Search Header Logo

E-Activity 5: Handling sensitive information

Authored by ABDUL ADAM

Physical Ed

KG - 3rd Grade

Used 3+ times

E-Activity 5: Handling sensitive information
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Identify the 7 key Security elements. Select the correct answer.

A.Premises Security and Access Control

B.Personnel Security

C.Cargo Security

D.Conveyance Security

E.Information and Information Technology (IT) Security

F.Staff welfare

G.Crisis Management and Incident Recovery

A.Premises Security and Access Control

B.Personnel Security

C.Cargo Security

D.Conveyance Security

E.Information and Information Technology (IT) Security

F.Incident Management and Investigations

G.Crisis Management and Incident Recovery

A.Premises Security and Access Control

B.Key Performance Indicator

C.Cargo Security

D.Conveyance Security

E.Information and Information Technology (IT) Security

F.Incident Management and Investigations

G.Crisis Management and Incident Recovery

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the 4 levels of classification of a document.

Select the correct answer.

RESTRICTED- CONCIERGE - SECRET – TOP SECRET

RESTRICTED- CONFIDENTIAL - SERVER – TOP SECRET

RESTRICTED- CONFIDENTIAL - SECRET – TRADE SECRET

RESTRICTED- CONFIDENTIAL - SECRET – TOP SECRET

RESTROOM- CONFIDENTIAL - SECRET – TOP SECRET

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Listed below are some of the common security best practices. Identify the wrong option.

Do not disclose any sensitive or personal information online.

Do not open email attachment from unknown sender

Do not write your password on any form of media

Do not use the Save Password feature

Use easy to remember password birthday and employee number

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do you protect desktop and server Security at the workplace. Identify the wrong option.

No guest account login on workstation

Enable password screen saver and lock the desktop screen after a period of inactivity

Enable the use of removable storage for the convenience of staff and visitor to access the computer

Enforce policy that disable user from editing any system setting

Disable the use of removable storage

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What must you observe when using your personal phone for Social Networking. Identify the Incorrect option.

Share postings of work-related information on social networking platform only to your family members and close friends

Do not post any picture that will reveal the sensitive location at the port

Do not post any sensitive comments

Do not post any sensitive photos or videos of workplace accidents or incidents

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the wrong definition for a screen lock policy

To lock the desktop screen when an employee is leaving his/her workstation

Screen lock should be password protected

Screen lock is optional to use to save the time to log into your computer immediately

To lock the desktop screen automatically after a period of inactivity

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Physical Ed