IT Security for Companies — Executive Behaviors | Set 2

IT Security for Companies — Executive Behaviors | Set 2

These questions focus on safe executive behaviour in everyday company IT security.

Choose the best answer. When you click, the correct answer appears in the sentence.

Score: 0 / 25

1. What is the safest executive rule for sharing customer data internally?
The best answer is: ______
a) Share only on a need-to-know basis with approved tools.
b) Send customer lists to personal email for convenience.
c) Post files in open team chats so everyone can access them.
[Welche sichere Executive-Regel gilt fürs interne Teilen von Kundendaten?]

2. What is a safe habit for executives regarding calendar invites?
The best answer is: ______
a) Accept any invite quickly to be polite.
b) Be cautious with unexpected invites and verify the organizer.
c) Disable meeting passwords to make access easier.
[Welche sichere Gewohnheit gilt für Executives bei Kalendereinladungen?]

3. Which is the safest behavior for executive email forwarding rules?
The best answer is: ______
a) Create forwarding rules to private email for backup.
b) Review forwarding rules regularly and restrict them.
c) Let assistants create any rules without review.
[Welches Verhalten ist am sichersten bei Weiterleitungsregeln in Executive-E-Mail?]

4. What is the safest approach to approving new vendors and tools?
The best answer is: ______
a) Buy quickly if the demo looks good.
b) Ask the vendor to email passwords for setup.
c) Require security review, contracts, and data processing clarity.
[Was ist der sicherste Ansatz bei Freigabe neuer Tools und Anbieter?]

5. Why is it risky to allow exceptions for VIPs on security controls?
The best answer is: ______
a) Because it reduces training time.
b) Because attackers target executives and exceptions create gaps.
c) Because it increases office comfort.
[Warum sind Security-Ausnahmen für VIPs riskant?]

6. What is the main risk of storing company secrets in personal note apps?
The best answer is: ______
a) It improves collaboration automatically.
b) It guarantees legal compliance.
c) It can bypass corporate controls and increase leak risk.
[Was ist das Hauptrisiko, Firmengeheimnisse in privaten Notiz-Apps zu speichern?]

7. What is a safe executive habit for handling sensitive calls in public places?
The best answer is: ______
a) Avoid discussing sensitive topics in public and use privacy measures.
b) Speak loudly so the other person hears clearly.
c) Share confidential numbers if asked by strangers.
[Welche sichere Executive-Gewohnheit gilt bei sensiblen Telefonaten in der Öffentlichkeit?]

8. What is a safe rule for executive devices when crossing borders or traveling?
The best answer is: ______
a) Turn off the device lock to avoid delays.
b) Minimize data on the device and use strong encryption.
c) Store all passwords in a plain text file for quick access.
[Welche sichere Regel gilt für Executive-Geräte beim Reisen oder Grenzübertritt?]

9. Which is the safest habit for employees using email on mobile devices?
The best answer is: ______
a) Disable lock screens to speed up work.
b) Use managed email profiles with screen lock and encryption.
c) Allow email login on any unmanaged personal phone.
[Welche Gewohnheit ist am sichersten bei E-Mail auf Mobilgeräten?]

10. What is the safest executive rule for reporting suspicious emails?
The best answer is: ______
a) Ask people to handle it privately to avoid panic.
b) Only report after damage is visible.
c) Make reporting easy and reward quick reporting.
[Welche Executive-Regel ist am sichersten fürs Melden verdächtiger E-Mails?]

11. Why is it risky to let employees use unknown AI tools with company data?
The best answer is: ______
a) Because data may leave controlled environments and be retained.
b) Because it always improves confidentiality.
c) Because it reduces the need for policies.
[Warum ist es riskant, unbekannte KI-Tools mit Firmendaten zu nutzen?]

12. What is the main risk of weak access controls for shared folders?
The best answer is: ______
a) It makes meetings shorter.
b) People can access data they should not see.
c) It increases keyboard speed.
[Was ist das Hauptrisiko schwacher Zugriffskontrollen bei geteilten Ordnern?]

