Advertisement

Security Awareness Questions and Answers (Q&A)

E. Reyes, Builder
Answered: Sep 25, 2020
The most common delivery method for viruses is through email. Email is responsible for the delivery of about 94% of top malware in the world, of which viruses are part of. Also, the most common...Read More

4 Answers

2862 views
E.Ronald
Answered: Jan 03, 2018
Social engineering is not new. Authoritarian governments have used it for years by collecting information that is sensitive through illegal means by stealing identity from their victims and...Read More

1 Answer

1936 views
R. Jones, Student
Answered: Sep 21, 2020
Internet browsing can be defined as the use of a web browser to find information about certain things online without specifically looking at it. It helps the individual to be open to a new world...Read More

3 Answers

1904 views
Shmanish
Answered: Mar 31, 2017
Never email personal information
2 Report the phishing email to your organization.

4 Answers

1631 views
J. Goodman, Web Content Writer
Answered: Apr 09, 2019
Information security policies are a plan to keep an organization's date and network protected from security threats. The policy is used to analyze activity that seems suspicious, as well as from...Read More

1 Answer

1606 views
John Smith
Answered: Apr 20, 2024
Control access to your office by ensuring the door closes completely behind when entering and exiting. Ensure that no one slips in behind you When working in a public setting, prevent shoulder...Read More

1 Answer

1435 views
Itsaware
Answered: Apr 20, 2024
All of the above

All of the above. These are all common types of virus programs.

1 Answer

1295 views
John Smith
Answered: Apr 20, 2024

Social engineering

2 Answers

817 views
John Smith
Answered: Apr 20, 2024
False

False - It used to be enough for user to ignore messages from unfamiliar people, but with viruses that exploit personal and organizational distribution lists, users must also be wary...Read More

1 Answer

670 views
Cesar H. Pablo, Journalist
Answered: Jan 02, 2018
When you access your computer, you may enter data that is very important information. When you enter your social security number or credit card number into the system, you must trust the computer...Read More

3 Answers

602 views
John Adney
Answered: May 30, 2017
Report the phishing email to the legitimate company or organization that has been spoofed

2 Answers

528 views
John Smith
Answered: Apr 20, 2024

Login in front of someone

1 Answer

461 views
John Smith
Answered: Apr 20, 2024
Don’t disclose your credentials to anyone-in the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames,...Read More

1 Answer

349 views
John Smith
Answered: Apr 20, 2024
Proximity The fastest growing technology for access control applications, proximity readers continuously transmit a low-level fixed radio frequency (RF) signal that provides energy to the c...Read More

1 Answer

297 views
G.Kenneth
Answered: Jan 24, 2018
A firewall is similar to the way the word sounds. It acts as a wall inside the computer. In the real word, a firewall would be a strong wall made from materials in a building or house that...Read More

2 Answers

273 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.