Training end users to assist in the IR process includes teaching them to use good information security practices. List five tasks that an end user can do to prevent attacks on the desktop.
What will be an ideal response?
Tasks include:
Keeping your antivirus software up to date
Using spyware detection software
Working with system administrators to keep operating system and applications up to date with patches and updates
Not opening suspect e-mail attachments
Avoiding social engineering attacks by not providing critical information over the phone or through e-mail to untrusted sources
Not downloading and installing unauthorized software or software from untrusted sources
Protecting passwords and classified information
You might also like to view...
The main symptom of mastitis-metritis-agalactia (MMA) is _____
a. agitation c. herd stress b. anxiousness d. lack of milk
A common position sensor used to monitor linear or rotary motion is the ____.
A. solenoid B. potentiometer C. amplifier D. rectifier
What is the name of the style of piston skirt that is cut away on the sides to allow clearance for the crankshaft counterweights?
What will be an ideal response?
Technician A says that CJ-4 diesel engine lubricating oil is backward compatible with all previous diesel engine lube oil classifications. Technician B says that the digit 4, in CJ-4 means that the oil is suitable for 4-stroke cycle use. Who is right?
A. Technician A only B. Technician B only C. Both A and B D. Neither A nor B