새 텍스트 문서

You might also like

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 3

How do you recongnise a phishing email?

Impersonal form of address, e.g. Dear customer.


The link does not use https, only the unencrypted http.
You are requested to do something immediately.

Should you activate automatic update functions at home?

Yes, automatic updates ensure that the software is always up-to-date in terms of
security.
Yes, updates prevent vulnerabilities being exploited for further attacks.

How can you increase your security when surfing the internet?

I can avoid dubious and suspicious websites.


I can use an up-to-date virus scanner.
I can surf with user rights only.

What are the risks associated with public cloud services?

Providers reserve the right to analyse saved information.


Information can get into the wrong hands.

Who classifies information?

Its originator. He/she determines the confidentiality class to which the


information belongs.

Which statements apply to sensitive information?

It should always be marked as such.


Such information may only be stored on mobile devices in encrypted form.

Which statements about the 'need to know' principle are correct?

Each person is given only the information required to complete the task.

What is a typical feature of a social engineering attack?

You receive an urgent email request to log on to a website that you have never
visited before.
A caller purports to ve from IT and says that he/she needs your password urgently
because of an emergency.

How can you protect confidential documents that are in paper form?
I lock the documents away or lock my office.

How can you lock your PC?

With the key combination CTRL-ALT-DEL followed by the ENTER key.


with the Windows key and L for 'lock'.

You are working on your laptop at the airport. What should you do to protect
yourself?

Use privacy film or do not work on any sensitive information.


Never leave the laptop unattended.

On a busy train, a collegue wants to discuss an internal company problem. How do


you react?

I suggest continuing the discussion later in private.

Which statement about using WLAN is correct?

In some cases, WLANs are deliberately falsified so that mobile devices can log on
and their data can be read.
Switch WLAN off when you do not need it.

How can you safeguard your user profile on social networks?

I use the security settings for privacy on my profile.


I only accept reauests from people I really know.

How can you put our company at risk through social networks?

By using the same usename and the same password on social networks as at work.
By revealing information about the structures or departments in our company.

You discover a negative comment about our company on a social network. What do you
do?

I notify our Corporate Comminications.

You might also like