37 Security Policies

37 Security Policies

9th Grade

10 Qs

quiz-placeholder

Similar activities

Protecting Personal Data

Protecting Personal Data

7th - 9th Grade

14 Qs

Chapter 4 Test Review

Chapter 4 Test Review

9th - 12th Grade

14 Qs

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

Cloud services

Cloud services

9th - 10th Grade

13 Qs

Computing Systems

Computing Systems

9th - 10th Grade

10 Qs

Unit 2 - Lessons 2-4

Unit 2 - Lessons 2-4

9th - 12th Grade

11 Qs

SST Yr8 Term 1 HW/SW Keywords

SST Yr8 Term 1 HW/SW Keywords

8th - 10th Grade

10 Qs

Cloud computing

Cloud computing

9th - 12th Grade

10 Qs

37 Security Policies

37 Security Policies

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Deb Scott

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of staff training in security policies?

To reduce the number of employees

To make staff aware of external threats

To increase company profits

To improve customer service

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a disaster recovery plan outline?

How to increase sales

How to respond to cyber-attacks and natural disasters

How to train new employees

How to develop new software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the focus of the 'Before phase' in a disaster recovery plan?

Responding to a disaster

Preparing for a disaster

Celebrating success

Hiring new staff

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of an Acceptable Use Policy in a school?

To outline holiday schedules

To provide rules for network use

To list cafeteria menus

To describe sports activities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the expectation of staff in terms of data use?

To ignore data security

To be more responsible with data

To share data freely

To delete all data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is confidential computing?

A method to store data in a public environment

A technology for isolating sensitive data in a protected environment

A way to share data openly

A system for deleting data securely

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the focus of protection in use?

Encrypting data before storage

Encrypting data during transmission

Encrypting data while it’s being used in the RAM

Encrypting data after deletion

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?