Cybersecurity in Teleworking

Cybersecurity in Teleworking

1st - 5th Grade

8 Qs

quiz-placeholder

Similar activities

Folders and Files (Edison)

Folders and Files (Edison)

3rd Grade

13 Qs

ICT

ICT

3rd Grade

11 Qs

FILES AND FOLDERS

FILES AND FOLDERS

2nd Grade

13 Qs

N4/5 Admin - Sources of Info & File Management

N4/5 Admin - Sources of Info & File Management

3rd Grade

11 Qs

Features Of File Management- Let's Revise

Features Of File Management- Let's Revise

4th Grade

10 Qs

ICT-GRADE 5 - NOV 2020

ICT-GRADE 5 - NOV 2020

5th Grade

12 Qs

Microsoft Word 2013

Microsoft Word 2013

4th - 5th Grade

11 Qs

Chapter 2 Managing Files and Folders

Chapter 2 Managing Files and Folders

3rd - 5th Grade

10 Qs

Cybersecurity in Teleworking

Cybersecurity in Teleworking

Assessment

Quiz

Computers

1st - 5th Grade

Medium

Created by

Its Cojali

Used 5+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If the content of an important file to the company is altered or modified without the owner's knowledge, it would be a violation of the principle of:

Confidentiality

Integrity

Availability

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If an important file to the company is deleted from the system without the owner knowing, it would be a violation of the principle of:

Confidentiality

Integrity

Availability

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If an important file to the company could be viewed without the express consent of the owner, it would be violating the principle of:

Confidentiality

Integrity

Availability

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

If we need an Internet network on our laptop and we have the possibility to connect to a public WiFi network ...

We connect to the public WiFi network

We use our mobile terminal as an access point

We would not connect

The above options are correct

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Our Operating Systems or Antivirus solution tells us that it is out of date, What will we do?

We connect to the VPN or We contatct to IT Dpt.

We ignored the warning

We try to find a solution in Google

We changed our antivirus solution

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

We need an application that can help us in our daily work, What will we do?

We install it

We request permission from the IT Dpt.

We will do nothing

The above options are incorrect

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

They ask us to send a file important to the company by email. The request is legitimate and we can send the file, what will we do?

We send it as soon as possible

We encrypt the file and send it

We will do nothing

The above options are incorrect

8.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

What did you think of this presentation?

*

**

***

****

*****