Cyber Security Quiz for Corporate Employees May 13, 2020 0% Time Starts Now Oops Quiz Time Ends Cyber Security Quiz for Corporate Employee 1 / 15 You see a person in your office premises without office card, who is acting suspiciously. He is holding a clipboard and is wearing a high visibility jacket. You approach him and ask him if everything is okay and he claims to be inspecting the fire safety equipment. What should you do next? He may be from admin team and inspecting fire safety which is a standard procedure and no action needs to be taken Report the incident to Physical Security team or admin team Ask to see his identity card to verify his identity Ask him the name of his company and verify it using Google 2 / 15 You’ve inadvertently opened a web link contained in a suspicious email and now your computer is behaving strangely. What should course of action should you follow next? You don’t need to worry; the anti-virus will fix all the it is security team’s responsibility to protect computers from such incidents You need to update and run your anti-virus software You need to contact your IT help desk or Information Security team Keep an eye on the performance of your computer and, just wait and watch 3 / 15 What is the best way to validate a legitimate email vs. a phishing email? Wrong spelling, poor syntax and grammar are one of the revealing signs of a fake email Check the email headers to see where it really came from Look for badly placed and replicated logos Check the legitimacy of the sender on some other medium to verify whether they sent you the email All of the above 4 / 15 Your existing password is “iamahero” and your IT department has requested that you change it. Which one of these would be the safest to use? !am@Her0 123iamahero Iamher123 IAMAHERO 5 / 15 Just after few days after joining a new company, you get an email containing a weblink from the Revenue Commissioners. It informs you that there is a tax rebate owed to you from your previous job. Scan the email with anti-virus, then open it Open the email on your home network instead Open the email as a standard user, not as an administrative user None of the above 6 / 15 Who are the targets of modern-day hackers? Banks and finance companies who process a payment Any organisation or individual Companies which hold a lot of proprietary information and PII data Companies which hold credit card numbers of customers 7 / 15 Unexpectedly, you get an email from a colleague who requests you to urgently click on an email link which they’ve sent you. What is the safest option and what will you do? The link is from a known person therefore there is not risk in opening it and it must be safe to open If it was a malicious link, the organisation’s firewall and SPAM filter would have flagged or blocked it, therefore it’s safe to open Reply to the sender to double-check if the link is safe to open as they might have sent it accidentally Do not click the link. Phone the colleague from whom the email has come and verify the authenticity 8 / 15 How often should you backup your data? Once a week Once a month In accordance with your organisation’s backup policy and the criticality of the data in question Once a fortnight 9 / 15 Where should you store the encryption passphrase for your laptop? On a sticker on your desk which is not visible directly On a sticky note attached to the base of your laptop In a password-protected file stored on your laptop Use the password management tool supplied/authorized by your organisation 10 / 15 You’ve just got a warning from your bank that suspicious activity has been detected and to login immediately using a URL (link) provided. What is the best course of action to take? Login to your bank account immediately and change your password to a more complex one Contact your bank using the telephone number on the back of your bank debit or credit card Login to your bank account immediately and check your balance Check the headers in the email and then login 11 / 15 You’ve just moved to a new department and have been issued with a new set of passwords. Which one of these methods offers you the safest option for storing them? Write them down in a notebook beside your desk for handy reference Use a sticky note making sure you place under your keyboard instead of on or near your computer Store them in an Excel file on your computer but give the file name something unrelated to passwords Use the password management tool supplied/authorized by your organisation 12 / 15 Which of the following statements best describes the modern-day hacker? Bored and lonely anti-social teenagers who hack as a fun and sometimes for profit Computer savvy people who hack individuals and businesses as a form of challenge Highly organised and tech savvy cyber criminals run hacking like a business and who deploy highly automated, sophisticated tools All of the above 13 / 15 A colleague calls you telling you they have an urgent deadline to meet. But unfortunately, he has forgotten his password to the client system. What should you do to help? Go to the client system and log on with your account so they can meet their deadline Suggest your colleague that they should call the IT helpdesk and get the password reset Give them your login credentials temporarily so your colleague can meet their deadline Check with your manager and share the password 14 / 15 You have an old laptop with work-related files still stored on it. You want to give the system away to someone. What is the safest way to keep the file contents confidential? Login to the computer and delete all the files and un-install programs Login to the computer, delete the files and then empty the recycle bin Install a new copy of the operating system on the computer Remove the hard disk and give it to your IT or helpdesk team to be disposed of securely 15 / 15 You have a highly sensitive document which you need to email to a trusted third-party. What is the safest way to send this? Send the document from your work email account Make sure you scan the document with your anti-virus software first Encrypt the document first. Then send the password to the third-party using a different communication method, such as SMS Share the document using a file sharing application Your score is The average score is 59% LinkedIn Facebook Twitter 0% Restart Total Page Visits: 1179 - Today Page Visits: 3 Post navigation Cyber Security Awareness Quiz For ChildrenLove Bug’s creator tracked down to repair shop in Manila