BTEC DIT - C3 - B3 - Policy

BTEC DIT - C3 - B3 - Policy

11th Grade

9 Qs

quiz-placeholder

Similar activities

Introduction to computer networks

Introduction to computer networks

9th - 11th Grade

14 Qs

Cyber Security

Cyber Security

9th - 11th Grade

13 Qs

ICDL 1.3.3 Portable Devices

ICDL 1.3.3 Portable Devices

10th - 11th Grade

10 Qs

HA2022CSHL

HA2022CSHL

11th Grade

8 Qs

5 Quiz sobre Ferramentas de Segurança do Windows 10

5 Quiz sobre Ferramentas de Segurança do Windows 10

10th Grade - University

12 Qs

File Management

File Management

9th - 12th Grade

12 Qs

DCM-Domain 3 Review

DCM-Domain 3 Review

9th - 12th Grade

12 Qs

Network policies

Network policies

7th - 12th Grade

13 Qs

BTEC DIT - C3 - B3 - Policy

BTEC DIT - C3 - B3 - Policy

Assessment

Quiz

Computers

11th Grade

Medium

Created by

J Sharp

Used 48+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of policy might contain the following:

Staff cannot use the computers for personal shopping

Email

Internet usage

Software

Personal Devices

Backup

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of policy might contain the following:

Must use 6 characters, including at least 1 number

Email

Internet usage

Passwords

Personal Devices

Backup

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of policy might contain the following:

Must be approved via the IT support team before being installed

Email

Internet usage

Software

Personal Devices

Backup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of policy might contain the following:

Must be completed twice a day, before and after work hours

Email

Internet usage

Software

Personal Devices

Backup

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the strongest password?

Portsmouth1

PoRtSm0uTH1!

MfFt1PfC!

MfFtiPFC!

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these are types of disaster which should be included in a disaster recovery policy?

(SELECT MORE THAN ONE ANSWER)

Cyber Attack

Coffee Spill

Fire

Data Loss

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the FIRST step in response to an attack?

RESPOND

MANAGE

ANALYSE

INVESTIGATE

ANALYSE

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the THIRD step in the event of an attack

RESPOND

INVESTIGATE

RECOVER

ANALYSE

MANAGE

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the FIFTH step in the event of an attack

RESPOND

INVESTIGATE

RECOVER

ANALYSE

MANAGE