13. What is a safe executive habit for board reports and attachments?
The best answer is: ______
a) Use personal cloud links for speed.
b) Use secure portals with access control instead of mass email.
c) Send PDFs to everyone to avoid login issues.
[Welche sichere Executive-Gewohnheit gilt für Board-Reports und Anhänge?]

14. What is the safest executive rule for Wi-Fi at the office?
The best answer is: ______
a) Share the Wi-Fi password on a public notice board.
b) Use one Wi-Fi for everyone including visitors.
c) Separate guest Wi-Fi and secure internal Wi-Fi with strong encryption.
[Welche Executive-Regel ist am sichersten fürs WLAN im Büro?]

15. Which is the safest practice for company chat channels?
The best answer is: ______
a) Post passwords in channels to reduce emails.
b) Limit external guests and review membership regularly.
c) Allow external guests in every channel by default.
[Welche Praxis ist am sichersten für Firmen-Chat-Kanäle?]

16. What is the safest executive behavior around "quick fixes" from vendors?
The best answer is: ______
a) Require approved remote access procedures and logging.
b) Let them remote in immediately without checks.
c) Share admin passwords to speed up support.
[Welches Verhalten ist am sichersten bei "Quick Fixes" von Anbietern?]

17. Why is it risky to keep old employee accounts active?
The best answer is: ______
a) Because it reduces storage space.
b) Because it improves audit trails.
c) Because they can be abused for unauthorized access.
[Warum ist es riskant, alte Mitarbeiterkonten aktiv zu lassen?]

18. What is the risk of executives using personal messaging apps for business deals?
The best answer is: ______
a) It improves compliance reporting.
b) It can break retention, auditing, and confidentiality controls.
c) It guarantees encryption is always strong.
[Was ist das Risiko, wenn Executives private Messenger für Deals nutzen?]

19. What is a safe executive rule for handling confidential printouts?
The best answer is: ______
a) Take photos and share them in group chats.
b) Use secure printing and shred confidential documents.
c) Leave printouts in meeting rooms for later.
[Welche sichere Executive-Regel gilt für vertrauliche Ausdrucke?]

20. What is a safe executive practice for handling urgent CEO-fraud style requests?
The best answer is: ______
a) Share bank details to speed up payment.
b) Act immediately to show decisiveness.
c) Use a verification protocol (call-back / second approver).
[Welche Praxis ist sicher bei dringenden CEO-Fraud-Anfragen?]

21. Which is safest when employees handle customer support emails?
The best answer is: ______
a) Use templates and never request passwords or one-time codes.
b) Ask customers to send passwords for verification.
c) Send links to random download tools for troubleshooting.
[Was ist am sichersten, wenn Mitarbeiter Support-E-Mails bearbeiten?]

22. What is the safest policy for meeting recordings?
The best answer is: ______
a) Upload recordings to personal drives for speed.
b) Record only when needed, store securely, and control access.
c) Record everything by default and share publicly.
[Welche Richtlinie ist am sichersten für Meeting-Aufzeichnungen?]

23. Why is it risky when executives ignore security training?
The best answer is: ______
a) Because it makes email slower.
b) Because it signals that rules are optional for everyone.
c) Because it reduces staff motivation automatically.
[Warum ist es riskant, wenn Executives Security-Training ignorieren?]

24. What is the main risk of unmanaged personal devices accessing company data?
The best answer is: ______
a) They may lack controls, updates, and remote wipe.
b) They always have better security.
c) They reduce phishing automatically.
[Was ist das Hauptrisiko privater, unverwalteter Geräte mit Zugriff auf Firmendaten?]

25. What is a safe executive rule for incident response communication?
The best answer is: ______
a) Wait until the incident is over before informing anyone.
b) Use a prepared plan: who to contact, what to say, and what not to share.
c) Discuss everything in public channels to be transparent.
[Welche sichere Executive-Regel gilt für Kommunikation bei Security-Vorfällen?]

Score: 0 / 25