Front | Back |
Data calssification systems vary by the organization, but a common scheme classifies documents as ______, ______, ______ and ______.
|
1) public
2) internal use only
3) highly confidential
4) top secret
|
What is the purpose of a data classification system for an organization?
|
Using a classification scheme enables employees such as techs to know very quickly what to do with documents, drives containing documents, and more.
|
What does "compliance" mean in terms of an organization's data security?
|
It means that members of an organization or company must abide by or comply with all of the rules that apply to the organization or company.
|
From a technician's point of view, the most common compliance issues revolves around ______, such as what sort of __________.
|
1) software
2) software users can be allowed to install on their computers.
|
______ keeps technical support calls down and enables techs to focus on more serious problems.
|
Compliance
|
Controlling access to programs, data, and other computing resources is the key to securing your system. Access control includes four interlinked areas requiring your attention: _____; ____; ____; ______
|
1) physical security
2) authenticiation
3) users and groups
4) secuirty policies
|
List three preventative methods by which every user can prevent their data from being compromised.
|
1) store computers with sensitive data in locked rooms
2) never walk away from a computer while logged in
3) log out or lock the computer by pressing WINDOWS LOGO KEY-L
|
Types of malware include ____, ____, ____, ____, ____ - all of which can wreak havoc on your system.
|
1) grayware
2) spam
3) virsuses
4) Trojan horses
5) worms
|
Irritating Web browser probelms include _____; _____ and _____.
|
1) pop-ups
2) spyware
3) adware
|
Many ____ remove the navigation aids from the browser window or mimic Windows dialog boxes.
|
Pop-ups
|
List two methods to safely close a pop-up.
|
1) right-click the pop-up's taskbar icon and choose Close
2) press ALT-TAB until the pop-up window is active and then press ALT-F4 to close it
|
______ can use your computer's resources to run distributed computer applications, capture keystrokes to steal passwords, or worse. It typically disguises itself as a useful utility, so be vigilant about what you install.
|
Spyware
|
Some spyware can be removed via ___1___, but for subborn spyware, use a ___2___ such as ___3___ or ____4____.
|
1) Add or Remove Programs
2) third-party tool
3) Lavasoft's Ad-Aware
4) Pepi MK's Spybot Search & Destroy
|
What is spam and what is the first step to preventing your email address from receiving it?
|
Spam is unsolicited email. The best way to prevent spam in your email acccount is to never post your email address on the Internet; over 97 percent of spam comes from email addresses posted online.
|
What are spam filters?
|
Spam filters can block spam at the mail server or at your computer.
|