星期二, 9月 28, 2010

Security responsibilities and responses: A user's view

1. Which of the following actions would help users to keep information safe?

Choose more than one option.

Keep important information stored separately in hard copy form
Have a strong password
Be careful about leaving your computer unattended
Report anything suspicious



2. Which of the following should be part of the effort to reduce the level of threat to security posed by an organization's own employees?

Choose more than one option.

Keep employees motivated
Ensure that employees' skills are updated on an ongoing basis
Monitor employee activity
Install appropriate technical barriers



3. Which of the following are key considerations for an information security program?

Choose more than one option.

Confidentiality
Availability
Communication
Integrity



4. Which of the following are criteria for a good password?

Choose more than one option.

It is almost impossible for others to guess
It has personal significance
You don't have to write it down
It evokes a pleasant, thus memorable, image



Topic title: Security responsibilities and responses: A user's view


Which of the following are considered potential security threats?

Computer viruses
Internet privilege
Loss of data
Unauthorized access