Advertisement

Information Security Questions and Answers (Q&A)

E. Jonathan, Content Team Lead
Answered: Sep 20, 2020
The promotion would not turn a trusted user into a malicious insider. • People who are promoted to their job feel appreciated. • It feels like they have a purpose within t...Read More

9 Answers

2986 views
D. Ronald, Writer
Answered: Oct 16, 2018
Are you familiar with this policy? This instructs the employees to make sure that all of their computers are locked especially when they have to leave their desks for a certain period of time....Read More

3 Answers

2928 views
C. Block, English Professor
Answered: Feb 26, 2019
The first step in Security Awareness is being able to recognize a security threat. This can be done by making users aware of what a threat looks like, communicating regularly with all levels of...Read More

3 Answers

2547 views
John Smith
Answered: Dec 24, 2024
Delete the message: This one has four big risks: 1. Some attachments contain viruses or other malicious programs, so just in general, its risky to put unknown or unsolicited programs or sof...Read More

1 Answer

2415 views
F.Brian
Answered: Jan 29, 2018
A virus is defined as an infective agent. When that infective agent is in the body of a human it can be a lot different than if it is a virus that infects a computer this kind of virus is defined...Read More

2 Answers

1580 views
Fuadonline
Answered: Dec 24, 2024
Computer security is part of everyone s job
Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find...Read More

1 Answer

1362 views
John Smith
Answered: Dec 24, 2024
Click the link so you can see what the site looks like

2 Answers

1140 views
E. Barnes, Professional Gamer
Answered: Mar 07, 2019
The correct answer is option D
The biggest vulnerability to computer information security is the end user. Unlike applications that can be patched or systems that can be hardened, end users...Read More

2 Answers

905 views
John Smith
Answered: Dec 24, 2024
All of the above.

The best choice is all of the above. When handling sensitive information be cautious. Even when sending internal emails with sensitive information, encryption should be...Read More

1 Answer

812 views
John Smith
Answered: Dec 24, 2024
Computer security is part of everyone s job2. Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find them..3....Read More

2 Answers

781 views
Larry Thornton, Student
Answered: Apr 03, 2019
It is the end users who will encounter the most issues while they are using the internet world. How many people have gotten viruses on their computer because they have downloaded attached files...Read More

2 Answers

579 views
John Smith
Answered: Dec 24, 2024
1G00dD@wG

1G00dD@wG is the best choice even though it is shorter than some of the other choices. Notice how it includes a mix of characters to make it difficult to crack, but its relatively...Read More

1 Answer

518 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.