HPM 40.4 (Information Security and Administration Manual) Flashcards
“Confidential Information” is exempt from disclosure under the provisions of the California Public Records Act and/or other applicable state or federal laws.
a. true
b. false
a. true
Confidential and sensitive information shall be destroyed by _____, by placing the information in a confidential destruct container, or by appropriately obliterating the confidential information in a manner that will ensure it is unattainable by others.
a. burning
b. erasing
c. using white out
d. cross-shredding
d. cross-shredding-
the connection of any personally-owned desktop/laptop computer or device(s) (e.g. printers, scanners, plotters) to the Department’s network is _____.
a. allowed for administrative purposes
b. to be approved by Division LAN Coordinator
c. strictly prohibited
d. addressed on a case by case basis
c. strictly prohibited
The Department ______ monitor and log network activity, including electronic mail activity _____ the knowledge or consent of the employee or computer user.
a. May not /With
c. May/Without
d. Should not/Without
b. May/Without
CHP employees ____ use third-party Internet e-mail providers as a means of communication
a. may
b. shall not
c. may not
d. should not
b. shall not
The Department’s email system _______ be used as a method to solicit donations for or participation in charity events, other than those which are departmentally sponsored and supported.
a. may not
b. should not
c. shall not
d. may
a. may not
If a member of the Department intends to seize a computer system or its contents, or is intending to serve a search warrant where the possibility of seizing a computer exists; a __________ should be contacted for assistance.
a. Division LAN Coordinator
b. ISU Investigator
c. Area LAN Coordinator
d. CCIU Investigator
d. CCIU Investigator
In all but the most unusual cases, the CCIU _____ take possession of seized computer items and conduct a forensic analysis
a. should
b. will
c. may
d. shall not
b. will
The _______ will respond to, assess. and defuse computer emergencies such as bonafide network break-ins major virus attacks, and system outages, and may assign any other technical resource/staff needed to mitigate incident
a. Division LAN Team
b. Academy Technology Unit
c. Computer Incident Response Team
d. Most qualified Area employee
c. Computer Incident Response Team