Here is a 12-question Multiple Choice Question (MCQ) quiz designed for a cyber security analyst, focusing on basic scenarios that reflect common tasks and challenges in cyber security. This quiz tests foundational cyber security skills through practical scenarios. Each question has four options, with one correct answer to assess or reinforce knowledge of common cyber security tasks. The correct answers, along with explanations for why other options are incorrect, are provided after the quiz.
You receive a text message with a link to claim a free gift from a retailer. What should you do?
A. Click the link to see what the gift is.
B. Delete the message without clicking the link.
C. Reply to ask for more details about the offer.
D. Share the link with friends to check if it’s real.You’re setting up a new work device and need to connect to Wi-Fi. What’s the safest option?
A. Connect to a nearby open Wi-Fi network.
B. Use a company-provided, password-protected Wi-Fi network.
C. Share your device’s hotspot with colleagues.
D. Skip Wi-Fi and use mobile data without encryption.A coworker asks you to share a sensitive client file via email. What’s the best way to proceed?
A. Attach the file and send it directly.
B. Ask them to pick it up in person instead.
C. Use a secure, encrypted file-sharing tool approved by your company.
D. Send it through a personal email account for privacy.You notice your work computer is running slowly and showing unfamiliar error messages. What should you do?
A. Ignore it and continue working.
B. Restart the computer to fix the issue.
C. Report the issue to IT immediately.
D. Download a free antivirus tool to scan the system.You’re prompted to update your work email app, but the prompt looks unusual. What should you do?
A. Ignore the prompt and keep using the app.
B. Update the app through the official app store after verifying with IT.
C. Click the prompt to install the update immediately.
D. Uninstall the app to avoid potential issues.You’re asked to provide your Social Security number on a website to complete a transaction. What’s the safest approach?
A. Enter the information to proceed with the transaction.
B. Verify the website’s legitimacy and security before providing details.
C. Use a fake Social Security number to test the site.
D. Complete the transaction over the phone instead.Your company requires you to lock your computer screen when stepping away. Why is this important?
A. It saves battery life on your device.
B. It prevents unauthorized access to your work data.
C. It ensures your software stays up to date.
D. It reduces the risk of hardware theft.You find a website offering free software that your company needs. What should you do?
A. Download and install it to test its functionality.
B. Share the link with your team to get their opinion.
C. Consult IT to ensure the software is safe and approved.
D. Pay for a licensed version instead to avoid risks.You accidentally send a sensitive email to the wrong recipient. What’s the first step you should take?
A. Ignore it and hope they don’t open it.
B. Contact IT or your supervisor to report the mistake.
C. Send another email asking the recipient to delete it.
D. Delete the email from your sent folder.You’re attending a virtual meeting, and someone you don’t recognize joins. What should you do?
A. Continue the meeting and assume they’re authorized.
B. Pause the meeting and verify their identity with the host.
C. Share the meeting link with them for future sessions.
D. Record the meeting to review their participation later.Your browser warns that a website’s security certificate is expired. What should you do?
A. Proceed to the website since it’s only a warning.
B. Close the website and avoid entering any information.
C. Refresh the page to see if the warning disappears.
D. Update your browser to fix the certificate issue.You’re asked to reuse an old password for a new work account. What’s the best response?
A. Reuse the password to keep things simple.
B. Create a unique, strong password for the new account.
C. Use a variation of the old password with one extra character.
D. Write down the old password to remember it.
Correct Answers and Explanations
B. Delete the message without clicking the link.
Why B is correct: Unsolicited texts with links are often phishing attempts; deleting avoids risks.
Why others are incorrect:
A: Clicking may lead to malware or scams.
C: Replying confirms your number is active, inviting more spam.
D: Sharing spreads potential threats.
B. Use a company-provided, password-protected Wi-Fi network.
Why B is correct: Company Wi-Fi is secure and encrypted, protecting work data.
Why others are incorrect:
A: Open networks are vulnerable to interception.
C: Sharing hotspots risks unauthorized access.
D: Unencrypted mobile data is insecure.
C. Use a secure, encrypted file-sharing tool approved by your company.
Why C is correct: Encrypted tools ensure secure, compliant file transfers.
Why others are incorrect:
A: Unencrypted email risks data exposure.
B: In-person transfer is inefficient and not always secure.
D: Personal email lacks enterprise security.
C. Report the issue to IT immediately.
Why C is correct: Slow performance and errors may indicate malware; IT can investigate.
Why others are incorrect:
A: Ignoring risks further compromise.
B: Restarting may not resolve malware issues.
D: Downloading unapproved tools could worsen the problem.
B. Update the app through the official app store after verifying with IT.
Why B is correct: Verifying ensures the update is legitimate and safe.
Why others are incorrect:
A: Ignoring may leave vulnerabilities unpatched.
C: Clicking suspicious prompts risks malware.
D: Uninstalling disrupts work without addressing the issue.
B. Verify the website’s legitimacy and security before providing details.
Why B is correct: Checking prevents sharing sensitive data with fraudulent sites.
Why others are incorrect:
A: Entering details without verification risks identity theft.
C: Fake data may still expose you to scams.
D: Phone transactions aren’t inherently secure.
B. It prevents unauthorized access to your work data.
Why B is correct: Locking the screen protects data from passersby or intruders.
Why others are incorrect:
A: Battery life is unrelated to screen locking.
C: Software updates are a separate issue.
D: Locking doesn’t prevent physical theft.
C. Consult IT to ensure the software is safe and approved.
Why C is correct: IT can verify the software’s safety and compliance.
Why others are incorrect:
A: Downloading unverified software risks malware.
B: Sharing doesn’t confirm safety.
D: Paying isn’t necessary if approved options exist.
B. Contact IT or your supervisor to report the mistake.
Why B is correct: Reporting allows IT to mitigate risks, like recalling the email.
Why others are incorrect:
A: Ignoring doesn’t address the breach.
C: Asking the recipient may not ensure deletion.
D: Deleting from your sent folder doesn’t undo the send.
B. Pause the meeting and verify their identity with the host.
Why B is correct: Verifying prevents unauthorized access to sensitive discussions.
Why others are incorrect:
A: Assuming authorization risks data leaks.
C: Sharing links invites further intrusions.
D: Recording doesn’t address immediate security.
B. Close the website and avoid entering any information.
Why B is correct: Expired certificates indicate potential security risks; closing protects your data.
Why others are incorrect:
A: Proceeding risks data theft.
C: Refreshing doesn’t fix certificate issues.
D: Browser updates are unrelated to site certificates.
B. Create a unique, strong password for the new account.
Why B is correct: Unique passwords prevent a single breach from compromising multiple accounts.
Why others are incorrect:
A: Reusing passwords increases risk.
C: Variations are still predictable.
D: Writing passwords down risks physical theft.
Comments
Post a Comment