L9 Physical Security Measures

L9 Physical Security Measures

12th Grade

12 Qs

quiz-placeholder

Similar activities

1.1.11 Causes of data loss

1.1.11 Causes of data loss

11th Grade - University

10 Qs

Network Architecture

Network Architecture

12th Grade - University

8 Qs

BTEC National ICT - U1 LAA Software 5

BTEC National ICT - U1 LAA Software 5

12th Grade

10 Qs

Understanding Computer Networks

Understanding Computer Networks

9th Grade - University

12 Qs

IS 225 Quiz #2.1

IS 225 Quiz #2.1

12th Grade

15 Qs

Network Security Risks

Network Security Risks

12th Grade

10 Qs

Data Security Worksheet

Data Security Worksheet

10th Grade - University

15 Qs

Backups

Backups

9th - 12th Grade

14 Qs

L9 Physical Security Measures

L9 Physical Security Measures

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Emma Butler

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Physical security methods will make just as much difference in protecting our computers and data from harm as any firewall, anti-virus or user authentication system

True

False

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Why is it important to lock buildings and rooms where IT equipment is stored?

The manager says you have to, so you must do this.

To stop them being used.

If someone were to gain access, they could potentially cause huge damage to the network and its data

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Using a card system or _________ entry system allows you to identify each person that has entered a room. This allows you to identify any suspicious behaviour or to investigate an attack that has occurred.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

CCTV stands for Closed _______ Television.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the main role of security staff?

Drink coffee all night

Patrol the entrances to check if people are trying to enter

Check the firewall settings are correct

Run anti-malware checks

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Where are alarms usually placed to detect suspicious behaviour? Select two answers

Doors

Tea room

Computers

Windows

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What makes protected cabling harder to cut into?

The plastic used

The woven mesh layer used

The rubber used

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers