Go
Cyber Security HomeSecurity AwarenessCyber Security For KidsPA-ISAC
Cyber Security
Security Awareness
Resources and Tips
Security Assessment Framework
Security Awareness Toolkit
Glossary
Cyber Quiz
Cyber Security for Kids
Security Advisories
Anti Virus
Security News
Best Practices
Security Projects
Events
Newsletters
Commonwealth Employees
Local Government
PA-CSIRT
Information Technology
 
Log In
Unsure who to contact? Have a question or issue?
Security Awareness > Cyber Quiz

 

Pennsylvania Cyber Security Awareness Challenge

 

There are 20 questions. Your goal is to score at least 16 points!


1. On average, how long does it take for an unprotected networked computer to be compromised once it is connected to the internet?

1 Week
20 minutes
10 hours
7 Days


2. What type of attack relies on the trusting nature of employees and the art of deception?

Social Engineering
Fraud
Phishing
Dumpster Diving


3. You may give someone your password if:

It is never OK to give out your password
Your Boss asks you for your password
The helpdesk asks you for your password
Your Boss says it is OK to give someone your password


4. What can a firewall protect against?

Viruses
Unauthenticated interactive logins from the outside world
Fire
Connecting to and from the outside world


5. The National Security Alliance in 2004 estimated what percentage of home PCs are infected with spyware?

20%
40%
60%
80%


6. In comparison to the illegal drug trade, Cyber crime generates:

Less Money
It is mainly done by computer geeks for kicks instead of money
More Money


7. This is a document that states in writing how a company plans to protect the company's physical and IT assets.

Data Encryption Standard
Security policy
Public key certificate
Access control list


8. This is a program or file that is specifically developed for the purpose of doing harm:

Buffer overflow
Bastion host
Malware
Ping sweep


9. This is a program in which malicious or harmful code is contained inside apparently harmless programming or data.

War dialer
Spam trap
Trojan horse
Email


10. What are the three most important things you can do to secure desktop PCs?

Turn on Automatic Updates
Turn on Windows Firewall
Install anti-virus software
Remove the hard drive
a, c, and d
a, b, and c


11. Which of the following is an example of a strong password?

Password
J*p2le04>F
Your real name, user name, or company name


12. True of false: If you set your anti-virus software to auto-update then you don't need Windows Automatic Updates.

True
False


13. What is "phishing?"

"Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords
A type of computer virus
An example of a strong password
None of the above


14. You receive an e-mail message from someone you know well with Subject: line 'Here it is' and the file attachment is named draft.doc. What do you do?

Open the attachment
Save the attachment to disk and scan it for viruses
Contact the sender to determine if he/she created and sent the draft.doc attachment


15. You are using e-mail to send and receive private information (e.g. medical data, salary information, social security numbers, passwords). What do you do?

Put all of the information in one large message before sending it to reduce the chance that it will fall into the wrong hands
Encrypt the information before sending it through e-mail
Put the information in many small messages so that only a small information will be exposed if it falls into the wrong hands.


16. You are receiving bothersome or threatening e-mail messages. What do you do?

Save the messages and report the problem to your supervisor
Ignore the messages and delete them
Contact the police


17. You learn about a new screen saver that you can download from the Internet to put on your PC at work. What do you do?

Don't download the screen saver. This action is not allowed.
Download the screen saver and scan it for viruses before installing it.
Search the Internet for reports describing this screen saver.


18. You get a new computer. What do you do?

Connect it to the network and start using it.
Secure it against the most common attacks, connect it to the network and start using it.
Don't connect it to the network.


19. According to the FBI and the Computer Security Institute, most information security breaches occur due to what?

External Hackers
Poor Programming
Internal Employees
Bad Firewall Settings


20. Which of the following is the most important to install and keep up to date on your personal computer?

Anti-virus and anti-spyware software
Anti-spam software
A Firewall
Operating system updates
All of the above must be installed and kept up to date


 

Sign up to receive Cyber eAlerts


 Want to receive up to the minute e-mail notifications when there are is a State Threat Level change or Commonwealth Security Advisories issued? Subscribe to Cyber eAlerts.
CategoriesStatus
Cyber Security e-Alert Sign Up Now
State Threat Level eAlert Sign Up Now
OnGuard Online Videos