1. What step(s) should be taken within your IT infrastructure when an employee is terminated? The terminated employee’s entire IT footprint should be deleted The terminated employee’s passwords should be changed 24 hours prior to termination You should request local law enforcement to sweep the terminated employee’s computer upon termination All of the above None of the above None 2. What steps should you take when sending sensitive information via email? A written policy and formal training may be necessary if sensitive information is to be distributed via email Emails need to be encrypted Under no circumstance should sensitive information should not be sent via email Both A & B None of the Above None 3. What are the dangers of having a server’s operating system in an EOL (end-of-life) state? There are no dangers, the operating system is just old but still does what I need It’s a benefit because I no longer have to update the operating systems with Windows Update Security patches are no longer available If the server fails, I will lose everything even if I have a backup because the operating system is no longer supported Both C & D None 4. What is the best step(s) that should be taken if an IT employee is terminated in addition to the normal steps when terminating an employee? Before the IT employee leaves, the terminated employee should go in and remove their access within the IT infrastructure During the exit interview, you should have them write down all passwords that they control and ask them not to share those passwords with anyone All administrator passwords should be reset the moment the employee is terminated Both A & C All of the above None 5. Choose the item that is NOT a part of a vulnerability assessment? Classify networks Identify most serious problems/vulnerabilities with your system Assign relative levels of importance to resources Calculate downtime loss in dollar amount None Name Email Time's up