|
|
4
|
Listening in on conversations to glean information
|
8
|
Being aware of what's on your desk
|
10
|
Sifting through trash to find important information
|
11
|
Beware of probing, pushy, or threatening ________
|
12
|
Information that contains important personal details
|
14
|
An email warning of a malware threat
|
15
|
Pretending to be someone you're not
|
16
|
Only download software from __________, reputable businesses
|
|
|
|
|
1
|
Having a authorized person allow you to pass through a secure door
|
2
|
Using the phone to ry to get important information
|
3
|
Take your ____
|
5
|
Standing behind someone to view their screen or watch what they type
|
6
|
Leaving an malware infected flash dive in an easily found location
|
7
|
Following someone into a restrcited area without their consent
|
9
|
Sending a fake email pretending to be from a trusted source
|
13
|
Creating an invented scenario to convince someone to take an action
|
|
|