Unit 5 of 5
Study guide for DSST DSST Computing and Information Technology — Unit 5: Cybersecurity and IT Ethics. Practice questions, key concepts, and exam tips.
38
Practice Questions
17
Flashcards
6
Key Topics
Try these 5 questions from this unit. Sign up for full access to all 38.
A company's IT department discovers that an employee has been using their work computer to download and share confidential company information outside of the organization. Which of the following actions should the company take first?
Answer: C — The correct answer, C, is to isolate the employee's computer from the network and conduct a thorough investigation. This is because the company needs to prevent any further breach of confidential information and gather evidence to determine the extent of the breach. Option A is incorrect because firing the employee without an investigation may be premature and could lead to legal issues. Option B is incorrect because allowing the employee to continue working could lead to further breaches. Option D is incorrect because while reminding employees of confidentiality policies is important, it does not address the immediate need to contain the breach.
A company has a new policy that requires all employees to attend a security awareness training session. The primary purpose of this training is to educate employees on how to identify and prevent which of the following types of threats?
Answer: C — The correct answer is C) Social engineering threats. Security awareness training is primarily focused on educating employees to identify and prevent social engineering threats, such as phishing, pretexting, and baiting, which exploit human psychology rather than technical vulnerabilities. Option A) Network threats is incorrect because while network threats are a concern, they are not the primary focus of security awareness training. Option B) Physical threats is incorrect because physical threats, such as theft or damage to equipment, are not typically addressed in security awareness training. Option D) Environmental threats is incorrect because environmental threats, such as natural disasters, are not directly related to the purpose of security awareness training.
A company's IT department has discovered that an employee has been accessing sensitive customer data without authorization. The employee claims they were just trying to help a customer resolve an issue, but the IT department is unsure if this is true. What should the IT department do first in this situation?
Answer: A — The correct answer is A) Conduct an investigation to determine the employee's true intentions and gather evidence. This is because the IT department needs to gather all the facts before taking any disciplinary action. Jumping to conclusions or making assumptions without evidence could lead to unfair treatment of the employee or failure to address a potential security threat. Option B is incorrect because terminating the employee without an investigation could be premature and potentially unfair. Option C is incorrect because simply giving a warning may not be sufficient if the employee has indeed violated security policies. Option D is incorrect because allowing the employee to continue accessing sensitive data without verifying their story could put the company's data at risk.
A company has a policy that all employees must lock their computers when leaving their desks. This policy is an example of which security concept?
Answer: D — The correct answer is D) Physical Security, because the policy of locking computers is aimed at preventing unauthorized physical access to the devices. Option A) Encryption is incorrect because it refers to the protection of data through algorithms. Option B) Firewalls is incorrect because it refers to network security. Option C) Access Control Lists is incorrect because it refers to controlling access to resources based on user identity.
A company's IT department has implemented a new security protocol that requires all employees to use two-factor authentication when accessing sensitive data. However, some employees are complaining that this new protocol is inconvenient and is slowing down their work. The company's security officer must balance the need for security with the need for employee productivity. What should the security officer do in this situation?
Answer: C — The correct answer, C, is the most appropriate response because it balances the need for security with the need for employee productivity. By providing training and support, the security officer can help employees adapt to the new protocol and find ways to work more efficiently. Option A is incorrect because eliminating the two-factor authentication requirement would compromise the security of the company's data. Option B is incorrect because reducing the frequency of two-factor authentication would also compromise security. Option D is incorrect because ignoring employee complaints and enforcing the requirement without adjustments would be unfair and could lead to employee dissatisfaction and decreased productivity.
DSST® is a trademark owned by Prometric, which is not affiliated with, and does not endorse, this product.