Basics of Information Security PT 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following are important for protecting computing devices and systems?

All of the above

Which of the following is a good practice if one wishes to avoid "social engineering" attacks?

All of the above

Which of these is not a good security practice for web browsing?

Browsing to sites using links sent in emails without taking steps to assure the destination is safe

Which of these is not a good security practice for portable devices?

Disabling any remote-locate, remote-shutdown, and remote-erase capabilities because these can accidentally erase data

Which of these is not a good practice for controlling computer access?

Logging into systems with a shared user-ID or password

Which of these is not a good practice for protecting computing devices?

Login and screen-saver passwords, or token or biometric mechanisms, are disabled to make it easier to use the device quickly

Which of these is not a good security practice for email?

Sending sensitive information in email messages or in attachments to such messages, as long as a legally-binding confidentiality notice is included

Which of the following is generally allowed in most organizations?

Social networking if done for approved business-related purposes


संबंधित स्टडी सेट्स

Final Review Questions for NR222 Health & Wellness

View Set

Artificial Intelligence LinkedIn Course

View Set