Which action below would breach the Clear Desk and Screen Policy?
The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do first?
What is the only true guarantee against data loss due to a cyberattack such as ransomware?
When visiting your favorite website, a pop-up appears that reads "You have won a free Apple iPod!" What should you do?
Which of the following terms best describes ensuring the data is accessible to authorized users?
Which of the following is a measure for preventing a social engineering attack except:
Which of the following passwords meets your company password requirements?
Your supervisor is very busy and asks you to log into the HR Server using her user-ID and password to retrieve some reports. What should you do?
A policy that outlines how to maintain information in the user’s possession for a predetermined length of time is known as?
Why is it necessary for everyone to have a good understanding of Information Security policies and procedures?
TRUE or FALSE: Attachments should always be treated with caution, even if you know the sender.
In cryptography, which of the following basic protection ensures that the information is correct and no unauthorizes person or malicious software has altered that data?
----------- ensures that only authorized parties can view the information?
You receive a text message warning you that your bank account has been suspended. If says that you must click on the link in the SMS and update your credentials with the next 24 hours. Is this message safe or unsafe?
Which is the following is true about phishing? 1. It is a type of cybersecurity attack that attempts to obtain data that are sensitive like usernames, passwords, and more. 2. It is carried out by email spoofing, instant messaging, and text messaging.
Which of the following is a common delivery method for viruses?
All of these are good physical security practices except?
The Information Security Policy and related policies only apply to electronic and hardcopy records and does not apply to verbal discussions?
Developing an outline of procedures that are to be followed in the event of a major IT incident impacting availability is known as ------------?
What must be done if your password has been compromised?