Security Awareness Survey Question Title * 1. What is FERPA? A federal law that protects the privacy of education records An organization that promotes stronger password standards An organization that deters the use of fur products A federal law that controls Agency use of FBI encryption procedures Question Title * 2. What is Personally Identifiable Information? The student's name The student's SSN A student's date and place of birth All of the above Question Title * 3. Which is the strongest password? longhorn LONGhorn TeoTauy*8 password123 Question Title * 4. Agency policy requires electronic data classified as "Confidential" to be encrypted. True False Question Title * 5. Only employees that have a business need to view _______ should be given access to it. Public information Confidential data Board agenda Agency policies Question Title * 6. A email tells me my email is about to expire and has a suspicious link, this is most likley... SPAM Phishing A legitimate help desk request A 419 scam Question Title * 7. You can secure your computer when you step away from your desk by: Turning off your monitor Turning off your computer Using "Windows button + L" Covering the screen with post-it notes Question Title * 8. The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? Call your co-workers over so they can see Disconnect your computer from the network Unplug your mouse Tell your supervisor Turn your computer off Run anti-virus All of the above Question Title * 9. Your supervisor is very busy and asks you to log into the HR Server using her user-ID and password to retrieve some reports. What should you do? It’s your boss, so it’s okay to do this. Ignore the request and hope she forgets. Decline the request and remind your supervisor that it is against THECB policy. Question Title * 10. Data Loss Prevention (DLP) is a strategy and control for ensuring end user do not sent ______ data outside the corporate network? sensitive mp4 avi mp3 Question Title * 11. What is the most common delivery method for viruses? Email Internet download Portable media All Of The Above Question Title * 12. When receiving an email from an unknown contact that has an attachment, you should: Open the attachment to view its contents Delete the email and report to IT Security Forward the email to your co-workers to allow them to open the attachment first Forward the email to your personal email account so you can open it at home Question Title * 13. Why is it important to have a good understanding of Information Security policies and procedures? Helps protect individuals from being victims of security incidents. Provides an understanding of steps to follow in the event of a security incident Helps to understand levels of responsibility All of the above Question Title * 14. Select the three goals of the information security program: Confidentiality Integrity Availability Compliance Perseverance Question Title * 15. In computer security, this describes a non-technical kind of intrusion that relies heavily on human interaction. It often involves tricking people into breaking their own security procedures. Cyberterrorism Debugging Hijacking Nonrepudiation Social Engineering Question Title * 16. LAN Access Agreement RenewalYou must read the following statements and agree to this THECB LAN Access Agreement renewal. I understand that the agency monitors internet use and violation of agency internet policies can result in termination. I understand that the THECB LAN Access Agreement has requirements for privacy, security and copyright protection. I understand that information entrusted to the Agency is protected by FERPA and I will not disclose those records without owner approval. I agree Question Title * 17. Please enter your network username to receive credit for this test: Submit