IT Policy

IT Policy

University

20 Qs

quiz-placeholder

Similar activities

Tự trọng

Tự trọng

University

15 Qs

Marketing Managemetn Minigame 2

Marketing Managemetn Minigame 2

University

20 Qs

Anatomia estrutural e palpatória

Anatomia estrutural e palpatória

University

16 Qs

Job interviewing

Job interviewing

10th Grade - Professional Development

17 Qs

LAHTM Tourism and Hospitality as a Trade

LAHTM Tourism and Hospitality as a Trade

University

20 Qs

Quiz 2 El extraño caso de dr...

Quiz 2 El extraño caso de dr...

University

15 Qs

EVALUACION

EVALUACION

University

15 Qs

Agenda and Minutes - Intra Office Communication

Agenda and Minutes - Intra Office Communication

8th Grade - University

18 Qs

IT Policy

IT Policy

Assessment

Quiz

Professional Development

University

Practice Problem

Easy

Created by

gaurav sharma

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does GDPR stand for in the context of IT policy?

A) General Data Protection Regulation

B) Global Data Privacy Rule

C) General Digital Privacy Regulation

D) Government Data Protection Requirement

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a typical component of an IT security policy?

A) Encryption protocols

B) Social media usage guidelines

C) Password policy

D) Office furniture guidelines

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary purpose of an Acceptable Use Policy (AUP)?

A) Regulating office hours

B) Defining acceptable behavior and usage of IT resources

C) Controlling cafeteria usage

D) Specifying dress code

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of malware disguises itself as a legitimate software and can cause harm to a computer system?

A) Spyware

B) Trojan horse

C) Adware

D) Worm

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does the term "BYOD" stand for in IT policy?

A) Bring Your Own Device

B) Build Your Own Database

C) Backup Your Operating System Data

D) Buy Your Office Devices

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does the principle of "least privilege" mean in the context of IT security?

A) Providing maximum access rights to all users

B) Granting only the minimum levels of access necessary for users to complete their tasks

C) Granting access rights based on user popularity

D) Allowing access to only a specific group of users

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a strong password practice?

A) Using common words or phrases

B) Including personal information like birthdates

C) Mixing uppercase and lowercase letters, numbers, and symbols

D) Using the same password for all accounts

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?