gani
Administrator
Q1. What is the root cause of almost every data breach?
Select one:
Poorly crafted password
Unpatched device
Zero-day attack
Human error*
Q2.Why are insider threats one of the most challenging attack vectors?
Select one:
Employees are trusted users who have legitimate access to an organization’s data and resources.*
There is little that can be done to prevent a denial of service attack.
Insider attacks are common, obvious, and overwhelm IT security.
Network security is designed to defend against outsiders, not insiders.
Q3. Which method is a defense against potential insider threats?
Select one:
Identify and report any suspicious activity.*
Investigate and if possible resolve the threat on your own.
Monitor your co-workers’ daily activities.
Confront any person you suspect of being an insider threat.
Q4. If a suspicious package appears at your desk, which action is best aligned with good physical security practices?
Select one:
Carefully open the package and report what you find.
Get your neighbour to open the package.
Destroy the package using an industrial shredder.
Report the package and do not open or touch it.*
Q5. Which practice strengthens the physical security of your work environment?
Select one:
Shred and destroy all documents that contain sensitive personal or organizational information rather than tossing them into the waste bin.*
Ensure that your software is up-to-date and that the latest patches are applied.
Pile all confidential documents neatly to one corner of your desk.
Recycle all paper, CDs, DVDs, hard drives etc. into their appropriate bins.
Select one:
Poorly crafted password
Unpatched device
Zero-day attack
Human error*
Q2.Why are insider threats one of the most challenging attack vectors?
Select one:
Employees are trusted users who have legitimate access to an organization’s data and resources.*
There is little that can be done to prevent a denial of service attack.
Insider attacks are common, obvious, and overwhelm IT security.
Network security is designed to defend against outsiders, not insiders.
Q3. Which method is a defense against potential insider threats?
Select one:
Identify and report any suspicious activity.*
Investigate and if possible resolve the threat on your own.
Monitor your co-workers’ daily activities.
Confront any person you suspect of being an insider threat.
Q4. If a suspicious package appears at your desk, which action is best aligned with good physical security practices?
Select one:
Carefully open the package and report what you find.
Get your neighbour to open the package.
Destroy the package using an industrial shredder.
Report the package and do not open or touch it.*
Q5. Which practice strengthens the physical security of your work environment?
Select one:
Shred and destroy all documents that contain sensitive personal or organizational information rather than tossing them into the waste bin.*
Ensure that your software is up-to-date and that the latest patches are applied.
Pile all confidential documents neatly to one corner of your desk.
Recycle all paper, CDs, DVDs, hard drives etc. into their appropriate bins.
Bài viết liên quan
Bài viết mới