0% found this document useful (0 votes)
93 views10 pages

Infosc

The document provides information about identifying phishing emails and securing personal information. It asks questions about proper responses to suspicious emails requesting private information, secure password practices, and identifying insecure external storage devices and networks. The document emphasizes being cautious of unsolicited requests, verifies the legitimacy of communications, and avoids exposing devices to unknown sources that could enable malware installation.

Uploaded by

narasakuru79
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views10 pages

Infosc

The document provides information about identifying phishing emails and securing personal information. It asks questions about proper responses to suspicious emails requesting private information, secure password practices, and identifying insecure external storage devices and networks. The document emphasizes being cautious of unsolicited requests, verifies the legitimacy of communications, and avoids exposing devices to unknown sources that could enable malware installation.

Uploaded by

narasakuru79
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

You receive an email from your Human Resources department.

The email asks for your birthdate and home


address to set up your retirement account. You should:1

Mark

Ignore the email and directly contact your Human Resources representative to see if the email is legitimate.

Reply to the email to confirm with your Human Resource department and then send the requested information.

Reply to the email with the required information.

Forward the email to your financial advisor.


2
What is a defense against shoulder-surfing?1

Mark

Closed-circuit cameras

Antivirus

Badge checking

Being aware of your surroundings

What is true about using removable media?4

Mark

It is a time-tested and automatically secure way to transfer files

Transfer speeds on removable media are slow, so it is best not to use when something is time-sensitive

Antivirus software offers no protection from removable media

Malicious software could accidentally be transferred to your computer

What type of dangerous software could be stored on removable media?4

Mark
Power Points

Text files

Shared Files

Malware
hat is true about removable media that you find?
2
Mark

If you have antivirus installed, it is safe to plug into your computer

It could be a ploy by a hacker to get you to plug it in and transfer malware to your computer

It is best to plug it into a public computer

It is customary to look for files on the drive to help you identify the owner and return it to the owner
What is a possible defense against dumpster diving?
Mark

Clean desk policy

Regular backups

Antivirus

Shredding documents
What type of dangerous software could be stored on removable media?4

Mark

Power Points

Text files

Shared Files

Malware

1
Use an authorized/trusted password storage solution

Store it in a password-protected PDF

Store it in a spreadsheet

Never keep electronic copies of passwords


4

Shoulder-surfing

Badge check

Dumpster-diving

Phishing
3
What technology can prevent a hacker from using your computer when you don't have it with you?

Mark

Closed-circuit cameras

Protective laptop case

Locking screensaver

Dvorak keyboard
Pick the most suspicious host URL. 2

Mark

news.google.com/news/

cnn.com/

whitehouse.gov

l3370wn3du.net

A strong password is:

Mark

A word found in a dictionary

A password that is short so it is easy to remember

The default password set by the manufacturer

A password that is hard for people to guess.

You think that you received a phishing email. What do you do next?

Mark

Delete or report the email


Forward the email to your manager with no explanation.

Explore the email by clicking links to investigate further.

Do nothing.
What would indicate a suspicious hostname?4

Mark

One that ends in .net

Numbers replacing letters in the hostname

A host name that is too short

A hostname that does not describe the website it connects to 2


Your organization requires you to change passwords on a regular basis. You should:

Mark

Ignore the rule and don't change your password.

Create strong passwords every time a change is required.

Add a date to the end of your current password.

Use the next word in you desktop dictionary.

You might also like