The study guide containing course notes to IS 906 Workplace Security Awareness and the FEMA IS 906 test answers. This course will provide guidance to individuals/organizations on how to improve workplace security. Organizations today employ several different security measures to reduce risk such as gates, barriers, and obstructions. Most importantly however, it’s important for all employees to be vigilant for any unusual activity that could threaten security. By the end you will be able to determine kinds of behaviors and activities that will look suspicious. You might also want to check out our FEMA IS 450 Answers Guide and FEMA IS 907 Answers Guide.

Course Overview This course provides guidance to individuals and organizations on how to improve the security in your workplace. No workplace—be it an office building, construction site, factory floor, or retail store—is immune from security threats. Employees are often the target of these threats as well as the organization’s first line of defense against them. Threats endanger the confidentiality, integrity, and security of your workplace, as well as your virtual workplace and computer systems. This course presents information on how employees can contribute to your organization’s security. Course Objectives: Upon completing this course, the participant will be able to: Identify potential risks to workplace security. Describe measures for improving workplace security. Determine the actions to take in response to a security situation Primary Audience All private-sector and public-sector employees. From IS-906: Workplace Security Awareness

Example Questions & FEMA IS 906 Answers

Vulnerability can be defined as:

A. The impact or effect of an event, incident, or occurrence.

B. The potential for an unwanted outcome resulting from an incident, event, or occurrence.

C. Physical features or operational attributes that render an entity open to exploitation or susceptible to a given hazard.

D. A natural or manmade occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property.

When addressing a suspected intruder, it is best to:

A. Maintain civility and trust your intuition about whether to let him or her pass.

B. Leave it up to coworkers who know more people in the building to decide what to do.

C. Attempt to shake hands with the individual, to see if the handshake is reciprocated.

D. Use open-ended questions when asking the person the purpose of his/her visit.

When employees collect or handle personally identifiable information (PII), they should:

A. Apply the ‘need to know’ principle before disclosing PII to other personnel.

B. Recognize that sharing PII is often permissible if done for what one believes is the greater good of the community.

C. Share that information with other coworkers upon request.

D. Collect as much PII as they can at first contact with the individual to avoid having to get other data later

An unlawful or unauthorized acquisition, by fraud or deceit, is known as a:

A. Consequence

B. Diversion

C. Theft

D. Container Breach

Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as:

A. Malicious Code

B. Hacking

C. Trojan Horse

D. Peer-to-peer Software

When addressing a suspected intruder, it is best to:

A. Leave it up to coworkers who know more people in the building to decide what to do.

B. Maintain civility and trust your intuition about whether to let him or her pass.

C. Attempt to shake hands with the individual, to see if the handshake is reciprocated.

D. Use open-ended questions when asking the person the purpose of his/her visit.

Indicators of potential workplace violence:

A. Can often be managed and treated if recognized.

B. Can only be recognized by trained mental health experts.

C. Cannot usually be identified before an employee ‘snaps’ and commits a violent act.

D. Are completely individualized and therefore impossible to protect against

Which of the following statements is NOT true about peer-to-peer (P2P) software?

A. P2P software includes any data storage device that you can remove from a computer and take with you to a peer’s computer.

B. Peer-to-peer software can bypass firewall and antivirus systems by hiding activities of users, such as file transfers.

C. Some P2P programs have remote-control capabilities, allowing users to take control of a computer from another computer somewhere else in the world.

D. P2P software provides direct access to another computer. Some examples include file sharing, Internet meeting, or chat messaging software.

Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known as:

A. Mass Marketing

B. Telephone Solicitation

C. Social Engineering

D. Hacking

Password procedures, information encryption software, and firewalls are examples of measures taken to address:

A. Access and security control threats.

B. Information and cyber threats.

C. Criminal and terrorist threats.

D. Workplace violence threats.

Controlling doors and other entrances is an example of a measure taken to address:

A. Information and cyber threats.

B. Workplace violence threats.

C. Criminal and terrorist threats.

D. Access and security control threats.

The potential for an unwanted outcome resulting from an incident, event, or occurrence is:

A. Risk

B. Threat

C. Consequence

D. Vulnerability

TRUE OR FALSE: The security goals of confidentiality, availability, and integrity of data can be adversely impacted by malicious code.

A. True

B. False

TRUE OR FALSE: If you notice indicators of potentially violent behavior in a coworker, you must wait until you see something violent actually happen before reporting your suspicions to security personnel or human resources.

A. True

B. False

TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations.

A. True

B. False

TRUE OR FALSE: When noticing a suspicious vehicle on the property, a responsible employee should approach the driver and ask if he/she needs assistance.

A. True

B. False

Related Courses

https://femacourses.com/downloads/fema-is-907-active-shooter-what-you-can-do/