USDA FS Security awareness training IT Training

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Question 14: To ensure the physical security of USDA information, you should do all of the following except: (Select one)

A. Allow people to enter the facility by following others.

Question 11: Which of the following will help reduce your risk of identity theft when engaging in ecommerce? (Select one)

A. Confirm the site you are using uses an encrypted link.

Question 10: All of the following are examples of malicious code except: (Select one)

A. Cookies

Question 12: To keep your mobile device secure, you should do all of the following except: (Select one)

A. Download apps from unknown app stores.

Question 7: Protecting your identity is essential, even on your personal or home computer. You should consider doing all of the following except: (Select one)

A. Respond to emails asking you to verify your personal information.

Question 13: Unlocking your smart phone removes security protections that protect your mobile device from malicious applications. (Select True or False)

A. True

Question 1: Which of the following is NOT something privileged account holders are required to do? (Select one)

B. Limit the performance of privileged user activities to privileged user account(s).

Question 8: Which of the following vulnerabilities is most likely to be exploited by an external threat to the infrastructure? (Select one)

B. Software flaws

Question 9: Cookies contain information about you. This information, if not encrypted, could be viewed by a third party. The best practice to prevent this from happening is: (Select One)

C. Ensure your browser is set to not accept cookies.

Question 2: Edna wants to create a strong password. She should avoid all of the following except: (Select one)

C. Special characters

Question 3: Which term refers to a secure systems ability to protect against the unauthorized modification or destruction of information? (Select one)

D. Nonrepudiation

Question 4: This high-tech scam that uses email or web sites to deceive you into disclosing your credit card numbers, bank account information, Social Security Number, passwords, or other sensitive information is known as: (Select one)

D. Phishing

Question 5: For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (Select one)

D. Sensitive information

Question 6: Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birth. After additional inspection, she realized it was an extra report from one of their file systems that had been discarded. What should Denise do? (Select one)

H. All of the above


Kaugnay na mga set ng pag-aaral

Chapter 17: European Power and Expansion

View Set

BIO 141: Chapter 5 (The Structure and Function of Large Biological Molecules) Review

View Set

Chapter 1 - Types of Value and Valuation

View Set

COMPTIA A+ 220-1002: SYSTEM UTILITIES

View Set

Digestive System Homework Module

View Set

Comparative Politics - Political Science 2 - Midterm

View Set