IT Security for Companies — Executive Behaviors

IT Security for Companies — Executive Behaviors

These questions focus on safe executive behaviour in everyday company IT security.

Choose the best answer. When you click, the correct answer appears in the sentence.

Score: 0 / 25

1. What is the best executive habit to reduce cyber risk quickly?
The best answer is: ______
a) Lead by example: follow the same security rules as everyone else.
b) Skip security steps because your time is valuable.
c) Let IT handle everything without your involvement.
[Welche Executive-Gewohnheit reduziert Cyber-Risiko am schnellsten?]

2. What is the safest approach to passwords at work?
The best answer is: ______
a) Reuse one strong password for all company systems.
b) Use a password manager and unique passwords.
c) Share passwords in chat for speed.
[Was ist der sicherste Umgang mit Passwörtern im Unternehmen?]

3. Which is the safest response to a suspicious invoice email at work?
The best answer is: ______
a) Open the attachment to see what it is.
b) Forward it to the whole team to ask.
c) Verify using a known contact method before acting.
[Welche Reaktion ist am sichersten bei einer verdächtigen Rechnungs-E-Mail?]

4. What is the best rule for approving payments or bank detail changes?
The best answer is: ______
a) Approve immediately if it’s urgent.
b) Use a 2-person check and verify out-of-band.
c) Approve by replying to the email thread.
[Welche Regel ist am besten für Zahlungen oder geänderte Bankdaten?]

5. Why should executives avoid bypassing MFA (2FA / Multi-Factor Authentication) prompts?
The best answer is: ______
a) Because MFA stops many account-takeover attacks.
b) Because it makes email faster.
c) Because it reduces meetings.
[Warum sollten Executives MFA-(2FA)-Abfragen nicht umgehen?]

6. What is the risk of using personal email for company files?
The best answer is: ______
a) It improves compliance automatically.
b) It makes backups unnecessary.
c) It increases leakage risk and breaks control/auditing.
[Was ist das Risiko, private E-Mail für Firmendateien zu nutzen?]

7. What is a safe habit for executives when traveling?
The best answer is: ______
a) Share hotspot passwords with anyone in the lounge.
b) Use VPN and avoid sensitive work on unknown Wi-Fi.
c) Disable screen lock to work faster.
[Welche sichere Gewohnheit gilt für Executives auf Reisen?]

8. What is the best behavior around USB sticks in the office?
The best answer is: ______
a) Treat unknown USB sticks as unsafe; don’t plug them in.
b) Plug them in quickly to identify the owner.
c) Let interns test unknown USB sticks first.
[Was ist das beste Verhalten bei USB-Sticks im Büro?]

9. Which is the best policy for company laptops and phones?
The best answer is: ______
a) Allow shared logins to save time.
b) No device encryption so IT can access data easily.
c) Use encryption, screen lock, and remote wipe.
[Welche Richtlinie ist am besten für Firmen-Laptops und -Handys?]

10. What is the safest approach to admin privileges for employees?
The best answer is: ______
a) Give admin rights to anyone who asks.
b) Use least privilege: only what’s needed, when needed.
c) Give everyone admin rights for productivity.
[Was ist der sicherste Umgang mit Admin-Rechten für Mitarbeiter?]

11. Why is it risky to allow password sharing between employees?
The best answer is: ______
a) Because it improves accountability.
b) Because you lose accountability and increase breach impact.
c) Because it reduces phishing.
[Warum ist Passwort-Teilen zwischen Mitarbeitern riskant?]

12. What is the risk of delaying security updates company-wide?
The best answer is: ______
a) It improves user interface stability forever.
b) It increases battery life.
c) It leaves known vulnerabilities exploitable.
[Was ist das Risiko, Sicherheitsupdates im Unternehmen zu verzögern?]

13. What is the best executive message about reporting mistakes?
The best answer is: ______
a) Encourage fast reporting without blame to reduce damage.
b) Punish every mistake to create fear.
c) Tell staff to stay quiet to avoid embarrassment.
[Welche Executive-Botschaft ist am besten fürs Melden von Fehlern?]

14. What is a safe practice for executive assistants handling calendars and email?
The best answer is: ______
a) Turn off MFA to avoid interruptions.
b) Use MFA and separate accounts with clear permissions.
c) Use one shared mailbox password for the whole team.
[Welche sichere Praxis gilt für Assistenz bei Kalender und E-Mail?]

15. Which is the safest behavior for sharing sensitive documents internally?
The best answer is: ______
a) Send them as email attachments to many people.
b) Use controlled access links with permissions and expiry.
c) Upload them to personal cloud accounts.
[Welche Handlung ist am sichersten beim Teilen sensibler Dokumente intern?]

16. What is the safest approach to onboarding new employees?
The best answer is: ______
a) Let them use personal devices with no controls.
b) Give broad access on day one to avoid delays.
c) Provide role-based access and security basics training.
[Was ist der sicherste Ansatz beim Onboarding neuer Mitarbeiter?]

17. Why should executives avoid approving requests under pressure?
The best answer is: ______
a) Because it improves teamwork.
b) Because urgency is a common social engineering tactic.
c) Because pressure always means it’s legitimate.
[Warum sollten Executives Anfragen unter Druck nicht einfach freigeben?]

18. What is the main risk of using shared meeting links publicly?
The best answer is: ______
a) It can enable unauthorized access and data leakage.
b) It increases audio quality.
c) It reduces calendar invites.
[Was ist das Hauptrisiko, Meeting-Links öffentlich zu teilen?]

19. What is a safe rule for executives about confidential information in chats?
The best answer is: ______
a) Send passwords in chat because it’s encrypted.
b) Avoid sensitive data in chat; use approved secure channels.
c) Use emojis instead of security controls.
[Welche sichere Regel gilt für vertrauliche Infos in Chats?]

20. What is the best executive habit for security culture?
The best answer is: ______
a) Ignore training and hope for the best.
b) Only discuss security after an incident.
c) Ask for simple metrics and follow up regularly.
[Welche Executive-Gewohnheit fördert Sicherheitskultur am besten?]

21. Which is safest when employees work from home?
The best answer is: ______
a) Use managed devices, VPN, and secure Wi-Fi practices.
b) Allow work on any device with no rules.
c) Share one company account for all logins.
[Was ist am sichersten, wenn Mitarbeiter im Homeoffice arbeiten?]

22. What is the safest approach to employee offboarding?
The best answer is: ______
a) Keep access for a few months just in case.
b) Remove access promptly and recover company devices.
c) Ask them to delete files on their own.
[Was ist der sicherste Ansatz beim Offboarding?]

23. Why is it risky to allow unapproved software ("shadow IT")?
The best answer is: ______
a) Because it always improves compliance.
b) Because it reduces costs with no downside.
c) Because it can create unknown vulnerabilities and data leaks.
[Warum ist unfreigegebene Software ("Shadow IT") riskant?]

24. What is the main risk of ignoring phishing simulations or training?
The best answer is: ______
a) Because staff remain vulnerable to common attacks.
b) Because it improves email speed.
c) Because it makes staff more confident automatically.
[Was ist das Hauptrisiko, Phishing-Training oder Simulationen zu ignorieren?]

25. What is a safe executive rule for “exceptions” to security?
The best answer is: ______
a) Allow exceptions whenever someone is busy.
b) Keep exceptions rare, documented, time-limited, and approved.
c) Remove controls permanently for VIPs.
[Welche sichere Executive-Regel gilt für „Ausnahmen“ von Security?]

Score: 0 / 25