1.
All PC's, laptops and workstations must be locked when left unattended and be secured with a password-protected screen saver that has an activation timeout.
What is the maximum idle time before the activation timeout of the screen saver?
Correct Answer
C. 10 minutes
Explanation
The maximum idle time before the activation timeout of the screen saver is 10 minutes. This means that if the PC, laptop, or workstation is left unattended for 10 minutes without any activity, the screen saver will automatically activate and require a password to unlock it. This security measure ensures that unauthorized individuals cannot access the device and its contents when it is left unattended.
2.
User's are permitted to download and/or install freeware, shareware and public-domain software on a Company-provided computer.
Correct Answer
B. False
Explanation
Users are not permitted to download and/or install freeware, shareware, and public-domain software on a Company-provided computer.
3.
Copyright laws are designed to secure the exclusive rights of the author of a "creative effort" to control who can make and distribute copies or who can make works derived from their original work.
True or False?
Pacer is not concerned with copyright laws in the IT Policy.
Correct Answer
B. False
Explanation
The statement is false because Pacer is concerned with copyright laws in the IT Policy. The IT Policy would likely include guidelines and regulations regarding the use and distribution of copyrighted materials within the organization.
4.
True or False?
It is ok to store Company Data on your desktop, in My Documents or on another site such as Google Docs because it is more convenient for you.
Correct Answer
B. False
Explanation
Storing company data on personal desktops, in My Documents, or on external sites like Google Docs is not recommended because it poses security risks. Company data should be stored on secure servers or cloud platforms that are specifically designed for data storage and protection. Storing data in these unauthorized locations increases the chances of data breaches, unauthorized access, and loss of sensitive information. It is important to follow company policies and guidelines to ensure data security and compliance.
5.
True or False?
It is ok to stream media on the Company-provided Network (Radio, Videos, YouTube, etc.).
Correct Answer
B. False
Explanation
Streaming media on the Company-provided Network is not okay because it can consume a significant amount of bandwidth and can slow down the network for other users. It can also pose security risks and may violate the company's acceptable use policy. Therefore, it is not advisable to stream media on the Company-provided Network.
6.
Which of the below choices are examples of possible Social Engineering?
Correct Answer
D. All of the above
Explanation
All of the given choices are examples of possible Social Engineering. Social Engineering is a technique used by attackers to manipulate individuals into revealing sensitive information or performing actions that may compromise their security. In the first choice, the unidentified caller is attempting to deceive the user into sharing their password. In the second choice, the misspelled words or grammatical errors may be used to trick the user into thinking the email is legitimate. In the third choice, the suspicious attachments or links may lead the user to malicious websites or download malware.
7.
All Passwords must be at least 8 characters in length and contain 3 out of the 5 categories that are standard. Please select the 5 standard categories below:
Correct Answer(s)
A. Include one or more non-alpHanumeric characters (e.g. ! @ # $ %)
B. Include one or more uppercase letters (A through Z)
C. Include one or more base 10 digits (0 through 9)
E. Include one or more lowercase letters (a through z)
F. Include any Unicode character that is categorized as an alpHabetic character but is not uppercase or lowercase
Explanation
The correct answer includes the categories that are standard for creating passwords. These categories ensure that the password is strong and secure. Including one or more non-alphanumeric characters, uppercase letters, base 10 digits, lowercase letters, and any Unicode character that is categorized as an alphabetic character but is not uppercase or lowercase helps to increase the complexity of the password and make it more difficult to guess or crack. By including these categories, the password will meet the requirement of being at least 8 characters in length and containing 3 out of the 5 standard categories.
8.
You receive a suspicious email that contains a link to a website. What should you do?
ExplanationForwarding the suspicious email to
[email protected] allows the security team to investigate and take necessary actions to protect against potential threats. Deleting the email ensures that you do not accidentally click on the link or open any potentially harmful content. It is important to avoid clicking on unknown links or opening suspicious emails to protect against phishing attempts or malware.
9.
True or False?
The company owns all the data on its computing equipment and users have no expectation of privacy.
Correct Answer
A. True
Explanation
This statement is true because companies typically have policies in place that state that all data stored on company-owned computing equipment is the property of the company. Therefore, users should not expect any privacy for their personal data on these devices. This is to ensure that the company has control over its data and can protect its interests.
10.
You receive a phone call and the caller asks you for your user id and password so he can install needed software on your computer. What should you do?
Correct Answer
B. Do not give them any information and contact the Pacer Security Team immediately
Explanation
The correct answer is to not give them any information and contact the Pacer Security Team immediately. This is because it is a common tactic used by scammers to gain unauthorized access to personal information and computers. Providing them with your user id and password can lead to identity theft, unauthorized access to personal data, and potential financial loss. It is important to always be cautious and verify the identity of callers before sharing any sensitive information.
11.
Without thinking, you open an email that appears to be from a Vendor that you do business with. After opening the email, you realize that it is a phishing scam. What should you do?
Correct Answer
B. Call the Pacer Help Desk and tell them about what happened so they can scan your PC for a possible virus
Explanation
If you have mistakenly opened a phishing email, it is important to take immediate action to protect your computer and personal information. Calling the Pacer Help Desk and informing them about the incident allows them to scan your PC for any potential viruses. This step is crucial as phishing scams often aim to install malware or steal sensitive data. By seeking assistance from the help desk, you can ensure that any potential threats are identified and addressed promptly, minimizing the risk of further harm.
12.
Users may obtain a complete copy of the IT Policy Manual by:
Correct Answer
A. Visiting the UltiPro home page and looking under Information Technology
Explanation
The correct answer is visiting the UltiPro home page and looking under Information Technology. This option suggests that users can access the complete copy of the IT Policy Manual by visiting the UltiPro home page and navigating to the Information Technology section. This implies that the manual is available online and can be easily accessed by employees through the company's internal website.
13.
The security policy has been established to:
Correct Answer
D. All of the above
Explanation
The security policy has been established to ensure the protection of the company's investment in its IT systems and network, as well as to safeguard the information contained in these systems. Additionally, the policy aims to protect the good name of the company by implementing measures to prevent unauthorized access, data breaches, and other security incidents. Therefore, all of the given options are valid reasons for establishing the security policy.