Please enter your email: 1. What should staff do to remotely connect to Cultural Infusion systems? Use any software they prefer Contact an IT admin for approved methods and software Connect without any prior approval None of the above 2. Which of the following is the strongest password? starwars 1qaz2wsx trEEGCv- P@w0rd$1 3. Someone has emailed you a Word document, how can you check this is not a malicious file? Confirm it comes from a trusted person and that their email is correct Check the file extension, a Word document will not end with .exe Download the file then right click the file and select ‘Scan for viruses’ All of the above 4. How should users with remote access privileges use their remote access connection? For work business and used in a manner consistent with their on-site connection to the Cultural Infusion network For personal use For any purpose they want None of the above 5. What can you do to help you keep track of your passwords? Use an accepted password manager Write your passwords down in a notebook Tell your password to someone you trust Use easy to remember passwords 6. What should staff not do to their mobile devices? A: Install unauthorized software/firmware B: Jailbreak or Root the device C: Both A and B D: None of the above 7. Where should Cultural Infusion files be stored on your own devices? Locally on the device On any location chosen by the user On Cultural Infusion allocated locations by the organization On a cloud-based storage service 8. What is the main reason it is important to store all work related files on the server? To save storage space on your computer To prevent the loss of important data in case your computer is lost, stolen or damaged So other employees can access your files It makes the IT department feel important to give other people pointless busywork 9. What must be done with no longer required confidential papers? Throw it away Put it in a recycling bin Store it in a safe location Shred it 10. What security protocols should be used with wireless network connections? No security protocols are required Wireless encrypted security and access protocols shall be used with all wireless network connections Only public network connections should be used Unsecured network connections are OK Loading … Question 1 of 10