Morgane-Foster Cyber Security Awareness Challenge

There are 20 questions. Your goal is to score at least 16 points!

1. On average, how long does it take for an unprotected networked computer to be compromised once it is connected to the internet?
1 Week
20 minutes
10 hours
7 Days

2. What type of attack relies on the trusting nature of employees and the art of deception?
Social Engineering
Dumpster Diving

3. You may give someone your password if:
It is never OK to give out your password
Your Boss asks you for your password
The helpdesk asks you for your password
Your Boss says it is OK to give someone your password

4. What can a firewall protect against?
Unauthenticated interactive logins from the outside world
Connecting to and from the outside world

5. The National Security Alliance in 2004 estimated what percentage of home PCs are infected with spyware?

6. In comparison to the illegal drug trade, Cyber crime generates:
Less Money
It is mainly done by computer geeks for kicks instead of money
More Money

7. This is a document that states in writing how a company plans to protect the company's physical and IT assets.
Data Encryption Standard
Security policy
Public key certificate
Access control list

8. This is a program or file that is specifically developed for the purpose of doing harm:
Buffer overflow
Bastion host
Ping sweep

9. This is a program in which malicious or harmful code is contained inside apparently harmless programming or data.
War dialer
Spam trap
Trojan horse

10. What are the three most important things you can do to secure desktop PCs?
a) Turn on Automatic Updates
b) Turn on Windows Firewall
c) Install anti-virus software
d) Remove the hard drive
e) a, c, and d
f) a, b, and c

11. Which of the following is an example of a strong password?
Your real name, user name, or company name

12. True or false: If you set your anti-virus software to auto-update then you don't need Windows Automatic Updates.

13. What is "phishing?"
"Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords
A type of computer virus
An example of a strong password
None of the above

14. You receive an e-mail message from someone you know well with Subject: line 'Here it is' and the file attachment is named draft.doc. What do you do?
Open the attachment
Save the attachment to disk and scan it for viruses
Contact the sender to determine if he/she created and sent the draft.doc attachment

15. You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords). What do you do?
Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands
Encrypt the information before sending it through e-mail
Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands.

16. You are receiving bothersome or threatening e-mail messages. What do you do?
Save the messages and report the problem to your supervisor
Ignore the messages and delete them
Contact the police

17. You learn about a new screen saver that you can download from the Internet to put on your PC at work. What do you do?
Don't download the screen saver. This action is not allowed.
Download the screen saver and scan it for viruses before installing it.
Search the Internet for reports describing this screen saver.

18. You get a new computer. What do you do?
Connect it to the network and start using it.
Secure it against the most common attacks, connect it to the network and start using it.
Don't connect it to the network.

19. According to the FBI and the Computer Security Institute, most information security breaches occur due to what?
External Hackers
Poor Programming
Internal Employees
Bad Firewall Settings

20. Which of the following is the most important to install and keep up to date on your personal computer?
Anti-virus and anti-spyware software
Anti-spam software
A Firewall
Operating system updates
All of the above must be installed and kept up to date