General security quiz for non-profits and small businesses
Question 1
1.
Question 2
2.
Question 3
3.
Question 4
4.
Question 5
5.
Question 6
6.
Question 7
7.
Question 8
8.
Question 9
9.
Question 10
10.
Question 11
11.
Question 12
12.
Question 13
13.
Question 14
14.
Question 15
15.
Question 16
16.
Question 17
17.
Question 18
18.
Question 19
19.
Question 20
20.
Which of the following should you do to restrict access to your files and devices?
Update software once a year
Share passwords only with colleagues you trust
Have your staff members access information via an open Wi-Fi network
Use multi-factor authentication
Backing up important files offline, on an external hard drive or in the cloud, will help protect your business in the event of a cyber attack. True or False?
True
False
Promoting physical security includes protecting:
Only paper files
Only paper files and any computer on which you store electronic copies of those files
Only paper files, flash drives, and point-of-sale devices
All the above plus any other device with sensitive information on it
Paper files that have sensitive information can be disposed of in a locked trash bin instead of shredded. True or False?
True
False
Only people with access to sensitive data need to be trained on the importance of the physical security of files and equipment. True or False?
True
False
What is ransomware?
Software that infects computer networks and mobile devices to hold your data hostage until you send the attackers money
Computer equipment that criminals steal from you and wont return until you pay them
Software used to protect your computer or mobile device from harmful viruses
A form of cryptocurrency
Local backup files – saved on your computer – will protect your data from being lost in a ransomware attack. True or False?
True
False
Which of these best describes how criminals start ransomware attacks?
Sending a scam email with links or attachments that put your data and network at risk
Getting into your server through vulnerabilities and installing malware
Using infected websites that automatically download malicious software to your computer or mobile device
All of the above
If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?
True
False
Setting your software to auto-update is one way you can help protect your business from ransomware. True or False?
True
False
Which one of these statements is correct?
If you get an email that looks like its from someone you know, you can click on any links as long as you have a spam blocker and anti-virus protection
You can trust an email really comes from a client if it uses the clients logo and contains at least one fact about the client that you know to be true
If you get a message from a colleague who needs your network password, you should never give it out unless the colleague says its an emergency
If you get an email from Human Resources asking you to provide personal information right away, you should check it out first to make sure they are who they say they are
An email from your boss asks for the name, addresses, and credit card information of the company’s top clients. The email says it’s urgent and to please reply right away. You should reply right away. True or False?
True
False
You get a text message from a vendor who asks you to click on a link to renew your password so that you can log in to its website. You should:
Reply to the text to confirm that you really need to renew your password
Pick up the phone and call the vendor, using a phone number you know to be correct, to confirm that the request is real
Click on the link. If it takes you to the vendors website, then you’ll know its not a scam
Email authentication can help protect against phishing attacks. True or False?
True
False
If you fall for a phishing scam, what should you do to limit the damage?
Delete the phishing email
Unplug the computer. This will get rid of any malware
Change any compromised passwords
Which is the best answer for which people in a business should be responsible for cybersecurity?
Business owners. They run the business, so they need to know cybersecurity basics and put the min practice to reduce the risk of cyber attacks.
IT specialists, because they are in the best position to know about and promote cybersecurity within a business.
Managers, because they are responsible for making sure that staff members are following the right practices
All staff members should know some cybersecurity basics to reduce the risk of cyber attacks
Cyber criminals and tech support scammers only target large companies. True or False?
True
False
Which of the following scenarios does NOT describe a tech support scam?
Someone calls and tells you they’ve found viruses on your computer, then asks for credit card information so they can bill you for tech support services
While you're browsing online, an urgent message pops up telling you that there's a problem with your computer and directs you to a website to pay for tech support services
A caller asks you to give him remote access to your computer to fix a problem in your computer
You pay a trusted security professional to check your network for intrusions, and the professional tells you that your network has a problem that needs to be fixed
True or False? You can avoid scams by only taking tech support calls from well-known tech companies.
True
False
Which of these answers describes the best way to protect against tech support scams?
Use a unique password for each account
Scan your computer for any unknown software
Hang up on callers who say your computer has a problem