Question
- 1. Which three email characteristics can help you identify hoax virus warnings? (Choose three.)
- The message is from a trusted source.
- The message warns of a virus that will infect your computer by simply reading the message.
- The message requests that you forward the message to others.
- The message was forwarded many times. - 2. Which two strategies will help protect hardcopy information? (Choose two.)
- Shred printouts before disposal.
- Encrypt all files.
- Sign all documents.
- Adopt a "clean desk" policy. - 3. Which three types of information should you avoid adding to your instant messaging account details? (Choose three.)
- Addresses.
- Organization names.
- Nicknames.
- Phone numbers. - 4. Which three steps are important to perform when you receive instant messages? (Choose three.)
- Verify the source of the message
- Verify the size of any attachment sent to you
- Verify the purpose of the attachment sent to you
- Verify that your security updates and antivirus updates have been applied before you download or open any attachment - 5. Which PDA security best practice will help protect the information on your PDA?
- Clearly identify your PDA with company stickers or logos.
- Never remove your PDA from your bag for airport security.
- Store your PDA passwords in a safe location.
- Synchronize your PDA data regularly. - 6. Which two methods will reduce the chances that your password will be compromised? (Choose two.)
- Make your password lower case.
- Change your password regularly.
- Use Default passwords.
- Use a passphrase. - 7. Which negative outcome can result from hoax virus warnings and malicious spam?
- Denial of service.
- Data loss.
- Reduced account privileges.
- Credit card fraud. - 8. Which three actions can you take to increase the security of your Web browsing? (Choose three.)
- Learn to recognize common scams.
- Manage user names and passwords.
- Only browse secure Web sites.
- Use caution when downloading.
Answers:
- Computer Security Quiz - Answers 1 through 4
- Computer Security Quiz - Answers 5 through 8
Fuente: netsecurity.about.com
No hay comentarios:
Publicar un comentario