Information Security Basics Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one of the primary goals of information security awareness?

  • To maintain awareness and skills among employees (correct)
  • To minimize employee salaries
  • To manage social media accounts
  • To increase internet speed

Which type of malware is NOT discussed in the session agenda?

  • Spyware
  • Worms
  • Zombie malware (correct)
  • Viruses

What was highlighted as a top security concern in 2015?

  • Increased hardware sales
  • New software installations
  • Top security breaches (correct)
  • Social media marketing

Which of the following is considered a human-based attack?

<p>Phishing attacks (C)</p> Signup and view all the answers

Which of the following is NOT a security tip mentioned in the session?

<p>Using HTTP instead of HTTPS (B)</p> Signup and view all the answers

What does 'clearing your screen' refer to in the context of security tips?

<p>Ensuring no sensitive information is visible (B)</p> Signup and view all the answers

Which security measure is recommended for protecting mobile devices?

<p>Installing security software (B)</p> Signup and view all the answers

What is a key component of incident reporting?

<p>Documenting security incidents (A)</p> Signup and view all the answers

What does 'business continuity' refer to in the context of information security?

<p>Continuing operations after security incidents (C)</p> Signup and view all the answers

What should you do to protect sensitive data?

<p>Always backup sensitive data (D)</p> Signup and view all the answers

Which action should you take when stepping away from your workstation?

<p>Lock the workstation using Windows key + L (C)</p> Signup and view all the answers

Why is it important to keep your operating system and applications updated?

<p>To ensure they contain security patches (B)</p> Signup and view all the answers

What is a recommended practice when using strong passwords?

<p>Try not to confuse it with personal account passwords (D)</p> Signup and view all the answers

What should you avoid when charging your smartphone?

<p>Charging from the PC (A)</p> Signup and view all the answers

What percentage of information security is attributed to behavior rather than technology?

<p>80% (B)</p> Signup and view all the answers

What security measure should be taken for a strong password?

<p>At least 8 characters (A)</p> Signup and view all the answers

Which statement is true regarding social networking security?

<p>Limit personal information posted. (D)</p> Signup and view all the answers

What is one recommended action for email security?

<p>Contact the sender if you are unsure about an attachment. (D)</p> Signup and view all the answers

What does the Web of Trust (WOT) help users determine?

<p>It informs trusted websites for safe browsing. (D)</p> Signup and view all the answers

Which of the following is a suggestion for mobile phone security?

<p>Always use a screen lock. (A)</p> Signup and view all the answers

What is a best practice for physical security at a workstation?

<p>Always lock the workstation when leaving. (A)</p> Signup and view all the answers

What should you do with sensitive documents after use?

<p>Shred them for disposal. (A)</p> Signup and view all the answers

Which of the following is NOT a recommended practice for mobile security?

<p>Plug your phone into any PC. (B)</p> Signup and view all the answers

Which characteristic is essential for a password phrase?

<p>Mix of characters and words. (D)</p> Signup and view all the answers

What precaution should be taken regarding third-party applications in social networking?

<p>Limit the sharing of personal data. (D)</p> Signup and view all the answers

What is the first step in incident reporting?

<p>Report (B)</p> Signup and view all the answers

What is an example of a successful phishing attack?

<p>A customer complaining about unauthorized transfer (D)</p> Signup and view all the answers

What does the acronym IRC stand for in incident reporting?

<p>Incident Response Coordinator (C)</p> Signup and view all the answers

Which of the following reflects a countermeasure to information security risks?

<p>Proactively identifying potential leaks (A)</p> Signup and view all the answers

What is one common misconception about digital information?

<p>It is inherently safe from attacks (D)</p> Signup and view all the answers

What is a key characteristic of digital information?

<p>It is easy to leak (B)</p> Signup and view all the answers

Which of the following is a type of social engineering attack?

<p>Shoulder surfing (A)</p> Signup and view all the answers

In the case of a phishing email detected, what is the typical content of the email?

<p>A request for account verification (D)</p> Signup and view all the answers

What should be avoided when dealing with potential security incidents?

<p>Delayed action (A)</p> Signup and view all the answers

What is a characteristic of phishing emails?

<p>Forged sender’s address (C)</p> Signup and view all the answers

Which department usually addresses an incident after it has been reported?

