COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You find a document at the printer with ITAR markings in the Header and Footer. You should:
A
Leave it in the printer. The person will be by shortly
B
Read the document while yours prints out
C
Bring the document to Corporate Security and explain the situation to them
D
None of the above
Explanation: 

Detailed explanation-1: -International Traffic in Arms Regulations (ITAR) establishes controls regarding the export and import of defense-related items and services that appear on the United States Munitions List (USML). ITAR is meant to limit access to specific technologies and their associated data resources.

Detailed explanation-2: -At the Export Compliance Training Institute, we field questions every day about the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) export control regulations.

Detailed explanation-3: -The survey asked “Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called…” The correct answer is “Ransomware”.

Detailed explanation-4: -The ITAR regulates the manufacture, sale, distribution and export of defense-related articles and services, whereas the EAR regulates the manufacture, sale, distribution and export of commercial and dual-use items, technology and information not already covered by ITAR.

There is 1 question to complete.