IT Security for Companies — Executive Behaviors | Set 2
These questions focus on safe executive behaviour in everyday company IT security.
Choose the best answer. When you click, the correct answer appears in the sentence.
1. What is the safest executive rule for sharing customer data internally?
The best answer is: ______
Share only on a need-to-know basis with approved tools.
a) Share only on a need-to-know basis with approved tools.
b) Send customer lists to personal email for convenience.
c) Post files in open team chats so everyone can access them.
[Welche sichere Executive-Regel gilt fürs interne Teilen von Kundendaten?]
2. What is a safe habit for executives regarding calendar invites?
The best answer is: ______
Be cautious with unexpected invites and verify the organizer.
a) Accept any invite quickly to be polite.
b) Be cautious with unexpected invites and verify the organizer.
c) Disable meeting passwords to make access easier.
[Welche sichere Gewohnheit gilt für Executives bei Kalendereinladungen?]
3. Which is the safest behavior for executive email forwarding rules?
The best answer is: ______
Review forwarding rules regularly and restrict them.
a) Create forwarding rules to private email for backup.
b) Review forwarding rules regularly and restrict them.
c) Let assistants create any rules without review.
[Welches Verhalten ist am sichersten bei Weiterleitungsregeln in Executive-E-Mail?]
4. What is the safest approach to approving new vendors and tools?
The best answer is: ______
Require security review, contracts, and data processing clarity.
a) Buy quickly if the demo looks good.
b) Ask the vendor to email passwords for setup.
c) Require security review, contracts, and data processing clarity.
[Was ist der sicherste Ansatz bei Freigabe neuer Tools und Anbieter?]
5. Why is it risky to allow exceptions for VIPs on security controls?
The best answer is: ______
Because attackers target executives and exceptions create gaps.
a) Because it reduces training time.
b) Because attackers target executives and exceptions create gaps.
c) Because it increases office comfort.
[Warum sind Security-Ausnahmen für VIPs riskant?]
6. What is the main risk of storing company secrets in personal note apps?
The best answer is: ______
It can bypass corporate controls and increase leak risk.
a) It improves collaboration automatically.
b) It guarantees legal compliance.
c) It can bypass corporate controls and increase leak risk.
[Was ist das Hauptrisiko, Firmengeheimnisse in privaten Notiz-Apps zu speichern?]
7. What is a safe executive habit for handling sensitive calls in public places?
The best answer is: ______
Avoid discussing sensitive topics in public and use privacy measures.
a) Avoid discussing sensitive topics in public and use privacy measures.
b) Speak loudly so the other person hears clearly.
c) Share confidential numbers if asked by strangers.
[Welche sichere Executive-Gewohnheit gilt bei sensiblen Telefonaten in der Öffentlichkeit?]
8. What is a safe rule for executive devices when crossing borders or traveling?
The best answer is: ______
Minimize data on the device and use strong encryption.
a) Turn off the device lock to avoid delays.
b) Minimize data on the device and use strong encryption.
c) Store all passwords in a plain text file for quick access.
[Welche sichere Regel gilt für Executive-Geräte beim Reisen oder Grenzübertritt?]
9. Which is the safest habit for employees using email on mobile devices?
The best answer is: ______
Use managed email profiles with screen lock and encryption.
a) Disable lock screens to speed up work.
b) Use managed email profiles with screen lock and encryption.
c) Allow email login on any unmanaged personal phone.
[Welche Gewohnheit ist am sichersten bei E-Mail auf Mobilgeräten?]
10. What is the safest executive rule for reporting suspicious emails?
The best answer is: ______
Make reporting easy and reward quick reporting.
a) Ask people to handle it privately to avoid panic.
b) Only report after damage is visible.
c) Make reporting easy and reward quick reporting.
[Welche Executive-Regel ist am sichersten fürs Melden verdächtiger E-Mails?]
11. Why is it risky to let employees use unknown AI tools with company data?
The best answer is: ______
Because data may leave controlled environments and be retained.
a) Because data may leave controlled environments and be retained.
b) Because it always improves confidentiality.
c) Because it reduces the need for policies.
[Warum ist es riskant, unbekannte KI-Tools mit Firmendaten zu nutzen?]
12. What is the main risk of weak access controls for shared folders?
The best answer is: ______
People can access data they should not see.
a) It makes meetings shorter.
b) People can access data they should not see.
c) It increases keyboard speed.
[Was ist das Hauptrisiko schwacher Zugriffskontrollen bei geteilten Ordnern?]
