Information Technology

IT Cybersecurity Tutorial

Question #1

I should report any policy violations, destruction of data/information or equipment, and other security problems to the IT Help Desk.

a. True

b. False

Answer: True

All users are expected to act in a responsible, ethical, and lawful manner when accessing the college’s information technology resources. The college’s information technology resources are provided for use in conducting authorized college business. Using these resources for personal gain, illegal, or obscene activities is prohibited.

Question #2

Which is the best way to protect the sensitive data in your computer when you step away from your desk?

a. Lock your computer with password (Windows key + L) 

b. Turn off the monitor

c. Place a blanket over the screen

d. Close all programs