Why is it important to have a good understanding of Information Security policies and procedures?
Helps protect individuals from being victims of security incidents.
Provides an understanding of steps to follow in the event of a security incident.
Helps to understand levels of responsibility.
All of the above
Which of the following is a good way to create a password?
Your children's or pet's names
Using look-alike substitutions of numbers or symbols
A combination of upper and lowercase letters mixed with numbers and symbols
Using common names or words from the dictionary
What is the most common delivery method for viruses?
Email
USB Drives
Instant Message
Internet download
When receiving an email from an unknown contact that has an attachment, you should:
Open the attachment to view its contents
Report to reportphising@globalsign.com & delete the email
Forward the email to your co-workers to allow them to open the attachment first
Forward the email to your personal email account so you can open it at home