e SAFETY

e SAFETY

Professional Development

6 Qs

quiz-placeholder

Similar activities

Ignite 2019

Ignite 2019

Professional Development

10 Qs

Cyber Security ISA WRTD

Cyber Security ISA WRTD

Professional Development

11 Qs

Cyber Security Everything We Need To Know Quiz

Cyber Security Everything We Need To Know Quiz

Professional Development

10 Qs

ITF - Quiz 14.5 - Password Security and Management

ITF - Quiz 14.5 - Password Security and Management

Professional Development

10 Qs

Securing Source Code

Securing Source Code

Professional Development

10 Qs

Ict/cyberterrorism

Ict/cyberterrorism

KG - Professional Development

9 Qs

Data Ethics and Security

Data Ethics and Security

Professional Development

8 Qs

Power BI Service 02 - Admin

Power BI Service 02 - Admin

Professional Development

10 Qs

e SAFETY

e SAFETY

Assessment

Quiz

Computers

Professional Development

Medium

Created by

ANUROOPA KG

Used 20+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The responsible rules and behaviours designed to keep individuals safe whenever connected to the Internet is the definition of

· Cyber Security

· Cyber Ethics

· Cyber Safety

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is appropriate to post?

· A picture of something involving an address

· Your location

· A picture of your dog

· Your phone number

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is not a benefit of

BYOD?

· Viruses and security issues.

· Familiarity.

· Ownership.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should an effective security

policy include?

An overview of corporate and IT goals and objectives.

Definitions of what information is sensitive and who should have access to it.

A detailed description of VPN operations and support procedures.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym AUP stand for?

Acceptable Use Policy

Acceptable User Practices

Allowed User Practices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name would you give to an email attachment that may harm your computer?

Phishing

Spam

Malware