Homework Help: Questions and Answers: Hackers and thieves will try to exploit the following employee behaviors: Select all that apply.
a) Leaving your computer unlocked when not in use
b) Opening suspicious emails or attachments
c) Ignoring security rules and policies
d) Keeping a written password hidden somewhere around your desk
Answer:
Let’s analyze each given option to determine which employee behaviors hackers and thieves might try to exploit.
Given Options: Step by Step Answering
a) Leaving your computer unlocked when not in use
- This is definitely a behavior that hackers and thieves could exploit. An unlocked computer provides easy access to potentially sensitive information.
b) Opening suspicious emails or attachments
- This is another behavior that hackers frequently exploit. Suspicious emails and attachments often contain malware or phishing attempts.
c) Ignoring security rules and policies
- Security rules and policies are designed to protect against various threats. Ignoring them can create vulnerabilities that hackers might exploit.
d) Keeping a written password hidden somewhere around your desk
- This behavior can be exploited by thieves who gain physical access to your workspace. They could find and use your written password to access your accounts.
Final Answer:
Based on the above analysis, the correct answer is:
a) Leaving your computer unlocked when not in use
b) Opening suspicious emails or attachments
c) Ignoring security rules and policies
d) Keeping a written password hidden somewhere around your desk
All of these behaviors create security vulnerabilities that malicious actors could potentially exploit to gain unauthorized access to systems or sensitive information.
Learn More: Homework Help
Q. What layer is responsible for routing messages through an internetwork in the TCP/IP model?