IT Awareness Question & Answer Welcome to your IT Awareness Question & Answer Full Name Email Phone 1. When is it appropriate to share client data to your personal email? Always, to have a backup copy of the data. Only if the client explicitly requests it. When you need to work on the data from home. Never share to your personal email 2. What is the primary purpose of encryption in data security? To make data easier to access. To hide data from authorized users. To protect data from unauthorized access. To compress data for storage efficiency. 3. What are the potential consequences if an employee shares client or company data with their personal email without authorization? No consequences; it's a common practice. The employee may receive a small bonus for convenience. It can result in data breaches, legal consequences, and damage to the company's reputation. The employee will likely be promoted for taking initiative. 4. What are the potential consequences for an employee who is found to have shared sensitive client or company data with their personal email account without authorization? A promotion for taking initiative. A warning and additional training. Termination of employment and possible legal action. No consequences; it's a common practice in the industry. 5. Which of the following is NOT a strong password practice? Using a combination of upper and lower-case letters, numbers, and special characters Using easily guessable information like your birthdate Changing your password regularly Avoiding the use of common dictionary words 6. What is phishing? A type of computer virus A fraudulent attempt to obtain sensitive information through deceptive emails A method to speed up your internet connection A secure way to transfer files online 7. What should you do if you receive an unsolicited email with a link asking for your login credentials? Click the link and provide the requested information to verify your account. Delete the email and report it to your IT department as phishing. Forward the email to all your colleagues for their opinion. Reply to the email with your login details for security purposes. 8. What is the purpose of a firewall in computer security? To block all incoming and outgoing internet traffic. To protect your computer from physical damage. To prevent unauthorized access and control of network traffic. To provide antivirus protection. 9. What should you do if you suspect your work computer has been infected with malware? Continue using it as usual; it's probably a false alarm. Immediately disconnect it from the network and report the incident to IT. Run a system scan using free online antivirus software. Delete all your files to remove the malware. 10. What does the term & "Two-Factor Authentication" (2FA) mean? Using two different devices to access the internet. The requirement of two separate passwords for the same account. A security process that requires two forms of identification to access an account. A method to prevent employees from accessing company data. 11. What is the primary reason for keeping your software and operating system up to date? To ensure your computer looks modern. To have access to new features. To protect your computer from known vulnerabilities and security threats. To speed up your computer's performance. 12. Which of the following is NOT a reason to protect data privacy? It';s a legal requirement. To prevent unauthorized access and data breaches. To make data more accessible to everyone in the organization. To protect sensitive information. 13. How should you secure sensitive paper documents when leaving work areas unattended, according to the policy? Leave them on your desk Lock them in a drawer Dispose of them in a regular trash bin Use secure bins for disposal 14. If you suspect a security breach or incident, how should you report it, as mentioned in the policy? Post about it on social media Notify your colleagues Report it to the IT department via email or phone Keep it to yourself 15. According to the policy, what should you do with sensitive and confidential information on your desk before leaving your workspace? Leave it as is Lock it in a cabinet Securely store it Dispose of it in the regular trash 16. What does the policy recommend employees do before leaving the workspace? Log off from their email accounts Lock their computers Securely store sensitive and confidential information Dispose of all paper documents in the trash Time's up AuthorSmartSoC