Search Header Logo

Business Processes - Lesson 2 - Info Security Req's

Authored by Gary Martyn

Computers

Professional Development

Used 17+ times

Business Processes - Lesson 2 - Info Security Req's
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the JML procedure?

Joiner, Manager, Learner

Joiner, Mover, Learner

Joiner, Mover, Leaver

Joiner, Manager, Leaver

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two of the following should occur at the Joiner stage?

Inclusion in security groups

Terminate access rights

Set-up managerial access to email account

Addition to contacts and mailing lists

Relinquish assets

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three of the following should occur at the Leaver stage?

Inclusion in security groups

Terminate access rights

Set-up managerial access to email account

Addition to contacts and mailing lists

Relinquish assets

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes what should occur at the Mover stage?

Remove all existing access & grant new access

Remove unneeded existing access and grant new access

Remove all existing access

Grant new access

Remove unneeded existing access

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is it important to make staff aware of security measures/procedures?

To help employees understand the organisation’s information and compliance risks, thus reducing the organisation’s exposure to security failures.

So that they can both proactively support security and when needed take correct action if breeches in security occur.

To help avoid virus infection and to handle an infection when it occurs.

All of these answers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you raise awareness of security measures with staff?

Online training (self paced)

Organised training based in a classroom

Regular security audits and monitoring

All of these answers

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

When training staff, which of the following policies should you aim to educate them on?

Acceptable Use Policy

Digital Rights management

Intellectual Property Rights

Disclosure of information

Reporting of Information security breaches

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?