This free survey is powered by
Create a Survey
Surveys
2013
June
S
Security Testing
Security Testing
HAMILTON TELECOMMUNICATIONS
SECURITY TRAINING TEST
0%
Exit Survey
Report any incident of possible misuse or violation of the security polices and precedures to your co-workers.
True
False
Non-standared hardware or Freeware software can be installed on your computer if it is approved by NSC-IT management
True
False
You are able to copy the software that you use on a daily basis to use on a personal computer
True
False
Home-based Hamilton computers are exempt from the policies that apply to computers used within the Hamilton facilities.
True
False
Referring to the Password Policy, user authentication is used to control access to Information Resources. What factors can be used to authenticate a User? (mark all the apply)
Password
PIN Number
Hand Scan
All of the above
None of the above
Again, referring to the Password policy, all passwords must be constructed and implemented according to which of the following rules? (mark all that apply)
It must be routinely changed
It must include your social security number of birth date
It must be at least 6 characters long
It must be a combination of alpha and numerical characters with one or more alpha character capitalized
You may use your Hamilton email account for conducting personal business.
True
False
You may use your Hamilton email account for the purpose of political lobbying or campaigning, if it is authorized by appropriate management and performed on behalf of Hamilton.
True
False
It is against Hamilton's email policy to send or forward chain letters.
True
False
You can only send or forward emails that are virus free.
True
False
Loading...
close
Loading...
Close
qprun1.questionpro.net