5.6 User Training Flashcards

(22 cards)

1
Q

What is a best practice for providing security training?

A

Provide security training for users before they connect to the network for the first time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is specialized security training important?

A

Different security requirements exist for different departments, such as accounting and shipping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who else should receive security training besides employees?

A

Third parties such as contractors, partners, and suppliers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should be tracked regarding security training?

A

Who has been trained and who has yet to be trained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it important to document security policies?

A

To ensure they can be referenced by every user in the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can security policies be made accessible?

A

By having online access as part of the intranet and including them in employee handbooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does situational awareness entail for users?

A

Always looking for threats while performing their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should users be cautious of regarding email?

A

Email links or attachments that might be associated with phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What physical security threat should users be aware of?

A

Receiving suspicious envelopes that contain USB drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are insider threats?

A

Difficult-to-identify threats that come from within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What approach should be taken to identify insider threats?

A

A multi-factored approach with multiple approvals and active file monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should be done if there are changes in critical processes?

A

Be informed immediately of any changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is important for password management?

A

Implementing secure password strategies and standard requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can be used in a Windows environment to enforce password policies?

A

Group policy to enforce password length and complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should user training include regarding removable media?

A

Awareness of security concerns related to unknown USB drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a risk when users are not in the office?

A

Using unknown cables to charge mobile devices

17
Q

What technique do attackers often use to gather information?

A

Social engineering

18
Q

What should users learn about social engineering?

A

Common techniques and how to report them to the IT security team

19
Q

What is operational security from the attacker’s perspective?

A

Understanding security threats by interpreting them as an attacker would

20
Q

What type of data should users be aware of?

A

Sensitive data that requires additional security

21
Q

What security concern arises for users working from home?

A

Preventing family or friends from accessing work systems

22
Q

What additional security measures may be needed for remote work?

A

Endpoint security and increased security for VPN access