FEMA IS 906 Workplace Security Awareness

fema is 906 test answers

The study guide containing course notes to IS 906 Workplace Security Awareness and the FEMA IS 906 test answers.

Course Overview

This course provides guidance to individuals and organizations on how to improve the security in your workplace. No workplace—be it an office building, construction site, factory floor, or retail store—is immune from security threats.

Employees are often the target of these threats as well as the organization’s first line of defense against them. Threats endanger the confidentiality, integrity, and security of your workplace, as well as your virtual workplace and computer systems. This course presents information on how employees can contribute to your organization’s security.

Course Objectives:

Upon completing this course, the participant will be able to:

  1. Identify potential risks to workplace security.
  2. Describe measures for improving workplace security.
  3. Determine the actions to take in response to a security situation

Primary Audience

All private-sector and public-sector employees.

From IS-906: Workplace Security Awareness

 

Example Questions

Vulnerability can be defined as:




When addressing a suspected intruder, it is best to:




When employees collect or handle personally identifiable information (PII), they should:




An unlawful or unauthorized acquisition, by fraud or deceit, is known as a:
A. Consequence
B. Diversion
C. Theft
D. Container Breach

When addressing a suspected intruder, it is best to:
A. Leave it up to coworkers who know more people in the building to decide what to do.
B. Maintain civility and trust your intuition about whether to let him or her pass.
C. Attempt to shake hands with the individual, to see if the handshake is reciprocated.
D. Use open-ended questions when asking the person the purpose of his/her visit.

Indicators of potential workplace violence:
A. Can often be managed and treated if recognized.
B. Can only be recognized by trained mental health experts.
C. Cannot usually be identified before an employee ‘snaps’ and commits a violent act.
D. Are completely individualized and therefore impossible to protect against

Which of the following statements is NOT true about peer-to-peer (P2P) software?
A. P2P software includes any data storage device that you can remove from a computer and take with you to a peer’s computer.
B. Peer-to-peer software can bypass firewall and antivirus systems by hiding activities of users, such as file transfers.
C. Some P2P programs have remote-control capabilities, allowing users to take control of a computer from another computer somewhere else in the world.
D. P2P software provides direct access to another computer. Some examples include file sharing, Internet meeting, or chat messaging software.

Related Courses

FEMA IS 907 Active Shooter: What You Can Do

Share me for a discount 🙂

Simply share this and a discount will be applied to your purchase at checkout.