Asked by elgiva9amoah
WORKPLACE SECURITY AWARENESS A. Maintain civility and trust your...
WORKPLACE SECURITY AWARENESS
A. Maintain civility and trust your intuition about whether to let him or her pass.
B. Use open-ended questions when asking the person the purpose of his/her visit.
C. Attempt to shake hands with the individual, to see if the handshake is reciprocated.
D. Leave it up to coworkers who know more people in the building to decide what to do.
2. When employees collect or handle personally identifiable information (PII), they should: A. Apply the 'need to know' principle before disclosing PII to other personnel.
B. Collect as much PII as they can at first contact with the individual to avoid having to get other data later.
C. Share that information with other coworkers upon request.
D. Recognize that sharing PII is often permissible if done for what one believes is the greater good of the community.
3. Which of the following statements is NOT true about peer-to-peer (P2P) software? A. Peer-to-peer software can bypass firewall and antivirus systems by hiding activities of users, such as file transfers.
B. P2P software provides direct access to another computer. Some examples include file sharing, Internet meeting, or chat messaging software.
C. Some P2P programs have remote-control capabilities, allowing users to take control of a computer from another computer somewhere else in the world.
D. P2P software includes any data storage device that you can remove from a computer and take with you to a peer's computer.
4. Indicators of potential workplace violence: A. Can only be recognized by trained mental health experts.
B. Are completely individualized and therefore impossible to protect against.
C. Cannot usually be identified before an employee 'snaps' and commits a violent act.
D. Can often be managed and treated if recognized.
5. TRUE OR FALSE: When noticing a suspicious vehicle on the property, a responsible employee should approach the driver and ask if he/she needs assistance. A. True
B. False
6. TRUE OR FALSE: If you notice indicators of potentially violent behavior in a coworker, you must wait until you see something violent actually happen before reporting your suspicions to security personnel or human resources. A. True
B. False
7. An unlawful or unauthorized acquisition, by fraud or deceit, is known as a: A. Diversion
B. Container Breach
C. Theft
D. Consequence
8. Password procedures, information encryption software, and firewalls are examples of measures taken to address: A. Workplace violence threats.
B. Information and cyber threats.
C. Criminal and terrorist threats.
D. Access and security control threats.
9. Vulnerability can be defined as: A. The impact or effect of an event, incident, or occurrence.
B. A natural or manmade occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property.
C. Physical features or operational attributes that render an entity open to exploitation or susceptible to a given hazard.
D. The potential for an unwanted outcome resulting from an incident, event, or occurrence.
10. Controlling doors and other entrances is an example of a measure taken to address: A. Access and security control threats.
B. Workplace violence threats.
C. Criminal and terrorist threats.
D. Information and cyber threats.
11. TRUE OR FALSE: The security goals of confidentiality, availability, and integrity of data can be adversely impacted by malicious code. A. True
B. False
12. Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known as: A. Hacking
B. Telephone Solicitation
C. Social Engineering
D. Mass Marketing
13. Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as: A. Peer-to-peer Software
B. Hacking
C. Trojan Horse
D. Malicious Code
14. 6.TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations. A. True
B. False
15. The potential for an unwanted outcome resulting from an incident, event, or occurrence is: A. Vulnerability
B. Threat
C. Consequence
D. Risk
Answered by KidQuetzal1567
llentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat
lestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficituUnlock full access to Course Hero
Explore over 16 million step-by-step answers from our library
Subscribe to view answer- consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellente
- Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam la
- m ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficit
- ur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce du
- usce dui l
- ultrices
- cing elit.
- m risus ante, dapibus a molestie
- facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce
- m risus ante, dapibus a molestie consequat,
- consect
- ce dui lectus, congue
- , ultrices ac mag
- consect
- sum dol