BTEC DIT C3 LAB - Security Policies & Disaster Recovery

BTEC DIT C3 LAB - Security Policies & Disaster Recovery

10th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

ICT Acceptable Use Policy Quiz

ICT Acceptable Use Policy Quiz

9th Grade - University

15 Qs

Local Area Networks

Local Area Networks

11th Grade

13 Qs

Cybersecurity Resilience

Cybersecurity Resilience

10th Grade

10 Qs

S4 Admin Customer Care

S4 Admin Customer Care

11th - 12th Grade

9 Qs

Learning Aim C Quiz 1

Learning Aim C Quiz 1

10th Grade

9 Qs

Mr. Baker's Class Rules

Mr. Baker's Class Rules

7th - 12th Grade

10 Qs

Jaringan Dasar

Jaringan Dasar

10th Grade

9 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

BTEC DIT C3 LAB - Security Policies & Disaster Recovery

BTEC DIT C3 LAB - Security Policies & Disaster Recovery

Assessment

Quiz

Computers

10th - 11th Grade

Medium

Created by

Sarah Rodgers

Used 200+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which is a strong password?

Soofmu1.

123456

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Passwords should include? (Choose all that apply)

Colour

Letters

Numbers

Symbols

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

After using a public computer (like in a library), you should stay logged in to everything.

True

False

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is the role of security policies. (Choose all that apply)

To allow staff to work remotely

Outline how staff are expected to behave

List staff responsibilities

Plan for what should happen in a disaster

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are features of a disaster recovery plan?

Who has responsibility for tasks

A list of passwords for the system

Identifying potential risks

What staff should and should not do.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the features of an AUP (Acceptable Use Policy) . (Choose all that apply)

It's purpose is to reduce potential internal threats to the organisations information.

It applies to all the employees in an organisation and any others who may use technology belonging to the organisations.

It outlines steps to take to in the event of a disaster.

It covers acceptable use of all assets eg Data, Hardware and Software

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the behaviours that would be considered acceptable in a AUP.

Download non-work related materials, software, music and video files.

Use email in a professional and courteous manner

Make negative comments about the organisation on social media.

Report any technical issues to the technical support department

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?