20 Questions | By ABasi | Last updated: Mar 22, 2022 | Total Attempts: 851
Feedback
During the Quiz End of Quiz
Difficulty
Sequential Easy First Hard First
.
1.
Why is it important to have a good understanding of Information Security policies and procedures?
A.
Helps protect individuals from being victims of security incidents.
B.
Provides an understanding of steps to follow in the event of a security incident
C.
Helps to understand levels of responsibility
D.
All of the above
2.
Which of the following is a good way to create a password?
A.
Your children's or pet's names
B.
Using look-alike substitutions of numbers or symbols
C.
A combination of upper and lowercase letters mixed with numbers and symbols
D.
Using common names or words from the dictionary
3.
Which of the following would be the best password?
A.
MySecret
B.
Dp0si#Z$2
C.
Abc123
D.
Keyboard
4.
When receiving an email from an unknown contact that has an attachment, you should:
A.
Open the attachment to view its contents
B.
Delete the email
C.
Forward the email to your co-workers to allow them to open the attachment first
D.
Forward the email to your personal email account so you can open it at home
5.
Which of the following is a good practice to avoid email viruses?
A.
Delete an unexpected or unsolicited message
B.
Use anti-virus software to scan attachments before opening
C.
Delete similar messages that appears more than once in your Inbox
D.
All the above
6.
Which of the following is a proper use of email?
A.
Never email personal information
B.
Send out pricelists for your home-based business products
C.
Forward inspirational and humorous emails to your co-workers to brighten their day
D.
Send an email to all your friends and co-workers to advertise a job opening in your area
7.
Instant Messaging is safer than regular email.
A.
True
B.
False
8.
A malicious user can rely on email or webpage to launch a ____
A.
Phishing attacks
B.
Virus attacks
C.
Spyware
D.
All of the above
9.
Which statement most accurately describes the virus?
A.
A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources
B.
A program that protects your computer from hackers
C.
A program that is installed onto your computer that monitors your internet use
D.
All of the above
10.
If you're not careful about your Internet browsing, which of the following can result?
A.
Spyware or Adware installation
B.
Browser Hijacking
C.
Information or identity theft
D.
All of the above
11.
The first step in Security Awareness is being able to ________ a security threat.
A.
Avoid
B.
Recognize
C.
Challenge
D.
Log
12.
What should you do if you think the email you received is a phishing attempt?
A.
Do not reply to the message
B.
Click the link so you can see what the site looks like
C.
Keep your system up to date, and install up-to-date antivirus and antispyware software
D.
Report the phishing email to the legitimate company or organization that has been spoofed
13.
What should you do if you think your password has been compromised?
A.
Change your password
B.
Report the incident to the proper authorities - such as a system administrator(s)
C.
Check other systems that you have accounts on as they may be compromised as well
D.
All the above
14.
What is the biggest vulnerability to computer information security?
A.
Instant Messaging, Peer-to-Peer (P2P) applications
B.
Malware - virus, worms, spyware
C.
Spam, Phishing attacks
D.
End Users
15.
What is the most common delivery method for viruses?
A.
Email
B.
Instant Message
C.
Internet download
D.
Portable media
16.
Which of the following life experiences might turn a trusted user into a malicious insider:
A.
Frustration with co-workers
B.
Stress
C.
Promotion
D.
Financial problems
17.
Which of the following is a measure for preventing a social engineering attack:
A.
Do not give out computer or network information
B.
Do not complete confidential company tasks in an unsecure setting
C.
Do not secure sensitive documents and media
D.
Do not give out personal identifiable information
18.
Which statement is allowed according to the user acceptance agreement?
A.
Conducting business for personal gain
B.
Using company resources for political purpose
C.
Sending an occasional personal email
D.
Downloading music and video files
19.
All of these are good physical security practices except?
A.
Always wear your security badge when leaving work, even if just for a break. They should be worn outside of the office in public so other people know where you work
B.
Control access to your office by ensuring the door closes completely behind when entering and exiting. Ensure that no one slips in behind you
C.
When working in a public setting, prevent shoulder surfing by shielding your paperwork and keyboard from view using your body
D.
Follow the Clear Desk and Screen Policy. Store confidential and sensitive items in a secure place
E.
Dispose of Confidential Documents in Waste Paper Bins
20.
What should everyone know about information security?
A.
Computer security is part of everyone's job
B.
Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find them..
C.
Report anything suspicious to your system administrator at [email protected]
D.
Do not ignore unusual computer functioning. It might be a sign of malware.
Do you know about user security awareness? To check your knowledge of user information security awareness, take this quiz. In this awareness program, the employees of an
organization are educated about cybercrimes and other...
Questions: 20 | Attempts: 17802 | Last updated: Mar 22, 2022
Sample Question
Why is it necessary for everyone to have a good understanding of Information Security policies and procedures?It helps protect users from being victims of security incidents.
It provides an understanding of the patterns to follow in a security incident.
It helps to understand levels of responsibility.
All of the above.
Questions: 51 | Attempts: 10385 | Last updated: Mar 22, 2022
Sample Question
Another name for the information security triad is:The FBI triad.
The ISS triad.
The CIA triad.
The IST triad.
Questions: 6 | Attempts: 5502 | Last updated: Mar 22, 2022
Sample Question
Which action below would breach the Clear Desk and Screen Policy?Locking your computer when you are away from your desk
Leaving a departmental laptop on your desk when you are not using it or at the end of the day
Locking confidential information in a cabinet
More Information Security Quizzes