13. What is a safe executive habit for board reports and attachments?
The best answer is: ______
Use secure portals with access control instead of mass email.
a) Use personal cloud links for speed.
b) Use secure portals with access control instead of mass email.
c) Send PDFs to everyone to avoid login issues.
[Welche sichere Executive-Gewohnheit gilt für Board-Reports und Anhänge?]
14. What is the safest executive rule for Wi-Fi at the office?
The best answer is: ______
Separate guest Wi-Fi and secure internal Wi-Fi with strong encryption.
a) Share the Wi-Fi password on a public notice board.
b) Use one Wi-Fi for everyone including visitors.
c) Separate guest Wi-Fi and secure internal Wi-Fi with strong encryption.
[Welche Executive-Regel ist am sichersten fürs WLAN im Büro?]
15. Which is the safest practice for company chat channels?
The best answer is: ______
Limit external guests and review membership regularly.
a) Post passwords in channels to reduce emails.
b) Limit external guests and review membership regularly.
c) Allow external guests in every channel by default.
[Welche Praxis ist am sichersten für Firmen-Chat-Kanäle?]
16. What is the safest executive behavior around "quick fixes" from vendors?
The best answer is: ______
Require approved remote access procedures and logging.
a) Require approved remote access procedures and logging.
b) Let them remote in immediately without checks.
c) Share admin passwords to speed up support.
[Welches Verhalten ist am sichersten bei "Quick Fixes" von Anbietern?]
17. Why is it risky to keep old employee accounts active?
The best answer is: ______
Because they can be abused for unauthorized access.
a) Because it reduces storage space.
b) Because it improves audit trails.
c) Because they can be abused for unauthorized access.
[Warum ist es riskant, alte Mitarbeiterkonten aktiv zu lassen?]
18. What is the risk of executives using personal messaging apps for business deals?
The best answer is: ______
It can break retention, auditing, and confidentiality controls.
a) It improves compliance reporting.
b) It can break retention, auditing, and confidentiality controls.
c) It guarantees encryption is always strong.
[Was ist das Risiko, wenn Executives private Messenger für Deals nutzen?]
19. What is a safe executive rule for handling confidential printouts?
The best answer is: ______
Use secure printing and shred confidential documents.
a) Take photos and share them in group chats.
b) Use secure printing and shred confidential documents.
c) Leave printouts in meeting rooms for later.
[Welche sichere Executive-Regel gilt für vertrauliche Ausdrucke?]
20. What is a safe executive practice for handling urgent CEO-fraud style requests?
The best answer is: ______
Use a verification protocol (call-back / second approver).
a) Share bank details to speed up payment.
b) Act immediately to show decisiveness.
c) Use a verification protocol (call-back / second approver).
[Welche Praxis ist sicher bei dringenden CEO-Fraud-Anfragen?]
21. Which is safest when employees handle customer support emails?
The best answer is: ______
Use templates and never request passwords or one-time codes.
a) Use templates and never request passwords or one-time codes.
b) Ask customers to send passwords for verification.
c) Send links to random download tools for troubleshooting.
[Was ist am sichersten, wenn Mitarbeiter Support-E-Mails bearbeiten?]
22. What is the safest policy for meeting recordings?
The best answer is: ______
Record only when needed, store securely, and control access.
a) Upload recordings to personal drives for speed.
b) Record only when needed, store securely, and control access.
c) Record everything by default and share publicly.
[Welche Richtlinie ist am sichersten für Meeting-Aufzeichnungen?]
23. Why is it risky when executives ignore security training?
The best answer is: ______
Because it signals that rules are optional for everyone.
a) Because it makes email slower.
b) Because it signals that rules are optional for everyone.
c) Because it reduces staff motivation automatically.
[Warum ist es riskant, wenn Executives Security-Training ignorieren?]
24. What is the main risk of unmanaged personal devices accessing company data?
The best answer is: ______
They may lack controls, updates, and remote wipe.
a) They may lack controls, updates, and remote wipe.
b) They always have better security.
c) They reduce phishing automatically.
[Was ist das Hauptrisiko privater, unverwalteter Geräte mit Zugriff auf Firmendaten?]
25. What is a safe executive rule for incident response communication?
The best answer is: ______
Use a prepared plan: who to contact, what to say, and what not to share.
a) Wait until the incident is over before informing anyone.
b) Use a prepared plan: who to contact, what to say, and what not to share.
c) Discuss everything in public channels to be transparent.
[Welche sichere Executive-Regel gilt für Kommunikation bei Security-Vorfällen?]