Learning: 6.3 Summarize behavioral security concepts. Flashcards Preview

Comptia IFT+ > Learning: 6.3 Summarize behavioral security concepts. > Flashcards

Flashcards in Learning: 6.3 Summarize behavioral security concepts. Deck (10)
Loading flashcards...
1

What are the expectations of privacy when using business software within a company?

Company policy is used to clarify the complete lack of privacy when using business software at work.

2

Which of the following is NOT an example of Personally Identifiable Information (PII)?

A trade secret

3

What type of consent is recommended prior to processing and/or storing customer confidential information?

Explicit consent, after explaining how the information will be used and/or stored

4

What is the difference between a standard and a procedure?

A standard is a measure by which to evaluate compliance with policy, which is not the same as a procedure: an inflexible, step-by-step listing of the actions that must be completed for any given task.

5

How do social networking sites attempt to handle privacy concerns for users?

They allow information to be classified, such as marking it as public or private.

6

Where can an employee look to find details about privacy and monitoring of a corporate network?

An Acceptable Use Policy (AUP)
An Acceptable Use Policy (AUP), or Fair Use Policy, outlines the allowed uses of a particular service or resource. Agreeing to the AUP typically means you consent to be monitored.

7

What is a privacy concern related to email?

Email is often not encrypted from end to end, meaning there is no privacy assurance.

8

What is a privacy concern related to free file storage sites?

The company may use metadata from your files for advertising and marketing purposes.

9

What is one method companies use to collect data from desktop apps?

Asking users for permission to send “usage and troubleshooting” data back to the vendor for analysis

10

Which is NOT an example of company confidential information?

A physical address