SECURE&TRIVIAL: ANSWERS

This entry is also available in:

On Friday 27th, a month after its publication, our TEST was officially closed.

The results will be processed during the month of February in order to be able to issue a report with the global level of awareness in Cybersecurity and Privacy acquired by your organization.

The people who have made a full answer, or have failed at most two questions, will receive a “cyber-gift” according to the result obtained.

Throughout 2023 you will receive related TIPS to reinforce awareness, especially where there has been a greater margin of error.

Below, we show you all the questions, highlighting the correct answers. Among the three possible ones, we asked you to choose the most correct or appropriate one:

  1. Which of these three passwords, between 8 and 12 characters, is the most secure of all?
  • 75829568K
  • -&&Kj34h&/*
  • Carpe Diem
  1. What techniques make it possible to superimpose images of two different people, to deceive us with fake videos?
  • Phishing and Pharming
  • Morphing and DeepFake
  • Grooming and Cyberbullying
  1. What are the four stages that any cybersecurity project has to go through (Deming Cycle or PDCA)?
  • Plan, Do, Raise Awareness and Audit
  • Plan, Do, Check and Support
  • Planning, Doing, Controlling and Acting
  1. Check the correct option:
  • For a password to be strong, it must be between 8 and 12 characters long (numbers, letters, symbols) and use different keys for different uses.
  • If we have a strong password, it is not necessary to change it periodically every 30, 60 or 90 days.
  • Since the passwords we use at the professional level are more secure, it is advisable to use the same passwords at the personal level.
  1. In rapid response to security incidents, our functions as employees are:
  • Be alert to possible suspicious e-mails or communications that we may receive and request a forced password change from the IT department if we believe it may have been compromised.
  • Communicate these and other technical problems we may experience to the IT department as soon as possible. For example, there are certain types of viruses that can make our computer run slow, distort the image or do things automatically.
  • Both are correct.
  1. Broadly speaking, what is the purpose of an antivirus and a firewall?
  • The antivirus detects the installation of malicious files or programs and blocks them before they can damage our devices.
  • The firewall detects suspicious emails and quarantines them to prevent them from reaching the user’s inbox.
  • Both are correct.
  1. What does it mean when a device (computer/mobile) is being updated?
  • A virus has been detected, so the system is updated and restarted.
  • The version of our system is no longer sufficiently secure or we have detected operating errors that need to be improved.
  • We have exceeded the space limit and the upgrade cleans the device.
  1. When an update message appears on the computer or cell phone, we must:
  • Click on the “X” to close the window.
  • Click on the update button or, if we can’t, take it up as soon as possible.
  • Click on “Remind me later”.
  1. The mailings and calls called “Fraud the CEO” consist of impersonating the identity of:
  • A colleague or acquaintance
  • A public agency or entity
  • A senior manager or responsible position
  1. How can I report offensive Internet content?
  • It cannot be reported, in fact, once it has gone viral on the internet it cannot be stopped.
  • Only the victim or those who know the victim can report.
  • Through the priority channel of the Spanish Data Protection Agency and if we are not Spanish or residents, before the police authority.