Please enter your email: 1. What is the requirement for mobile computing devices that access the Cultural Infusion network? No security measures are required Anti-malware protection is optional Firewall protection is optiona Mobile computing devices that access the network shall have active and up-to-date anti-malware and firewall protection 2. How should users with remote access privileges use their remote access connection? For work business and used in a manner consistent with their on-site connection to the Cultural Infusion network For personal use For any purpose they want None of the above 3. Who should staff contact for express written authorization to modify configurations? Chief Executive Officer Chief Financial Officer Chief Technology Officer Chief Operating Officer 4. During office hours, what should be done with confidential information when desks are left unattended? Nothing Take it with you Conceal it Shred it 5. Why are humans still the weakest link despite security training and resources? Threat actors spend their days thinking of new ways to exploit human vulnerabilities and are rewarded for their innovation. Average people do not spend all their time thinking about security and might feel powerless in preventing attacks. Cybersecurity practitioners may be the only people at their organisations who spend their workdays focused on prevention, protection and mitigation activities. All of above 6. Which one of the following describes why firewalls are used? To prevent unauthorised access by incoming transmissions. To prevent destruction of a computer in the event of a fire. To enable easy downloading of data from web sites. To detect and disable viruses already on a computer. 7. What should be done with documents or any sensitive media or classified information from printers, photocopiers, and fax machines? Leave it there Retrieve it when next convenient Conceal it Retrieve it immediately 8. What security protocols should be used with wireless network connections? No security protocols are required Wireless encrypted security and access protocols shall be used with all wireless network connections Only public network connections should be used Unsecured network connections are OK 9. Which of the following is the strongest password? starwars 1qaz2wsx trEEGCv- P@w0rd$1 10. Which of the following is the appropriate action to take if your manager asks for your password? Share your password with your manager Share your password with your manager but then change your password the next day Ignore the request and hope your manager forgets Decline the request and remind your manager that it is against company policy Loading … Question 1 of 10