Cyber Security @ Workplace

Cyber Security @ Workplace

KG - Professional Development

20 Qs

quiz-placeholder

Similar activities

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

QUIZ #3 LESSON 6: PEER-TO-PEER NETWORK & NETWORK SECURITY

QUIZ #3 LESSON 6: PEER-TO-PEER NETWORK & NETWORK SECURITY

10th Grade

20 Qs

Future Jobs Quizziz Game

Future Jobs Quizziz Game

5th - 8th Grade

18 Qs

Chapter 7

Chapter 7

Professional Development

20 Qs

Y7 - Cybersecurity

Y7 - Cybersecurity

6th Grade

19 Qs

Data Security (G8)

Data Security (G8)

2nd Grade

20 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Cyber Security Quiz

Cyber Security Quiz

7th Grade

15 Qs

Cyber Security @ Workplace

Cyber Security @ Workplace

Assessment

Quiz

Professional Development, Computers, English

KG - Professional Development

Medium

Created by

Swati Badgujar

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A clear screen means that computers are to remain locked when you move away from your desk. Clear Desk means that confidential documents are to be under lock & key and should not be accessible to unauthorized parties when you move from your desk. These statements are 

Correct

Incorrect

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The financial result of your company is published on the website. The document is to be classified as

Public document

Internal document

External document

Confidential document

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CIA triad of information security stands for

Confidentiality, integration, availability

Continuity, integration, availability

Confidentiality, integrity, accessibility

Confidentiality, integrity, availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered as the unsolicited commercial email?

Virus

Malware

Spam

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:

Antivirus

Firewall

Cookies

Malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?

Piracy

Plagiarism

Intellectual property rights

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Read the following statement carefully and find out whether it is correct or not?

It can be possible that in some cases, hacking a computer or network can be legal

  No, in any situation, hacking cannot be legal

It may be possible that in some cases, it can be referred to as a legal task

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?