Initial Security Checklist
- What is your classification?
Freshman | ||
Sophomore | ||
Junior | ||
Senior | ||
Graduate Student |
- What is your major?
- What is the name of your concentration, if any (examples: Criminal Justice, Urban Affairs, etc.)?
- If HR is conducting an interview, they should not be:
Educated on various certifications | ||
Informed of the specific experiences each credential requires | ||
Provide the physical address of the organization | ||
Made aware of the qualifications of a good candidate |
- Background checks can…
Uncover past criminal behaviors | ||
Uncover information that suggest that a person can be encouraged to be a company spy | ||
All of the above | ||
None of the above |
- Which of the following is not a type of background check?
Identity check | ||
Worker compensation history | ||
Drug history | ||
Reference history
|
- __________ is the practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.
Shoulder surfing | ||
Physical hacking | ||
Tailgating | ||
Piggybacking | ||
- __________ is when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint so they can gain entry as well.
Shoulder surfing | ||
Tailgating | ||
Physical hacking | ||
Access generator | ||
- Best practices in defending against tailgating to do which of the following?
Employees should not hold badge accessed doors open for anyone that they do not know personally, and they should make sure that no one slips in behind them | ||
Employees should report to the security team any suspicious individual they observe trying to slip through any type of access control situation whether it involves badging in, signing a visitor log or checking in with security | ||
Employees should inform building maintenance or security if they find a door that does not automatically close or has a broken lock,; They should close any doors which are propped open | ||
All of the above |
- Organizations are required by law to protect which of the personal identifying facts?
Addresses | ||
Phone numbers | ||
Social security numbers | ||
All of the above
|
- Which of the following is not best practices for solutions?
Clean desk policies | ||
Turn off computers at the end of the work day | ||
Securing of classified data | ||
Temps should not be employed in sensitive areas | ||
- Have you ever completed a cybersecurity laboratory exercise for social organizational theory?
Yes
No
- Based on the answer in question 13, did the laboratory exercise help with your understanding of the cybersecurity process for bureaucratic organizations?
Very much | ||
Somewhat | ||
Very little | ||
Not at all | ||
Not applicable |