Information Security Awareness

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What are the three main ways you can safeguard Personally Identifiable Information (PII)? Select 3

1. Limit who has access to it 2. store it securely and lock it up when not in use 3. once it is no longer needed, shred it using the secure shred bin

What can you do to determine if an email is suspect? select 4

1. Use common sense 2. look for lazy spelling mistakes 3. hover over hyperlinks to see the actual URL its connected to 4. consider if you know the sender or if it makes sense for them to be contacting you

which of these might be considered a violation of security procedures? select three (3)

1. leaving paperwork on your desk when you leave for the day 2. storing sensitive information in unlocked file cabinets or drawers 3. writing down your password and sticking it to the bottom of your keyboard

Payment Card Industry (PCI) Standards dictate that we must: select four (4)

1. never enter credit card information onto anything except authorized forms 2. never write down the three digit security code typically found on the back of the card 3. keep credit card information secured at all times 4. dispose of credit card information in secure ways

Which of these is NOT an example of a social engineering practice?

Requesting you provide login credentials or other personal information

What should you do if you receive an email with an attachment that you suspect has a virus?

delete the entire email immediately and notify information security

Bad actors are seldom interested in targeting Life Time

false

It is acceptable to share Life Time passwords with other co-workers or the IT Support Desk

false

All team members need to safeguard personal information for member, team members,

guests and vendors

if you suspect an email or text message to be malicious, what should you do?

immediately delete it

Which of these is considered a violation of security procedures?

leaving your computer/workstation unlocked when you leave

A spoofing email may use the name of a person you know or a familiar company

true

Social engineering pr phishing emails are often designed to prey on our trusting nature

true


Kaugnay na mga set ng pag-aaral

Saunders NCLEX Postpartum Questions

View Set

exam #2 into to nursing care prep u

View Set

Chapter 15. Economic Policy (InQuizitive)

View Set

The process of statistical study

View Set

Magoosh - Quantitative Section [Hard]

View Set

kinesiology chapter 1 homework questions

View Set

dance is an activity which can take many forms and different needs .it can be recreation, entertainment education, therapy and religion.pep

View Set