103 (BASED ON QUIZZES)

103 (BASED ON QUIZZES)

University

63 Qs

quiz-placeholder

Similar activities

MST6205 (Chapter 2-5)

MST6205 (Chapter 2-5)

University

60 Qs

PRELIMINARY EXAMINATION CC106

PRELIMINARY EXAMINATION CC106

University

65 Qs

Salesforce Test 1 For Ranking

Salesforce Test 1 For Ranking

University

68 Qs

Domain 3 Quiz

Domain 3 Quiz

University

58 Qs

Computers for Managers

Computers for Managers

University

60 Qs

иктттт

иктттт

University

61 Qs

IIMS - Cloud Computing Mock Quiz

IIMS - Cloud Computing Mock Quiz

University

60 Qs

Microsoft Windows 10

Microsoft Windows 10

1st Grade - Professional Development

61 Qs

103 (BASED ON QUIZZES)

103 (BASED ON QUIZZES)

Assessment

Quiz

Computers

University

Hard

Created by

jnky wnky

Used 1+ times

FREE Resource

63 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

With limited resources and training time, you need to prioritize the security topics covered in your organization's training program. How should you approach this decision?

Focus on the latest and most trending cybersecurity threats.

Base the selection solely on industry compliance requirements.

Conduct a risk assessment to identify the most relevant threats specific to your organization.

Prioritize topics with the highest potential financial impact.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Strong passwords should be:

at least 8 characters long

easily memorable

shared with colleagues

based on personal information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a good practice for physical security?

locking doors and windows

using security cameras

leaving sensitive documents unattended

regularly testing backup systems

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a direct benefit of implementing information assurance policies?

reduced risk of data breaches

improved employee productivity

increased compliance with regulations

enhanced brand reputation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The best way to ensure employees understand and follow information assurance and security policies is to:

Send them an email with the policy attached.

Provide regular training and awareness sessions.

Punish employees who violate the policies.

all of the choices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best balances security needs with employee productivity when designing an acceptable use policy?

prioritizing flexibility for employees while outlining clear guidelines and consequences for violations

restricting access to all social media platforms

prohibiting personal email use during work hours

filtering all web traffic to block potential threats

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company experiences a data breach despite having a data encryption policy. