3.3.4 Procedures

3.3.4 Procedures

1st Grade - University

20 Qs

quiz-placeholder

Similar activities

BTEC IT Revision Quiz 2 (various topics)

BTEC IT Revision Quiz 2 (various topics)

8th - 11th Grade

20 Qs

Organizational Policies 1

Organizational Policies 1

11th Grade

15 Qs

Acceptable Use Policy

Acceptable Use Policy

6th - 9th Grade

16 Qs

Policies and Procedures Quiz

Policies and Procedures Quiz

11th Grade

15 Qs

week 6 workshop quiz for sec+

week 6 workshop quiz for sec+

University - Professional Development

25 Qs

ITRM&DR QUIZ

ITRM&DR QUIZ

1st - 5th Grade

15 Qs

Week 14 - Module 5 Unit 5 Behavioral Security Concepts

Week 14 - Module 5 Unit 5 Behavioral Security Concepts

University

18 Qs

3.3.4 Procedures

3.3.4 Procedures

Assessment

Quiz

Computers

1st Grade - University

Medium

Created by

Richard Love

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unless there are agreed policies and procedures governing how a system is protected then failures are possible.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

With agreed policies and procedures governing how a system is protected in place failures are impossible.

True

False

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which 2 factors might cause the range of cyber security policies and procedures within an organisation to vary?

Size of organisation

Public key encryption

Purpose of organisation

Private key encryption

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This document outlines the steps taken to recover data, IT systems and applications.

Disaster recovery plan

Acceptable use policy

Digital signature acceptance policy

Email policy

Password protection policy

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This document outlines how to use computer systems and security measures to obey when using company equipment.

Disaster recovery plan

Acceptable use policy

Digital signature acceptance policy

Email policy

Password protection policy

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This document outlines when and where an 'electronic autograph' is acceptable evidence of identity for documents.

Disaster recovery plan

Acceptable use policy

Digital signature acceptance policy

Email policy

Password protection policy

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

This document outlines what is and is not considered appropriate use of electronic mail.

Disaster recovery plan

Acceptable use policy

Digital signature acceptance policy

Email policy

Password protection policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?