1.
The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do first?
2.
TRUE or FALSE: Attachments should always be treated with caution, even if you know the sender.
3.
All of these are good physical security practices except?
4.
You receive a text message warning you that your bank account has been suspended. If says that you must click on the link in the SMS and update your credentials with the next 24 hours. Is this message safe or unsafe?
5.
Which is the following is true about phishing? 1. It is a type of cybersecurity attack that attempts to obtain data that are sensitive like usernames, passwords, and more. 2. It is carried out by email spoofing, instant messaging, and text messaging.
6.
Which of the following terms best describes ensuring the data is accessible to authorized users?
7.
----------- ensures that only authorized parties can view the information?
8.
Which of the following is a common delivery method for viruses?
9.
What must be done if your password has been compromised?
10.
Developing an outline of procedures that are to be followed in the event of a major IT incident impacting availability is known as ------------?
11.
The Information Security Policy and related policies only apply to electronic and hardcopy records and does not apply to verbal discussions?
12.
Your supervisor is very busy and asks you to log into the HR Server using her user-ID and password to retrieve some reports. What should you do?
13.
A policy that outlines how to maintain information in the user’s possession for a predetermined length of time is known as?
14.
Which of the following is a measure for preventing a social engineering attack except:
15.
Why is it necessary for everyone to have a good understanding of Information Security policies and procedures?
16.
In cryptography, which of the following basic protection ensures that the information is correct and no unauthorizes person or malicious software has altered that data?
17.
When visiting your favorite website, a pop-up appears that reads "You have won a free Apple iPod!" What should you do?
18.
Which action below would breach the Clear Desk and Screen Policy?
19.
Which of the following passwords meets your company password requirements?
20.
What is the only true guarantee against data loss due to a cyberattack such as ransomware?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!