Q: Which of the following are secure options for disposing of confidential documents?
Either shred the documents in a shredder or take them home to burn in your fireplace
Either shred the documents or store the documents in locked cabinets
Either shred the documents in a shredder or dispose of them in secure bins designed for collecting sensitive data
Q: If you notice a person does not have proper identification, which of the following steps would be the best action to take?
Apprehend the individual
Report it to the help desk the next time you speak with them
Escort them to the front desk or security
Q: Which of the following is an example of a physical security attack?
A cyber attacker monitors the Wi-Fi network you are connected to in order to steal your data.
Malware hacks into your computer while you are browsing online.
An attacker pretends to be a package deliveryman to gain access to our facilities.