Basics of Information Security PT 2
Which of the following are important for protecting computing devices and systems?
All of the above
Which of the following is a good practice if one wishes to avoid "social engineering" attacks?
All of the above
Which of these is not a good security practice for web browsing?
Browsing to sites using links sent in emails without taking steps to assure the destination is safe
Which of these is not a good security practice for portable devices?
Disabling any remote-locate, remote-shutdown, and remote-erase capabilities because these can accidentally erase data
Which of these is not a good practice for controlling computer access?
Logging into systems with a shared user-ID or password
Which of these is not a good practice for protecting computing devices?
Login and screen-saver passwords, or token or biometric mechanisms, are disabled to make it easier to use the device quickly
Which of these is not a good security practice for email?
Sending sensitive information in email messages or in attachments to such messages, as long as a legally-binding confidentiality notice is included
Which of the following is generally allowed in most organizations?
Social networking if done for approved business-related purposes