Which of the following statements accurately defines the responsibilities and reporting procedures for data security concerns in an organisation?
C3 LA-B B3 Policy

Quiz
•
Computers
•
10th Grade
•
Hard
Mr Finch
Used 3+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
All employees are responsible for ensuring data security, and any concerns should be reported to the IT department.
The IT department is solely responsible for data security, and concerns should be reported directly to the department head.
Only managers and department heads are responsible for data security, and concerns should be reported to them.
Every employee has specific data security responsibilities based on their role, and concerns should be reported to a designated data security officer.
Answer explanation
Every employee has specific data security responsibilities based on their role, and concerns should be reported to a designated data security officer.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements accurately defines the responsibilities of employees with regard to data security policy?
Employees are responsible for establishing and enforcing data security policies.
Employees are not responsible for data security policies; it is the sole responsibility of IT department.
Employees are responsible for ensuring that they understand and comply with data security policies.
Employees are only responsible for data security policies if they hold a senior position within the organisation.
Answer explanation
Employees are responsible for ensuring that they understand and comply with data security policies.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of an acceptable password under a data security policy?
123456
Password
iloveyou
$tr0ngP@$$w0rd
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements best describes an acceptable software/installation/usage policy in relation to data security?
Employees are allowed to download and install any software they need to complete their work.
Employees must seek approval from their supervisor before downloading and installing any software.
Employees are not allowed to install any software on their computers.
Employees can only use software that is approved by the company's IT department.
Answer explanation
Allowing employees to download and install any software they need can lead to the installation of unauthorised and potentially harmful software on company devices. While completely banning software installation may seem like a safe option, it can restrict employee productivity. Seeking approval from a supervisor can create unnecessary bureaucracy and delays. Therefore, the best policy is to only allow the use of approved software, as determined by the company's IT department, to ensure that all software is secure and compliant with data security policies.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the best example of a security parameter for device hardening in a data security policy?
Ensuring that all devices are updated with the latest operating system version
Allowing employees to use personal devices for work-related tasks
Providing unrestricted access to sensitive data to all employees
Storing login credentials in a publicly accessible file
Answer explanation
This is the best example of a security parameter for device hardening because outdated operating systems are more vulnerable to attacks. Ensuring that all devices are updated with the latest operating system version can help protect against known vulnerabilities and reduce the risk of a security breach.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT an example of a security parameter for device hardening?
Enabling firewalls
Disabling unnecessary services
Installing anti-virus software
Leaving default usernames and passwords
Answer explanation
Leaving default usernames and passwords is a major security risk because attackers can easily gain access to the device. Therefore, it is important to change default usernames and passwords during device hardening. Enabling firewalls, disabling unnecessary services, and installing anti-virus software are all examples of security parameters that should be considered during device hardening to improve data security.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is true about disaster recovery in data security policy?
It is solely the responsibility of the IT department
It is the responsibility of all employees in the organisation
It is the responsibility of the CEO only
It is not necessary for disaster recovery to be a part of data security policy
Answer explanation
Disaster recovery is not the sole responsibility of the IT department. Every employee in the organisation has a role to play in ensuring that disaster recovery plans are in place and that they are followed in the event of a disaster. All employees should be trained on what to do in case of a disaster, and there should be clear guidelines in place for disaster recovery. This will help to minimize the impact of a disaster on the organization and ensure that business operations can be restored as quickly as possible.
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Understanding Cybersecurity

Quiz
•
5th Grade - Professio...
15 questions
Security Protection and Risk Management (Revision 1)

Quiz
•
9th - 12th Grade
15 questions
IGCSE ICT quiz

Quiz
•
9th - 10th Grade
10 questions
BTEC DIT C3 LAA - Impact on organisations

Quiz
•
10th - 11th Grade
17 questions
Cyber Camps 2018 - Review Day 3 Windows

Quiz
•
7th - 12th Grade
13 questions
IT Policies

Quiz
•
9th - 11th Grade
13 questions
1.4 Wired and Wireless Networks

Quiz
•
10th - 11th Grade
10 questions
BTEC DIT C3 LAB - Internal Threats

Quiz
•
10th - 11th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University