C102 Computer Use (10-01-2009) Flashcards

1
Q

[C102 Computer Use]

The full explanation of the computer policy can be found where?

A

CTM website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

[C102 Computer Use]

All computer files are the property of the City of Austin and therefore are:

A

Open Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

[C102 Computer Use]

Who monitors every connection to computers?

A

CTM or Information Systems Department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

[C102 Computer Use]

Who can approve limited personal computer use?

A

Immediate Supervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

[C102 Computer Use]

How do members comply with the “Acceptable Use Policy”?

A

By participating in the networks and systems provided by the city

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

[C102 Computer Use]

What can you do to secure your account when leaving a PC for a few minutes?

A

Lock or use a screensaver password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

[C102 Computer Use]

Who is responsible for activity on each login?

A

The user logged in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

[C102 Computer Use]

Communicate data security needs of info under your purview to who?

A

Your LAN administrator, or ctm.security@ci.austin.tx.us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[C102 Computer Use]

Who should you email if you feel a server does not have adequate virus protection?

A

ctm.security@ci.austin.tx.us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

[C102 Computer Use]

Who can you give your password to?

A

NO ONE!!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

[C102 Computer Use]

Internet usage and/or email messages are not considered:

A

Personal or private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

[C102 Computer Use]

Under what act can any electronic mail be open records?

A

Texas Open Records Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

[C102 Computer Use]

How often is email backed up for a system failure event?

A

Daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

[C102 Computer Use]

What should be done if you inadvertently encounter an unauthorized site or email (3)?

A
  1. Immediately sever the connection or delete the file
  2. Notify immediate supervisor with the approximate time and duration
  3. Send an email through the chain of command to the BC level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

[C102 Computer Use]

Who can approve the installation of non-City provided hardware and/or software?

A

Department Head and CIO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

[C102 Computer Use]

This is one of the primary vectors for the transfer of malicious software:

A

Email

17
Q

[C102 Computer Use]

What 2 types of info must be encrypted if it is stored on removable media and is not physically secured?

A

Electronic Personal Health Information (EPHI) and Electronic Protected Information (EPI)

18
Q

[C102 Computer Use]

What must no be used to store EPHI or EPI?

A

Handheld devices

19
Q

[C102 Computer Use]

What is strictly prohibited for use within the City’s network infrastructure?

A

Instant Messaging protocols (AIM, Yahoo messenger)

20
Q

[C102 Computer Use]

When does a computer auto log out or lock when left idle?

A

After 15 minutes