Security Awareness
It is unacceptable to let a client or vendor use your device, even if you are watching them. -True -False
True
How can you best avoid potential eavesdropping in public venues, such as the cafeteria, a coffee house, or at conference facilities in hotels? -Discuss a patient's condition over lunch in the cafeteria only if everyone at your table is assigned to the patient. -Discuss a patient's condition, whether in person or on the phone, only in private settings. -While waiting in line for coffee, discuss a patient's condition with a colleague.
-Discuss a patient's condition, whether in person or on the phone, only in private settings.
Which of the following methods for keeping your computer secure is false? -Downloading free software that a fellow employee told you was safe to use -Keeping your security software up to date -Logging off the network at the end of the day -Setting your password-protected screensaver to appear after five minutes of inactivity
-Downloading free software that a fellow employee told you was safe to use
Who is responsible for knowing and following our security policies and procedures? -Only those who directly work with confidential information -Everyone, regardless of their role in our organization -Only managers and department heads -Only security and privacy officers
-Everyone, regardless of their role in our organization
Only public information should be destroyed when it is no longer in use. -True -False
-False
Which employee practices safe access controls? -Byron visits another of our facilities, and tailgates behind other employees to gain access. After all, he has a badge at his usual work location. -Vera is taking boxes of supplies to a meeting at another location. Her car is not far away, so she props the back door open to facilitate loading. Otherwise, she would have to go around the building to the front entrance three or four times. -Jerome arranges for a visitor badge for a vendor, and asks the vendor to sign in. Then Jerome accompanies the vendor throughout the visit.
-Jerome arranges for a visitor badge for a vendor, and asks the vendor to sign in. Then Jerome accompanies the vendor throughout the visit.
You are excited about a work initiative and want to blog about it on a public website. Is this OK? -Yes, as long as your post portrays our organization in a positive light. -No. Unless authorized to do so, you should never speak on behalf of our organization.
-No. Unless authorized to do so, you should never speak on behalf of our organization.
Phishing scams can be disguised as social media messages or e-mails from friends. -True -False
-True
Clicking a link on a social media site could put your computer at risk for malware infection. -True. Social media sites are notorious for containing unsafe links. -False. As long as antivirus software is running, your computer is safe.
-True. Social media sites are notorious for containing unsafe links.
Which of the following methods is NOT a safe practice for keeping your computer secure? -Securing laptops left at work -Turning off your antivirus software to facilitate the download of an application you think will improve your productivity -Using encryption software to protect confidential and personal information in e-mails or stored on portable devices -Using a password to unlock your screensaver
-Turning off your antivirus software to facilitate the download of an application you think will improve your productivity
Question: 1 Which of the following is a good practice for device passwords? -Use a different password for each device. -Store passwords as contacts in a smartphone's address book. -Use cached information to recall passwords. -Keep your password written near your devices.
-Use a different password for each device.