<p>Repair and support unit (RSU) (D)</p> Signup and view all the answers

What does APT stand for in information security?

<p>Advanced Persistent Threat (D)</p> Signup and view all the answers

What does successfully falling for phishing lead to?

<p>Unauthorized financial transfers (B)</p> Signup and view all the answers

The first line of defense against social engineering attacks is:

<p>Staff awareness and training (A)</p> Signup and view all the answers

Which method is NOT considered a form of information gathering for phishing?

<p>Online purchase transactions (A)</p> Signup and view all the answers

What should be reported as a potential sign of an APT attack?

<p>Odd user behavior after hours (D)</p> Signup and view all the answers

Which of the following is NOT a human-based social engineering attack method?

<p>Online Scams (B)</p> Signup and view all the answers

What is a common tactic of an attacker who conducts a phishing campaign?

<p>Using forged content (A)</p> Signup and view all the answers

Which of the following is a countermeasure against APTs?

<p>Reporting strange user activity (B)</p> Signup and view all the answers

Which of the following tactics is used in dumpster diving?

<p>Collecting discarded documents (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Information Security Goals

  • Maintain an appropriate level of knowledge and skills among employees and managers
  • Ensure business continuity if information security incidents occur

Types of Malware

  • A type of social engineering attack where unauthorized personnel gain access to the network undetected for a long time to steal data
  • Often uses social engineering to gain access to the network via legitimate means
  • Establishes a backdoor once access is achieved
  • Countermeasures include reporting odd user behavior, keeping aware of social engineering attempts, and understanding information/credentials disclosure compromises the entire information system

Top Security Breaches of 2015

  • Not mentioned in provided material

Social Engineering

  • Human based attacks:
    • Information gathering (Social media vectors)
    • Shoulder surfing
    • Dumpster diving
    • Impersonation
    • Phishing
  • Computer based attacks:
    • Online Scams

Incident Reporting

  • Report, fix, follow-up
  • Repair and Support unit (RSU)
  • Incident Reporting Coordinator (IRC)
  • Concerns about business line

###Security Tips & Counter-measures

  • HTTPs:
    • Protect by encrypting information sent between computer and website
  • WOT:
    • Shows a colored traffic light to indicate the trustworthiness of websites
  • Social networking security:
    • Limit the amount of personal information you post
    • Be cautious of third-party applications
    • Use strong passwords
    • Check privacy policies
  • Password security:
    • At least 8 characters
    • Mix of upper and lowercase characters
    • Mix of alpha and numeric characters
    • Don't use dictionary words
    • Change passwords frequently
    • Don't share or reuse passwords
    • Use different passwords for different accounts
    • Don't write down passwords
    • Use password phrases
  • Clear desk & clear screen:
    • Clear away paperwork
    • Use shredders when disposing of sensitive documents
    • Lock desks and filing cabinets
    • Lock away portable devices such as tablets
    • Lock your workstation when you leave
    • Make sure no documents are left in the printer
    • Treat mass storage devices (CDROM, DVDs, USB drives) as sensitive and secure
    • them in a locked drawer
  • Email Security
    • Never open an attachment from an unknown sender
    • Make sure the email references the attachment
    • Don't hesitate to contact the sender of an email that contains an attachment
    • Never send anyone your personal data (name, address, phone number, password, account numbers)
    • In case of suspicion, contact the IT department or the information security officer
  • Mobile threat & security:
    • Number of malicious installation packages and new malicious programs detected (Q3 2014 – Q1 2015)
    • Never plug in your phone to the PC
    • Download applications only from trusted sources
    • Install antimalware controls
    • Never store business-related documents on your phone
    • Always change the factory pin code (0000)
    • Always use a screen lock
    • Install locking features
    • Use secure messaging applications
    • Secure personal email
  • How to protect your PC:
    • Always back up sensitive data
    • Always lock your workstation when away from your desk
    • Ensure that antivirus definitions are updated regularly
    • Reboot your system after applying new updates
    • Use a strong password and try not to be confused with passwords used for personal accounts
    • Never charge smartphones from the PC
    • Never insert a USB or any storage device into your PC

Conclusion

  • Security is 20% technical and 80% behavior

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser