Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Ask 1

In which of the following work modes does a company offer the employee a device that they
can use personally?

• C COPE.

Question 2
What is the safest way to work when it comes to connecting to the network?

• C Through a direct cable connection.

Question 3
What advantage does a VPN as a service have over a proprietary VPN?
BAll administration and management is carried out internally

Question 4
As an employer, it is very important to warn employees about some aspects related to the
occupational risks to which they are exposed when teleworking. Which of the following aspects
would not be considered an occupational risk?

• AThe dangers caused by the use of screens.

Question 5
When implementing teleworking, it is necessary that you inform your employees about safe
work. Which of the following options would not need to be informed about?

C The VPN server we use.

Question 6
Which of the following services of a company is closely linked to the operation of its website
and requires special security measures?

• B The Backend or administration panel.

Question 7
When working via remote desktop, what security measure should you mainly comply with?
• B Use a VPN together with the remote desktop service.

Question 8
What is the first step to take before carrying out a risk analysis?

fi
• To know the main threats to which the company is exposed in
network.

Question 9
Which of the following is not a primary objective of any Business Contingency and Continuity
Plan?

• C Derive responsibility.

Question 10
How can we stay completely safe from a cyber attack (both as citizens and as companies)?

r
g
CIt is not possible, we can only reduce the risk, but not avoid it completely.

Question 11
What protocol should we use whenever we browse the Internet to improve security?

• B HTTPS.

Question 12
Where should the mechanisms that will ensure the continuity of our business in the event of an
incident be established in detail?

• B In the Contingency and Business Continuity Plan.

Question 13
What benefit does it entail, mainly, to make regular backup copies of our computer?

• A Allows you to restore the activity in case of loss or damage to the


equipment.
Ask 14
If during an incident on our company's network personal data of employees, clients, suppliers is
compromised... what should we do?

• To Communicate it to the Spanish Data Protection Agency.

Question 15
How does INCIBE mainly manage to manage more than 100,000 cybersecurity incidents
annually?

• B Thanks to a team specialized in analysis and management of security


incidents
security and electronic fraud.

Question 16
What is the most direct way to know the current threats you are exposed to on the network?

• B Through the notices section available on the INCIBE platform.

Question 17
What is phishing?

• C It consists of deceiving the user by impersonating a person or entity of


trust so that it performs involuntary actions.

Question 18
What is the name of the INCIBE portal with which it aims to improve internet security for
SMEs and the self-employed?

• B Protect your company.

Question 19
What type of incidents does INCIBE respond to on its 017 helpline?

C To all cybersecurity incidents.


Ask 20
If you have any questions about an incident related to cybersecurity, when could you call the
INCIBE helpline?

c
• CEl 017 is available 365 days a year from 9:00 a.m. to 9:00 p.m.
evening.

Question 21
Which of the following is not one of the pillars on which INCIBE's activity is based?

c
• BPromote the development of the national cybersecurity industry.

Question 22
Who is INCIBE aimed at?

• D All of the above.

Question 23
If you receive an email alerting you about a serious security incident in your system that asks
you to access a diagnostic website through a link included in the email, to resolve it, what
should you do?

• B Check that the link belongs to an official website that,


Indeed, it provides these services and I can contact them through another
channel.

Question 24
What precautions should you take when sharing business information through an instant
messaging service?

c
• DAll the previous answers are correct.

Question 25
How can you store all your passwords securely?
Ask 21

• B Through a password manager.

Question 26
What should be the password you use to protect access to corporate services and supports?

• A Robust, combining alphanumeric characters and passwords and


capital letters.

Question 27
What action should you take with respect to the applications installed on your devices to
improve their security?

c
• DAll the previous answers are correct.

Question 28
If you must share banking information with a third party, such as your account number or
company number, via email, what action should you take?

• B Encrypt banking information.

Question 29
What is the most recommended way to share files with the rest of the company while
teleworking?

• C Through the corporate intranet.

Question 30
What measure should you take if you use the same equipment for personal and professional use?

• C Use different users for each area (personal and work) with
restricted permissions.

You might also like