Podcast
Questions and Answers
What is prohibited when it comes to sending emails?
What is prohibited when it comes to sending emails?
- Sending unsolicited email messages
- Harassment via email
- Unauthorized use of email header information
- Posting of 'chain letters' (correct)
What should be done prior to implementing any connection?
What should be done prior to implementing any connection?
- A risk assessment (correct)
- A security assessment
- An analysis of the Third Party
- An assessment of the Right-Hand's security policies
What must the Third Party comply with?
What must the Third Party comply with?
- The Right-Hand's security standards
- The Third Party's security standards
- The Right-Hand's security policies (correct)
- The Third Party's security policies
What should employees do when they state an affiliation to the company?
What should employees do when they state an affiliation to the company?
What should employees be aware of when using company resources to access and use the Internet?
What should employees be aware of when using company resources to access and use the Internet?
What must the Right-Hand be able to do?
What must the Right-Hand be able to do?
What must be handled in accordance with the ‘Security incident management policy and procedures’?
What must be handled in accordance with the ‘Security incident management policy and procedures’?
What type of incidents will require security awareness procedures?
What type of incidents will require security awareness procedures?
Flashcards are hidden until you start studying
Study Notes
-
Employees using company resources to access and use the Internet must be aware that they represent the company.
-
Whenever employees state an affiliation to the company, they must also clearly indicate that "the opinions expressed are my own and not necessarily those of the company".
-
Questions may be addressed to the IT Department.
-
Sending unsolicited email messages, including email spam, is prohibited.
-
Harassment via email, telephone, or paging is prohibited.
-
Unauthorized use, or forging, of email header information is prohibited.
-
The posting of "chain letters", "Ponzi" or other "pyramid" schemes of any type is prohibited.
-
Use of unsolicited email originating from within Right-Hand Cybersecurity's networks of other Internet/Intranet/Extranet service providers is prohibited.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.