Which of the following is true about personally identifiable information (PII) -
ANSWER
Which steps should you take before disclosing sensitive information? Select all
that apply.
Check if the information is sensitive.
Verify the identity of the person requesting the information.
Stop and think before providing the information. - ANSWER Check if the
information is sensitive.
Verify the identity of the person requesting the information.
Stop and think before providing the information.
Which of the following are good practices when making passwords? Select all
that apply. - ANSWER Never reusing the same password.
Using a random phrase with numbers and special characters.
You receive the following email:
Hello,
I work as an accountant on the Public Safety Finance team. I need to take a look
at the expense reports for last quarter; could you share that with me?
Thanks in advance,John
What should you do? Select all that apply. - ANSWER Confirm that you have
the authority to share this information.
Check to see if the information is sensitive before sending it.
Verify the requesting party is who they claim to be.
Submit
Which of the following is a clue that a phone call may be a voice phishing
attack? - ANSWER They request your banking information.
Why would a hacker want to attack an organization?
To spy on it
ANSWER
Which steps should you take before disclosing sensitive information? Select all
that apply.
Check if the information is sensitive.
Verify the identity of the person requesting the information.
Stop and think before providing the information. - ANSWER Check if the
information is sensitive.
Verify the identity of the person requesting the information.
Stop and think before providing the information.
Which of the following are good practices when making passwords? Select all
that apply. - ANSWER Never reusing the same password.
Using a random phrase with numbers and special characters.
You receive the following email:
Hello,
I work as an accountant on the Public Safety Finance team. I need to take a look
at the expense reports for last quarter; could you share that with me?
Thanks in advance,John
What should you do? Select all that apply. - ANSWER Confirm that you have
the authority to share this information.
Check to see if the information is sensitive before sending it.
Verify the requesting party is who they claim to be.
Submit
Which of the following is a clue that a phone call may be a voice phishing
attack? - ANSWER They request your banking information.
Why would a hacker want to attack an organization?
To spy on it