the office in public so other people know where you work

    • B. 

      Control access to your office by ensuring the door closes completely behind when entering and exiting. Ensure that no one slips in behind you

    • C. 

      When working in a public setting, prevent shoulder surfing by shielding your paperwork and keyboard from view using your body

    • D. 

      Follow the Clear Desk and Screen Policy. Store confidential and sensitive items in a secure place

    • E. 

      Dispose of Confidential Documents in Waste Paper Bins

  • 20. 

    What should everyone know about information security?  

    • A. 

      Computer security is part of everyone's job

    • B. 

      Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find them..

    • C. 

      Report anything suspicious to your system administrator at [email protected]

    • D. 

      Do not ignore unusual computer functioning. It might be a sign of malware.

Do you know about user security awareness? To check your knowledge of user information security awareness, take this quiz. In this awareness program, the employees of an organization are educated about cybercrimes and other...

Questions: 20  |  Attempts: 17802   |  Last updated: Mar 22, 2022

  • Sample Question

    Why is it necessary for everyone to have a good understanding of Information Security policies and procedures?

    It helps protect users from being victims of security incidents.

    It provides an understanding of the patterns to follow in a security incident.

    It helps to understand levels of responsibility.

    All of the above.


Questions: 51  |  Attempts: 10385   |  Last updated: Mar 22, 2022

  • Sample Question

    Another name for the information security triad is:

    The FBI triad.

    The ISS triad.

    The CIA triad.

    The IST triad.


Questions: 6  |  Attempts: 5502   |  Last updated: Mar 22, 2022

  • Sample Question

    Which action below would breach the Clear Desk and Screen Policy?

    Locking your computer when you are away from your desk

    Leaving a departmental laptop on your desk when you are not using it or at the end of the day

    Locking confidential information in a cabinet

More Information Security Quizzes

Back to top

Why is it important to have a good understanding of information security policies and procedures?

Why is an Information Security Policy is Important? Creating an effective information security policy and that meets all compliance requirements is a critical step in preventing security incidents like data leaks and data breaches. ISPs are important for new and established organizations.

What is the purpose of an information security policy Mcq?

Ensure the integrity of the information stored on their computer systems. Preserve the confidentiality pf sensitive data. Ensure the continued availability of their information systems.

Why is it important to have a good understanding of information?

Understanding is also necessary to evaluate new information; the more a person can contextualize what they're being told, and evaluate it from many angles, the less likely they are to be taken in by manipulative language, bad data, poorly sourced stories, or pure propaganda.

What details how an organization will implement the information security policies multiple choice question?

An Information security plan details how an organization will implement the info security policies.

Toplist

Neuester Beitrag

Stichworte