HPM 40.4 (Information Security and Administration Manual) Flashcards

1
Q

“Confidential Information” is exempt from disclosure under the provisions of the California Public Records Act and/or other applicable state or federal laws.

a. true
b. false

A

a. true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidential and sensitive information shall be destroyed by _____, by placing the information in a confidential destruct container, or by appropriately obliterating the confidential information in a manner that will ensure it is unattainable by others.

a. burning
b. erasing
c. using white out
d. cross-shredding

A

d. cross-shredding-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the connection of any personally-owned desktop/laptop computer or device(s) (e.g. printers, scanners, plotters) to the Department’s network is _____.

a. allowed for administrative purposes
b. to be approved by Division LAN Coordinator
c. strictly prohibited
d. addressed on a case by case basis

A

c. strictly prohibited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Department ______ monitor and log network activity, including electronic mail activity _____ the knowledge or consent of the employee or computer user.
a. May not /With

c. May/Without
d. Should not/Without

A

b. May/Without

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CHP employees ____ use third-party Internet e-mail providers as a means of communication

a. may
b. shall not
c. may not
d. should not

A

b. shall not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Department’s email system _______ be used as a method to solicit donations for or participation in charity events, other than those which are departmentally sponsored and supported.

a. may not
b. should not
c. shall not
d. may

A

a. may not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a member of the Department intends to seize a computer system or its contents, or is intending to serve a search warrant where the possibility of seizing a computer exists; a __________ should be contacted for assistance.

a. Division LAN Coordinator
b. ISU Investigator
c. Area LAN Coordinator
d. CCIU Investigator

A

d. CCIU Investigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In all but the most unusual cases, the CCIU _____ take possession of seized computer items and conduct a forensic analysis

a. should
b. will
c. may
d. shall not

A

b. will

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The _______ will respond to, assess. and defuse computer emergencies such as bonafide network break-ins major virus attacks, and system outages, and may assign any other technical resource/staff needed to mitigate incident

a. Division LAN Team
b. Academy Technology Unit
c. Computer Incident Response Team
d. Most qualified Area employee

A

c. Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly