BP Mock 2

BP Mock 2

12th Grade

35 Qs

quiz-placeholder

Similar activities

Business Technology & Procedures

Business Technology & Procedures

9th - 12th Grade

38 Qs

Chapter 16 Review:  Managing Information Technology

Chapter 16 Review: Managing Information Technology

9th Grade - University

36 Qs

Workplace Technology

Workplace Technology

9th - 12th Grade

30 Qs

SEM Chapter 5 Test Review

SEM Chapter 5 Test Review

11th - 12th Grade

35 Qs

Unit 5

Unit 5

9th - 12th Grade

33 Qs

Assessment 3 - Workplace, Computer  to Internet Basics 10/24/24

Assessment 3 - Workplace, Computer to Internet Basics 10/24/24

12th Grade - University

35 Qs

Attacks Review

Attacks Review

9th - 12th Grade

33 Qs

Social Media Marketing (Ch 1)

Social Media Marketing (Ch 1)

9th - 12th Grade

32 Qs

BP Mock 2

BP Mock 2

Assessment

Quiz

Business

12th Grade

Easy

Used 28+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the ISO 27001 standard cover?

Information service organisation system

Internet security management System

Information security management system

Information service management system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IT strategy document is aligned to support which of the following?

Business strategy

Security strategy

Network strategy.

Infrastructure strategy.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A secure print and mail fulfillment ability is likely to be required for which purpose?

Marketing communications.

Payslips

Job advertisements

Workplace safety posters.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is TRUE when transferring on-premise services to the Cloud?

Organisations that have purchased EULA / Master Agreements have automatic entitlement to transfer software to a cloud service.

Software licencing responsibilities need to be considered on a case by case basis

The obligations for software licence compliance transfer to the cloud service provider

Vendor audits focus on identifying counterfeit or non-purchased software rather than licence entitlement

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an offence under the Computer Misuse Act?

Accessing someone else's files with intent to commit further criminal offences.

Copying software and trying to sell it to someone for a profit.

Unauthorised access to someone else's files

Hacking into someone's device.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Under which piece of legislation do individuals have the right to see a copy of the information an organisation holds about them?

Data Protection Act 1998

Freedom of Information Action 2000

Computer Misuse Act.

ISO 27001.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank.

The role of service prioritisation in business continuity and disaster recovery prioritises the order in which ____________.

Data items should be made secure.

Business data should be backed-up.

Business data should be recovered

Testing should be carried out

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?