Podcast
Questions and Answers
True or false: The purpose of this policy is to protect networks and information processing facilities from malicious software.
True or false: The purpose of this policy is to protect networks and information processing facilities from malicious software.
True
True or false: The policy includes only information processing facilities and excludes mobile computing devices.
True or false: The policy includes only information processing facilities and excludes mobile computing devices.
False
True or false: Approved anti-virus software must be installed and kept current on all systems and devices.
True or false: Approved anti-virus software must be installed and kept current on all systems and devices.
True
True or false: Files received from external networks must be checked for malicious software after use or distribution.
True or false: Files received from external networks must be checked for malicious software after use or distribution.
Signup and view all the answers
True or false: The IT Security Manager is responsible for ensuring a suitable anti-virus solution is in place and promoting awareness of virus threats.
True or false: The IT Security Manager is responsible for ensuring a suitable anti-virus solution is in place and promoting awareness of virus threats.
Signup and view all the answers
True or false: Users have no responsibilities related to anti-virus protection.
True or false: Users have no responsibilities related to anti-virus protection.
Signup and view all the answers
True or false: Third-party vendors are not required to provide updates and support for anti-virus software.
True or false: Third-party vendors are not required to provide updates and support for anti-virus software.
Signup and view all the answers
True or false: Anti-virus software must only reactively scan for viruses and does not need to be actively running.
True or false: Anti-virus software must only reactively scan for viruses and does not need to be actively running.
Signup and view all the answers
True or false: Files received from sources outside the trusted network do not need to be checked for viruses before being connected to the network.
True or false: Files received from sources outside the trusted network do not need to be checked for viruses before being connected to the network.
Signup and view all the answers
Study Notes
Anti-virus and Malicious Code Policy
- The purpose of this policy is to protect networks and information processing facilities from malicious software.
- The policy includes all information processing facilities and mobile computing devices under the control of the company.
- Approved anti-virus software must be installed and kept current on all systems and devices.
- Files received from external networks must be checked for malicious software before use or distribution.
- The IT Security Manager is responsible for ensuring a suitable anti-virus solution is in place and promoting awareness of virus threats.
- Users have responsibilities such as being cautious with unsolicited or suspicious emails and not downloading unauthorized software.
- Third party vendors must provide updates and support for anti-virus software.
- Anti-virus software must proactively and periodically scan for viruses and be actively running.
- Files received from sources outside the trusted network must be checked for viruses before being connected to the network.
- Workstations, laptops, and servers all require anti-virus protection.
- Laptops may need alternative arrangements for obtaining virus definition updates when operated away from the trusted network.
- Different anti-virus solutions should be used for network gateway and email content scanning.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge about the policy guidelines for protecting networks and information processing facilities from malicious software, including the installation and maintenance of anti-virus software, responsibilities of users, and third-party vendor support.