Iowa Arboretum Security Quiz

Last updated over 1 year ago
20 questions
Note from the author:
General security quiz for non-profits and small businesses
1

Which of the following should you do to restrict access to your files and devices?

1

Backing up important files offline, on an external hard drive or in the cloud, will help protect your business in the event of a cyber attack. True or False?

1

Promoting physical security includes protecting:

1

Paper files that have sensitive information can be disposed of in a locked trash bin instead of shredded. True or False?

1

Only people with access to sensitive data need to be trained on the importance of the physical security of files and equipment. True or False?

1

What is ransomware?

1

Local backup files – saved on your computer – will protect your data from being lost in a ransomware attack. True or False?

1

Which of these best describes how criminals start ransomware attacks?

1

If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?

1

Setting your software to auto-update is one way you can help protect your business from ransomware. True or False?

1

Which one of these statements is correct?

1

An email from your boss asks for the name, addresses, and credit card information of the company’s top clients. The email says it’s urgent and to please reply right away. You should reply right away. True or False?

1

You get a text message from a vendor who asks you to click on a link to renew your password so that you can log in to its website. You should:

1

Email authentication can help protect against phishing attacks. True or False?

1

If you fall for a phishing scam, what should you do to limit the damage?

1

Which is the best answer for which people in a business should be responsible for cybersecurity?

1

Cyber criminals and tech support scammers only target large companies. True or False?

1

Which of the following scenarios does NOT describe a tech support scam?

1

True or False? You can avoid scams by only taking tech support calls from well-known tech companies.

1

Which of these answers describes the best way to protect against tech support scams?