Basics of Information Security PT 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following are important for protecting computing devices and systems?

All of the above

Which of the following is a good practice if one wishes to avoid "social engineering" attacks?

All of the above

Which of these is not a good security practice for web browsing?

Browsing to sites using links sent in emails without taking steps to assure the destination is safe

Which of these is not a good security practice for portable devices?

Disabling any remote-locate, remote-shutdown, and remote-erase capabilities because these can accidentally erase data

Which of these is not a good practice for controlling computer access?

Logging into systems with a shared user-ID or password

Which of these is not a good practice for protecting computing devices?

Login and screen-saver passwords, or token or biometric mechanisms, are disabled to make it easier to use the device quickly

Which of these is not a good security practice for email?

Sending sensitive information in email messages or in attachments to such messages, as long as a legally-binding confidentiality notice is included

Which of the following is generally allowed in most organizations?

Social networking if done for approved business-related purposes


Conjuntos de estudio relacionados

Final Review Questions for NR222 Health & Wellness

View Set

Artificial Intelligence LinkedIn Course

View Set