Test Your Remote computer services IQ: How Do You Rate?

Friday, July 11, 2008

Your company maintains a top-notch information security program. To capitalize on this strength, your marketing manager wants to build an ad campaign promoting your airtight information security. Your company is in an information-intensive industry, so this might lead to a competitive advantage with little downside. True or False?

Information security is a dynamic field and, although [many] professionals have become much savvier on the subject, keeping track of the latest best practices can be a daunting task. How current are you? Take this quiz on information security basics to find out.

1. Because no single antivirus program can protect against all viruses, you can enhance protection by installing several different antivirus programs from trusted vendors. True or False?

2. Your company maintains a virtual private network (VPN) that allows off-site employees to connect to the company network via the Internet. The VPN uses the latest and most secure encryption available, encoding all data from the Remote computer services all the way to the office server. By loading the VPN software on public remote computers, like those at hotel business centers, you can transact sensitive and confidential business over your company network with a high level of confidence in the security. True or False?

3. Wired Equivalent Privacy (WEP) encryption on Wi-Fi networks, which was cracked several years ago, should be avoided at all costs. True or False?

4. Using Wi-Fi Protected Access (WPA) encryption and media access control (MAC) address filtering on your Wi-Fi access point does not provide sufficient protection for transacting sensitive and confidential business via the Internet from your wireless device or remote computer. True or False?

5. You receive an e-mail from your company's IT administrator warning that a new security hole has been discovered in your corporate software. The e-mail provides a link to a patch site and directs you to download and install a patch to plug the vulnerability. Before clicking on the link and installing the patch, you should verify the legitimacy of the e-mail. True or False?

6. Your company maintains a top-notch information security program. To capitalize on this strength, your marketing manager wants to build an ad campaign promoting your airtight information security. Your company is in an information-intensive industry, so this might lead to a competitive advantage with little downside. True or False?

7. A trusted IT employee quits the company in a huff. Security escorts him off the premises. To prevent potential mischief, you immediately eliminate the employees login IDs and passwords from the company information systems and disable all other access to company premises, such as his door keycard and security pass. You and the company can breathe easily. True or False?

source : newsfactor.com/news/Test-Your-Information-Security-IQ/story.xhtml?story_id=021000Q2H0VF

0 comments: