General IT Polices B

General IT Polices B

11th Grade

15 Qs

quiz-placeholder

Similar activities

Unit 1: Data across multiple systems

Unit 1: Data across multiple systems

11th Grade

18 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

CompTIA IT Fundamentals Practice

CompTIA IT Fundamentals Practice

9th Grade - University

20 Qs

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Logical Security Measure 14.4

Logical Security Measure 14.4

11th Grade

15 Qs

Types of Database Security Controls

Types of Database Security Controls

11th Grade

20 Qs

Intro to Cybersecurity - Physical Security

Intro to Cybersecurity - Physical Security

9th - 12th Grade

18 Qs

General IT Polices B

General IT Polices B

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Jerry Jackson Bent

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systematic technical assessment of how effectively an organisations security policies and procedures are being implemented is called what?

Systems audit

Security audit

Computer audit

Cyber audit

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select 2 responsibilities of a security auditing team

Interviewing staff

Hiring Employees

Selecting internet service

Technical examination of software and hardware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Individuals, that carry out security audits are referred to as what?

Technical team

Security personnel

Security auditors

Employee IT

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first procedure a security audit team needs to follow?

Define objectives for the audit

Perform the audit

Produce a security report

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the second procedure a security audit team needs to follow?

Appoint a leader

Produce a security report

Perform the audit

Investigate cause of security issue

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the second procedure a security audit team needs to follow?

Research the threat

Produce a security report

Report the case

Investigate cause of security issue

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guideline and set of rules which a company uses to ensure that backups are performed on a regular basis is called what?

Internet usage policy

Security policy

Data policy

Backup policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?