Image

Please enter your email:

1. What is the requirement for mobile computing devices that access the Cultural Infusion network?

 
 
 
 

2. How should users with remote access privileges use their remote access connection?

 
 
 
 

3. Who should staff contact for express written authorization to modify configurations?

 
 
 
 

4. During office hours, what should be done with confidential information when desks are left unattended?

 
 
 
 

5. Why are humans still the weakest link despite security training and resources?

 
 
 
 

6. Which one of the following describes why firewalls are used?

 
 
 
 

7. What should be done with documents or any sensitive media or classified information from printers, photocopiers, and fax machines?

 
 
 
 

8. What security protocols should be used with wireless network connections?

 
 
 
 

9. Which of the following is the strongest password?

 
 
 
 

10. Which of the following is the appropriate action to take if your manager asks for your password?

 
 
 
 

Question 1 of 10