
e SAFETY
Authored by ANUROOPA KG
Computers
Professional Development
Used 20+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The responsible rules and behaviours designed to keep individuals safe whenever connected to the Internet is the definition of
· Cyber Security
· Cyber Ethics
· Cyber Safety
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is appropriate to post?
· A picture of something involving an address
· Your location
· A picture of your dog
· Your phone number
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is not a benefit of
BYOD?
· Viruses and security issues.
· Familiarity.
· Ownership.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should an effective security
policy include?
An overview of corporate and IT goals and objectives.
Definitions of what information is sensitive and who should have access to it.
A detailed description of VPN operations and support procedures.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the acronym AUP stand for?
Acceptable Use Policy
Acceptable User Practices
Allowed User Practices
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What name would you give to an email attachment that may harm your computer?
Phishing
Spam
Malware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?