BTEC DIT - C3 - B3 - Policy

BTEC DIT - C3 - B3 - Policy

11th Grade

9 Qs

quiz-placeholder

Similar activities

7 OCR GCSE Computer Science - System Software

7 OCR GCSE Computer Science - System Software

10th - 11th Grade

10 Qs

DRP CSF

DRP CSF

1st Grade - University

7 Qs

Computer Software Prep 2

Computer Software Prep 2

9th - 12th Grade

10 Qs

1.2.8 - Starter Task/Systems Development Life Cycle

1.2.8 - Starter Task/Systems Development Life Cycle

11th Grade

10 Qs

Grade 11 CAT Quiz Module 1.3

Grade 11 CAT Quiz Module 1.3

11th Grade

14 Qs

 Computing Revision JCG

Computing Revision JCG

KG - University

14 Qs

Segurança Digital

Segurança Digital

9th - 12th Grade

12 Qs

Secondary storage

Secondary storage

9th - 11th Grade

10 Qs

BTEC DIT - C3 - B3 - Policy

BTEC DIT - C3 - B3 - Policy

Assessment

Quiz

Computers

11th Grade

Medium

Created by

J Sharp

Used 48+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of policy might contain the following:

Staff cannot use the computers for personal shopping

Email

Internet usage

Software

Personal Devices

Backup

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of policy might contain the following:

Must use 6 characters, including at least 1 number

Email

Internet usage

Passwords

Personal Devices

Backup

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of policy might contain the following:

Must be approved via the IT support team before being installed

Email

Internet usage

Software

Personal Devices

Backup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of policy might contain the following:

Must be completed twice a day, before and after work hours

Email

Internet usage

Software

Personal Devices

Backup

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the strongest password?

Portsmouth1

PoRtSm0uTH1!

MfFt1PfC!

MfFtiPFC!

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these are types of disaster which should be included in a disaster recovery policy?

(SELECT MORE THAN ONE ANSWER)

Cyber Attack

Coffee Spill

Fire

Data Loss

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the FIRST step in response to an attack?

RESPOND

MANAGE

ANALYSE

INVESTIGATE

ANALYSE

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the THIRD step in the event of an attack

RESPOND

INVESTIGATE

RECOVER

ANALYSE

MANAGE

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the FIFTH step in the event of an attack

RESPOND

INVESTIGATE

RECOVER

ANALYSE

MANAGE

Discover more resources for Computers