11-2 Flashcards

1
Q

you should never open an attachment that meets the following criteria

A

unkown source
active or executable code
animation or movie
is not legit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

it is recommended that all Instant Mesaging be banned from all ____________ within an organization

A

computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

limmiting an organizations instant messaging to __________ only can be hard to enforce

A

buisness work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

no private of confidential buisness information should be sent Via ___________

A

instant messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

some organizations simply decide to prohibit any changes to the _____________ for this reason

A

system configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

limiting a users access privleges , as in the concept of _________ will help prevent the user downloading potentially hazardous material.

A

least privlage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BYOD, wearable devices, IOT all pose a new security risk when they connect to your network. in a highly secure environment it’s important to _____ all personal devices

A

Ban

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 alternatives for a BYOD that will give the organization more control would be ___________

A

CYOD (choose your own device)

COPE (company owned provided equipment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the first incident of violating any user policy will result in a ____________

A

verbal warning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a second incident of violating a user policy will result in a __________

A

written warning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a third incident of violating a user policy will result in __________

A

suspension or termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

you must clearly list the consiquences for user policy violations as well as have users sign the _________ when on boarding

A

user policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

when an employee leaves its important to make sure all _________ are terminated, and all access to all systems is disconnected.. this includes physical access

A

logins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

when an employee leaves make sure the following happens

A
login accounts closed
keys returned
all email, internet, wireless shutdown
all access to mainframe accounts shutdown
the employee harddrive searched.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

if the employee has been up to no good its important for you to find out _____________

A

as quickly as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly