Secure IT
Secure IT
Secure IT
Secure IT
Secure IT
100

If you have a business need to send sensitive business information or personal information to an outside party over email, how should you do it?

A) Encrypt the information using the 'Send Secure' button in Outlook

B) Send the information in an attachment

C) Compress the information before sending it

D) None of the above

A) Encrypt the information using the 'Send Secure' button in Outlook

100

What is it called when a malicious actor tries to get information or commit fraud over the phone?

A) Vishing
B) Smishing
C) Fishing
D) Frauding

A) Vishing

100

What is malware?

A) A type of hardware
B) Malicious software designed to harm your computer
C) A type of software that speeds up your computer
D) A method for securely deleting files

B) Malicious software designed to harm your computer

100

Criminals access someone's computer and encrypt that person's files and data. The criminals demand payment in exchange for decrypting the files and data. This practice is called...

A) Botnet
B) Ransomware
C) Driving
D) Spam

B) Ransomware

100

What is the primary purpose of a firewall?

A) To monitor your computer's performance
B) To block unauthorized access
C) To speed up your internet connection
D) To store data

B) To block unauthorized access

200

If you get a suspicious phone call at work from someone claiming that your computer has a virus, you should:

A) Stay on the line and give the person the information they are requesting
B) Allow the representative to remote into your computer to assist you
C) Hang up and contact the SOC
D) Only provide them with your name and operating system

C) Hang up and contact the SOC

200

How can we tell that an email was sent from outside of TJX?

A) The message contains a red flag
B) The email address of the sender appears in red
C) The body of the email has a banner saying it has come from an external sender, and the subject line has an "[External]" tag

C) The body of the email has a banner saying it has come from an external sender, and the subject line has an "[External]" tag

200

What is the best way to create a strong and unique password?

A) Vary your passwords from application to application
B) Don't use words that are easy to guess (e.g. your street address, your child's name)
C) Add a mix of uppercase and lowercase letters, numbers, and symbols
D) All of the above

D) All of the above

200

What should you do if you think your TJX account has been compromised?

A) Monitor your email address and accounts for fradulent activity
B) Respond to the warning email you have received
C) Shut down your device
D) Contact the SOC and your manager immediately

D) Contact the SOC and your manager immediately

200

What is social engineering in the context of cybersecurity?

A) Designing secure software
B) Building physical security systems
C) Developing encryption algorithms
D) Manipulating people into divulging confidential information

D) Manipulating people into divulging confidential information

300

In the context of cybersecurity, what does the acronym APT stand for?

A) Advanced Persistent Threat
B) Automated Penetration Test
C) Active Protection Technology
D) Application Penetration Testing

A) Advanced Persistent Threat

300

What is the main function of a sandbox in cybersecurity?

A) Isolating and analyzing suspicious files
B) Encrypting data
C) Monitoring network traffic
D) Managing user access

A) Isolating and analyzing suspicious files

300

What is the difference between symmetric and asymmetric encryption?

A) Symmetric uses one key, asymmetric uses two keys
B) Symmetric uses two keys, asymmetric uses one key
C) Symmetric is slower, asymmetric is faster
D) Symmetric is more secure than asymmetric

A) Symmetric uses one key, asymmetric uses two keys

300

What does the term "zero-day exploit" refer to?

A) A vulnerability that is exploited before the software developer has released a fix
B) An attack that occurs on the first day of the month
C) A type of malware that activates on a specific date
D) A security patch that is released immediately

A) A vulnerability that is exploited before the software developer has released a fix

300

What does the acronym VPN stand for, and what is its primary use?

A) Virtual Private Network; secure internet connection
B) Virtual Public Network; data encryption
C) Virtual Protected Network; malware protection
D) Virtual Personal Network; user authentication

A) Virtual Private Network; secure internet connection

400

Because you have antivirus software installed on your computer, you don’t have to worry about a virus attack on your computer.

A) True
B) False

B) False

400

Which framework does TJX use to guide its cybersecurity practices?

A) ISO/IEC 27001
B) NIST Cybersecurity Framework
C) COBIT
D) ITIL

B) NIST Cybersecurity Framework

400

What is one of the primary functions of TJX’s Security Operations Center?

A) Data encryption
B) Threat detection and incident response
C) User authentication
D) Network monitoring

B) Threat detection and incident response

400

What is the primary purpose of a honeypot in cybersecurity?

A) To speed up network traffic
B) To store sensitive data securely
C) To attract and trap potential attackers
D) To encrypt communications

C) To attract and trap potential attackers

400

When using Multi-Factor Authentication, each piece of evidence must come from a different category: something you know, something you have or something you ____.

A) Want
B) See
C) Need
D) Are

D) Are

500

What is the primary purpose of a Security Information and Event Management (SIEM) system?
A) Encrypting data
B) Managing user access
C) Conducting penetration tests
D) Collecting and analyzing security logs

D) Collecting and analyzing security logs

500

Which protocol is commonly used for secure file transfer over the internet?

A) FTP
B) HTTP
C) SFTP
D) SMTP

C) SFTP (SSH File Transfer Protocol)

500

Which type of attack involves an attacker intercepting and altering communications between two parties without their knowledge?
A) Phishing
B) Man-in-the-Middle (MitM)
C) SQL Injection
D) Denial of Service (DoS)

B) Man-in-the-Middle (MitM)

500

What is the primary goal of a blue team in cybersecurity?
A) To simulate attacks and identify vulnerabilities
B) To monitor network traffic
C) To defend against cyber attacks and improve security posture
D) To manage user access

C) To defend against cyber attacks and improve security posture

500

What is the primary goal of a red team in cybersecurity?
A) To defend against cyber attacks
B) To monitor network traffic
C) To manage user access
D) To simulate attacks and identify vulnerabilities

D) To simulate attacks and identify vulnerabilities

M
e
n
u