1. Three of the biggest threats to protected information are the telephone, fax machine, and e-mail.

TRUE or FALSE

 

2. Your voice mail is set up so that other people in your office cannot listen to your voice mail messages.

TRUE or FALSE

 

3. Your participation in Internet chat rooms, message boards, or news groups may be a security concern.

TRUE or FALSE

 

4. Social engineering is the scientific discipline that studies how people interact with computers, including how to make computers easier to use and how to prevent some of the human failures that hackers exploit to break into computer networks.

TRUE or FALSE

 

5. If your office is bugged, and the bugging is done properly, you won't notice any indication of it.

TRUE or FALSE

 

6. The voice encryption used with the STU-III secure telephone is virtually unbreakable given the current state of knowledge and technology.

TRUE or FALSE

 

7. As cellular phone use increases and more signals are transmitted, it becomes more difficult for an eavesdropper to sort through all the signals to identify and monitor calls to or from any single phone number.

TRUE or FALSE

 

8. E-mail is no more secure than sending a postcard through the mail.

TRUE or FALSE

 

9. Downloading and storing computer files of a sexual nature on your office computer is not just a misuse of government property. It may be prosecuted as a felony offense.

TRUE or FALSE

 

10. A secure password for access to your computer network is one that has at least eight letters.

TRUE or FALSE