Security Quizz - U4W

Security Quizz - U4W

Professional Development

9 Qs

quiz-placeholder

Similar activities

Cloud Practitioner Essentials Quiz

Cloud Practitioner Essentials Quiz

Professional Development

10 Qs

Knowledge Check - 2

Knowledge Check - 2

Professional Development

10 Qs

SysOps Evaluation 2

SysOps Evaluation 2

Professional Development

11 Qs

Security Coding Quiz

Security Coding Quiz

Professional Development

14 Qs

How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Professional Development

10 Qs

14.08.2024

14.08.2024

Professional Development

10 Qs

WORKSHOP: HEALTHCARE DATA LAKEHOUSE IN ACTION

WORKSHOP: HEALTHCARE DATA LAKEHOUSE IN ACTION

Professional Development

10 Qs

LINKS Cyber Youth Challenge - Round 3

LINKS Cyber Youth Challenge - Round 3

Professional Development

10 Qs

Security Quizz - U4W

Security Quizz - U4W

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Creab Creab

Used 4+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

What would be the best solution to protect a building against car ramming attacks or accidental car collisions?

Fixed planters/Fixed bollards

  • Fence with gate and guardhouse 

  • Jersey barriers 

Retractable bollards

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

What solution do you propose to grant access mainly during the night when the building should be closed?

  • Hard key to open doors to building 

Video reception

Electronic Access Control System – Cards with access rights

  • I wouldn't allow access in the night time 

 

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

We received information that our customer U4W is going to run Data Center in their premises what do you suggest to secure their premises ?

They should create security zones to differentiate between different levels of access rights

They should protect this room with an Access Control System with access only to authorized personnel

They should install a camera to monitor the entrance to this room

  • They should hire a security guard to sit in this room 

4.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

There is a fire alarm in the SkyPark Offices building, what will you do in this case?

I pack all my personal things, notebook, drink my last coffee in the office and go/drive back home safely

I follow Evacuation Plan: I leave immediatelly the building and wait for further instructions. For next decision we will use also Loss of Building Plan data.

I leave all my personal things and equipment in the office and follow Emergency exit signs

Immediatelly leave the building to the nearest meeting point.

5.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Why we are implementing Resilience in all business units including U4W?

It's the best way how to avoid challenges and difficulties whenever possible

Thanks to Resilience we can ignore problems and hope they'll go away

If we know how to handle disruptions we are able to recover critical processes more quickly and continue to operate in the time of unexpected events

We are trying to minimize financial, legal, reputational and business operation implications of disruptions

6.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Why do we assess third-party suppliers before working with them?

To make sure their office plants are alive — healthy plants = healthy security practices.

To check if their CEO still uses Comic Sans in board decks (a true red flag).

To understand potential risks like data breaches, legal violations, or business disruption.

Because Daniel in Procurement told us they “seem chill.”

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Markus, a long-serving colleague, walked past Greta’s unlocked computer while she was on her lunch break. Seeing the unlocked laptop, the temptation won and he sat down.

Greta's workstation gave him full access to HR system - employee salaries, bonuses.

What policy was most clearly violated when Markus used Greta’s workstation?

Using unlicensed software on a company device

Leaving a logged-in device unattended

Accessing the printer queue from another user

Downloading meeting notes from shared drives

8.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Markus changed the password for the HR system and gained complete control just for him. He did it through full access to Greta’s email client.

What control would best prevent the password change misuse?

Using a CAPTCHA before resetting

Enforcing Multi Factor Authentication and device/session validation for critical systems

Asking users to change passwords quarterly

Blocking password resets after 5 p.m.

9.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is a best practice to prevent unauthorized workstation access?

Leaving post-it reminders to log out

Enforcing auto-lock and screen lock discipline

Turning off notifications

Disabling the Wi-Fi connection