Workplace and Internet Safety

Is this your test? Login to manage it. If not, you can make a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
4 points
This type of protection specifically protects against malicious software that maybe gathering information without your knowledge.
2.
4 points
When working with electrical components it is suggested to never work with wet hands.
3.
4 points
Spam is a technique used to redirect a legitimate websites traffic to another legitimate website in order to gain access to users personal information.
4.
4 points
Select 3 additional practices one might consider to ensure computer safety.
5.
4 points
This type of protection typically protects against viruses.
6.
4 points
OSHA stands for
7.
4 points
When experiencing difficulty with computers, work place tools or machinery it is best to power down and unplug all items and fix the problem yourself
8.
4 points
Insurance against work related accidents
9.
4 points
This is an example of a strong password Awp7$98gD
10.
4 points
A method of browser pop-ups that warns of a virus that has been contracted and tells one to download a software, that may often be malicious, to rid the computer of the virus
11.
4 points
You should always use the same password for multiple accounts
12.
4 points
Immediate, temporary treatment given in the even of an accident or sudden illness.
13.
4 points
Industrial environments present the same hazards as an office environment.
14.
4 points
The best defense against internet threats is multi-layered and includes anti-virus, anti-spyware and firewalls
15.
4 points
A hoax is unsolicited email or junkmail
16.
4 points
When working in an office environment slips, trips and falls are among the most prevalent hazards.
17.
4 points
When working with machinery that has moving parts one should wear loose and baggy clothing.
18.
4 points
When creating passwords it is often suggested that one use personal information and family names.
19.
4 points
Everyday recreational computer users should purchase computer security components separately.
20.
4 points
Mail or instant message scams designed to look like official communications from legitimate websites
21.
4 points
Computer protections should be singular in nature and you should one protection for each different type of threat
22.
4 points
The Occupational Health and Safety Act was passed in
23.
4 points
The ideal password is between
24.
4 points
An email chain letter that warns of impending viruses and tries to scare users into forwarding or continuing the email
25.
4 points
A virus is a self replicating software program that is designed to infect a computer by rapidly spreading from one file to another, sometimes causing great harm