End-user awareness training for handling sensitive pers…
End-user awareness training for handling sensitive personally identifiable information would include secure
storage and transmission of customer:
Which of the following type of training would prevent A…
Ann, a technician, received a spear-phishing email asking her to update her personal information by clicking the
link within the body of the email.
Which of the following type of training would prevent Ann and other employees from becoming victims to such
attacks?
Which of the following will accomplish this task securely?
Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is
worried about the confidentiality of the information. Which of the following will accomplish this task securely?
Which of the following is the BEST reason to provide us…
Which of the following is the BEST reason to provide user awareness and training programs for organizational
staff?
Which of the following would BEST prevent this from occ…
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while
connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered connection and
corporate data is stolen. Which of the following would BEST prevent this from occurring again?
The method to provide end users of IT systems and appli…
The method to provide end users of IT systems and applications with requirements related to acceptable use,
privacy, new threats and trends, and use of social networking is:
Which of the following provides the BEST level of secur…
Human Resources (HR) would like executives to undergo only two specific security training programs a year.
Which of the following provides the BEST level of security training for the executives? (Choose two.)
Which of the following should Sara immediately implement?
Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the
cipher locks of secure areas in the building.
Which of the following should Sara immediately implement?
Which of the following would be MOST effective in reduc…
After a number of highly publicized and embarrassing customer data leaks as a result of social engineering
attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another
data leak. Which of the following would be MOST effective in reducing data leaks in this situation?
which of the following points in an incident should the…
The security officer is preparing a read-only USB stick with a document of important personal phone numbers,
vendor contacts, an MD5 program, and other tools to provide to employees. At which of the following points in
an incident should the officer instruct employees to use this information?