which of the following does not demonstrate the need for policies - Answer end users
are generally not particularly bright and must be told everything
which of the following is not an area that user policies need to cover - Answer if and
when to share password
which of the following is not an example of a user password policy - Answer users may
only share passwords with their assistant
what should an employee do if she believes her password has been revealed to another
party - Answer change your own password immediately
which of the following should not be recommended as acceptable email attachments -
Answer flash animations
which of the following is the best reason users should be prohibited from installing
software - Answer they may install software that circumvents security
which of the following is not a significant security risk posed by instant messaging -
Answer employees may send harassing messages
what must all user policies have in order to be effective - Answer they must have
consequences
which of the following is the appropriate sequence of events for a new employee -
Answer IT is notified of the new employee and the requested resources - employee is
granted access to those resources - employee is briefed on security/acceptable use -
employee signs acknowledging receipt of a copy of security rules
which of the following is the appropriate sequence of events for a departing employee -
Answer IT is notified of the departure - all logon accounts are shut down - all access is
disabled - the employee's workstation is searched/scanned
which of the following is the appropriate sequence for a change request - Answer
business unit manager requests change - IT unit verifies request - security unit verifies
request - request is scheduled with rollback plan - request is implemented
what is the first step when discovering a machine has been infected with a virus -
Answer quarantine infected machines
what is the rule in access control - Answer the least access job requirements allow
after dealing, on a technical level, with any security breach, what is the last thing to be
done for a security breach - Answer notify management