FEMA IS 906 Answers 2021 [*Free Access*]


This study guide includes all the necessary information and answers for FEMA IS 906 on Workplace Security System.

Free FEMA IS 906 Answers

Course Title: FEMA IS-906: Introduction to Workplace Security Awareness

We have covered as many questions that we could find till now. Check it below:

Q. Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an unauthorized process to occur or by granting unauthorized access is known as:
A.Trojan Horse
B.Peer-to-peer Software
C.Hacking
D.Malicious Code
Ans: D.Malicious Code

Q. Vulnerability can be defined as:
A.Physical features or operational attributes that render an entity open to exploitation or susceptible to a given hazard.
B.The impact or effect of an event, incident, or occurrence
C.A natural or manmade occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property
D.The potential for an unwanted outcome resulting from an incident, event, or occurrence
Ans: A.Physical features or operational attributes that render an entity open to exploitation or susceptible to a given hazard

Q. TRUE OR FALSE: The security goals of confidentiality, availability, and integrity of data can be adversely impacted by malicious code.
A.True
B.False
Ans: B.False

Q. TRUE OR FALSE: When noticing a suspicious vehicle on the property, a responsible employee should approach the driver and ask if he/she needs assistance.
A.True
B.False
Ans: B.False

Q. TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations.
A.True
B.False
A.True

Q. Indicators of potential workplace violence:
A.Cannot usually be identified before an employee ‘snaps’ and commits a violent act
B.Can only be recognized by trained mental health experts
C.Are completely individualized and therefore impossible to protect against
D.Can often be managed and treated if recognized
Ans: D.Can often be managed and treated if recognized

Q. When addressing a suspected intruder, it is best to:
A.Attempt to shake hands with the individual, to see if the handshake is reciprocated
B.Maintain civility and trust your intuition about whether to let him or her pass
C.Use open-ended questions when asking the person the purpose of his/her visit
D.Leave it up to coworkers who know more people in the building to decide what to do
Ans: C.Use open-ended questions when asking the person the purpose of his/her visit

Q. TRUE OR FALSE: If you notice indicators of potentially violent behavior in a coworker, you must wait until you see something violent actually happen before reporting your suspicions to security personnel or human resources.
A.True
B.False
Ans: B.False

Q. When employees collect or handle personally identifiable information (PII), they should:
A.Share that information with other coworkers upon request
B.Apply the ‘need to know’ principle before disclosing PII to other personnel
C.Collect as much PII as they can at first contact with the individual to avoid having to get other data later
D.Recognize that sharing PII is often permissible if done for what one believes is the greater good of the community
Ans: B.Apply the ‘need to know’ principle before disclosing PII to other personnel

Q. Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known as:
A.Social Engineering
B.Hacking
C.Telephone Solicitation
D.Mass Marketing
Ans: A.Social Engineering

Q. Which of the following statements is NOT true about peer-to-peer (P2P) software?
A.Some P2P programs have remote-control capabilities, allowing users to take control of a computer from another computer somewhere else in the world
B.Peer-to-peer software can bypass firewall and antivirus systems by hiding activities of users, such as file transfers
C.P2P software provides direct access to another computer. Some examples include file sharing, Internet meeting, or chat messaging software
D.P2P software includes any data storage device that you can remove from a computer and take with you to a peer’s computer
Ans: D.P2P software includes any data storage device that you can remove from a computer and take with you to a peer’s computer

Q. The potential for an unwanted outcome resulting from an incident, event, or occurrence is:
A.Consequence
B.Vulnerability
C.Threat
D.Risk
Ans: A.Consequence

Q. An unlawful or unauthorized acquisition, by fraud or deceit, is known as a:
A.Theft
B.Diversion
C.Container Breach
D.Consequence
Ans: B.Diversion

Q. Controlling doors and other entrances is an example of a measure taken to address:
A.Criminal and terrorist threats
B.Access and security control threats
C.Workplace violence threats
D.Information and cyber threats
Ans: B.Access and security control threats

Q. Password procedures, information encryption software, and firewalls are examples of measures taken to address:
A.Criminal and terrorist threats
B.Workplace violence threats
C.Information and cyber threats
D.Access and security control threats
Ans: C.Information and cyber threats

 

About FEMA IS 906  “Workplace Security System” – Course Overview & Objective

FEMA IS 906 answers

IS 900 Workplace Security System providing guidance to individuals and organizations on security issues related to the workplace.

The workplace security awareness program serves the members with the right compliance and governance.

Within any pensive situation, Security awareness in the eLearning course will elevate your understanding of Incident Management systems.

The instructor-led session will arm professionals to make the right decision and ensure security and safety for their organization.

This course provides security mechanisms that safeguards tension at the workplace.

Be it a communication office, any tech building, factory floors or retail shops, construction sites, protection to security awareness at the workplace is crucial.

Employees of the organization and often the defense in charge, are a target against the threats. Serious damages are obscured in such cases of sudden attacks.

Workplace Security Awareness is a course designed to abstain the threats that jeopardize the confidentiality, probity, and capability of your workplace.

Further the economy, virtual workspace as well as computer systems are also disrupted during these hazards.

This course contains information and regulation measures for existing employees to maintain the security and ordeal of a place.

Any kind of disturbance in work spaces can limit the reputation of an organization.

 

Course Objective

At the completion of the course, the participants will be able to

  • Identify potential risks at the workplace
  • Pitch and take necessary measures to control the misplaced setup.
  • Plan measures to implement and enhance workplace security.
  • Manage and command actions to take in emergency response to the security situation.
  • Identify core competencies that obstruct the progress of workspace balance

 

Primary Audience

The National Response Framework is formulated to provide guidance for a whole range of community. Within the channel of a broad consumer, the National Response Framework focuses especially on those who are involved in delivering and applying the response core capabilities, including:

Private sector, venture capital partners, non-governmental organizations (NGOs), Government officials, Community leaders, Communication specialists, Emergency management practitioners, First responders, fire fighters, Officials, bearers, assistants in charge of bureaucrats, heads of security and protection, Retail store owners and employees.

 

Prerequisites

This course is recommended after finishing FEMA IS- 700, An Introduction to the National Incident Management System (View answers here)

 

Hope you find the right FEMA IS 906 answers. If we miss anything then please let us know through the comment box below.

Share with your friends who might be looking for the same.


Leave a Comment

Sorry! Copy-paste disabled.