CNET151 Chap 10 - Security Policies

CNET151 Chap 10 - Security Policies

11th Grade

25 Qs

quiz-placeholder

Similar activities

006_Gap Analysis1.2

006_Gap Analysis1.2

12th Grade - University

20 Qs

ISC2 - CC - Chapter 1 - Module 4

ISC2 - CC - Chapter 1 - Module 4

University

26 Qs

Network Security 2

Network Security 2

University

21 Qs

Personal Computers and Networking

Personal Computers and Networking

9th - 11th Grade

20 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Module 5 Test Review - Cengage Mindtap

Module 5 Test Review - Cengage Mindtap

9th - 12th Grade

20 Qs

Social Engineering and Malware

Social Engineering and Malware

8th - 11th Grade

25 Qs

Cybersecurity Fundamentals Semester Exam

Cybersecurity Fundamentals Semester Exam

12th Grade - University

20 Qs

CNET151 Chap 10 - Security Policies

CNET151 Chap 10 - Security Policies

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Karen Diggs

Used 4+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security policy is a document that defines how an organization will deal with some aspect of security. True or False?

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Effective user policies must cover passwords. True or False?

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A good password should have at least eight characters and use all lowercase letters. True or False?

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization should not permit end users to install anything on their computers. True or False?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After an employee discontinues employment, his or her workstation hard drive should be searched. True or False?

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The concept of least privileges means that no one person can perform critical tasks. True or False?

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One reason allowing a user to change the desktop configuration poses a security risk is that to change a desktop, the user must be given rights that also allow them to change other system settings. True or False?

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?