Cyber Security @ Workplace

Cyber Security @ Workplace

KG - Professional Development

20 Qs

quiz-placeholder

Similar activities

World Heritage Monuments

World Heritage Monuments

5th - 6th Grade

15 Qs

E7-  Unit 1 - AS closer look 2 - Post

E7- Unit 1 - AS closer look 2 - Post

7th Grade

15 Qs

ÔN TẬP LỚP 7

ÔN TẬP LỚP 7

8th Grade

20 Qs

Possessive - Present Simple "verb"

Possessive - Present Simple "verb"

5th Grade

20 Qs

DWDM-2

DWDM-2

University

20 Qs

VERB TO BE

VERB TO BE

Professional Development

20 Qs

Our World

Our World

6th - 10th Grade

20 Qs

ÔN THI KÌ 2 LỚP 12

ÔN THI KÌ 2 LỚP 12

12th Grade

15 Qs

Cyber Security @ Workplace

Cyber Security @ Workplace

Assessment

Quiz

Professional Development, Computers, English

KG - Professional Development

Practice Problem

Medium

Created by

Swati Badgujar

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A clear screen means that computers are to remain locked when you move away from your desk. Clear Desk means that confidential documents are to be under lock & key and should not be accessible to unauthorized parties when you move from your desk. These statements are 

Correct

Incorrect

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The financial result of your company is published on the website. The document is to be classified as

Public document

Internal document

External document

Confidential document

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CIA triad of information security stands for

Confidentiality, integration, availability

Continuity, integration, availability

Confidentiality, integrity, accessibility

Confidentiality, integrity, availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered as the unsolicited commercial email?

Virus

Malware

Spam

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:

Antivirus

Firewall

Cookies

Malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?

Piracy

Plagiarism

Intellectual property rights

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Read the following statement carefully and find out whether it is correct or not?

It can be possible that in some cases, hacking a computer or network can be legal

  No, in any situation, hacking cannot be legal

It may be possible that in some cases, it can be referred to as a legal task

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?