Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security

Quiz
•
Computers
•
University
•
Medium
ROSILAWATI (PMS)
Used 3+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
“Written document that states how an organization plans to protect the company’s information technology assets.”
Identify the CORRECT answer that is related to the above statement.
Security Procedures
Security Policy
Security Confidentiality
Security Availability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Below is the security factors that have to be determined while creating a security policy,
EXCEPT.
Is the computer located at a home or a business?
Is there full-time Internet access?
Is the computer a laptop?
Is there a large storage?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the criteria for a strong password.
A mixture of letters, numbers and symbols
A word from the dictionary
Less than 8 characters
An obvious word
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose a level of permission that the user had when they has ability to traverse a folder, create a folder, view folder permissions and change folder permission.
Full Control
Modify
Read
Write
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Explain Security Procedures.
A collection of rules, guidelines, and checklists
An outline the protections that should be enacted to ensure that the organization’s assets face minimal risks.
A step by step of necessary activities that performs a specific security task or function
Identifies the rules and procedures for all individuals accessing and using an organization's IT assets and resources.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the CORRECT statement of Software Firewall.
It compares physical characteristics against stored profiles to authenticate people
A program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected
A physical appliance that is deployed to enforce a network boundary
A physical card that has an embedded integrated chip that acts as a security token
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Backing up data is one of the most effective ways of protecting against __________.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Password Security Quiz

Quiz
•
University
10 questions
Introduction to AI and Cyber security

Quiz
•
University - Professi...
11 questions
Data Security Quiz

Quiz
•
University
10 questions
ICT 3 INFORMATION ASSURANCE AND SECURITY

Quiz
•
University
12 questions
Information Security Standards

Quiz
•
University
10 questions
Cyber Security

Quiz
•
University
6 questions
Security Concepts

Quiz
•
University
10 questions
Security Architecture

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University