1.
Access to proprietary data on a network requires protection/restriction.
Correct Answer
A. True
Explanation
Access to proprietary data on a network requires protection/restriction because proprietary data refers to sensitive and confidential information that belongs to a specific organization or individual. Without proper protection and restriction, unauthorized individuals or entities could gain access to this data, leading to potential security breaches, data leaks, or misuse of the proprietary information. Implementing security measures such as encryption, access controls, firewalls, and user authentication helps to safeguard proprietary data from unauthorized access and maintain its confidentiality, integrity, and availability.
2.
Which of the following can constitute unauthorized use of data on company networks?
Correct Answer
E. All of the above
Explanation
Unauthorized use of data on company networks can include copying, destroying, modifying, and accessing the data without proper authorization. Each of these actions can potentially compromise the security and integrity of the data, leading to unauthorized disclosure, alteration, or loss of sensitive information. Therefore, all of the mentioned actions can constitute unauthorized use of data on company networks.
3.
Information from a third party should be treated as company information, from a security standpoint.
Correct Answer
A. True
Explanation
Information from a third party should be treated as company information from a security standpoint because it is important to ensure the confidentiality, integrity, and availability of data. Treating third-party information as company information helps to protect sensitive data and prevent unauthorized access or leaks. It also allows for consistent security measures to be applied across all data sources, reducing the risk of potential security breaches. By treating third-party information as company information, organizations can ensure that proper security protocols are in place and mitigate the potential risks associated with external data sources.
4.
Proper authentication should be enforced through?
Correct Answer
D. A & C
Explanation
Proper authentication should be enforced through password controls and changing default passwords. Password controls ensure that users create strong and unique passwords, preventing unauthorized access. Changing default passwords is important to avoid using easily guessable passwords that are commonly known. By combining these two measures, organizations can enhance their authentication practices and protect their systems and data from unauthorized access.
5.
Attempting to guess or crack a network password is considered a serious security policy violation.
Correct Answer
A. True
Explanation
Attempting to guess or crack a network password is considered a serious security policy violation because it involves unauthorized access to someone else's account or network. This action can lead to unauthorized access to sensitive information, data breaches, and potential harm to individuals or organizations. It is important to respect privacy and security policies by not engaging in any activity that compromises the integrity and confidentiality of computer networks.
6.
Third party requests for security compromising activity require?
Correct Answer
C. Prior approval
Explanation
Third party requests for security compromising activity require prior approval. This means that before any third party can engage in any activity that could potentially compromise security, they must obtain approval beforehand. This ensures that proper measures are taken to assess the potential risks and mitigate them accordingly. Without prior approval, third parties may not be allowed to proceed with their requested activities, as it could pose a threat to the security of the organization or its assets.
7.
Security "shortcuts" involving compromised security are:
Correct Answer
E. C & D
Explanation
The correct answer is C & D because security shortcuts involving compromised security are both subject to legal penalty and prohibited by company policy. This means that engaging in such shortcuts can result in legal consequences and is against the rules and regulations set by the company.
8.
Company data is an asset thus compliance with security policy is:
Correct Answer
C. Required
Explanation
Company data is considered an asset because it holds valuable information that is crucial for the operations and success of the company. Therefore, compliance with security policies is required to safeguard this asset and protect it from unauthorized access, breaches, and potential damage. Failing to comply with security policies can lead to significant risks, such as data breaches, loss of sensitive information, legal consequences, and damage to the company's reputation. Thus, it is necessary for companies to prioritize and enforce compliance with security policies to ensure the protection and integrity of their valuable data asset.
9.
Government mandates supersede company security policies.
Correct Answer
A. True
Explanation
Government mandates supersede company security policies because government regulations and laws are legally binding and have authority over any internal policies or guidelines set by a company. When a government mandate is in place, companies are required to comply with it regardless of their own security policies. This ensures that companies adhere to the minimum standards set by the government to protect sensitive information, maintain public safety, and prevent any potential threats or breaches. Therefore, government mandates take precedence over company security policies to ensure uniformity and consistency in security practices across industries and to prioritize the broader public interest.
10.
An attempt by an employee to override a network security system could be viewed as?
Correct Answer
B. Grounds for termination
Explanation
An attempt by an employee to override a network security system can be viewed as grounds for termination because it indicates a serious breach of trust and a potential threat to the organization's data and network security. Such actions demonstrate a lack of respect for company policies and can result in severe consequences, including termination of employment.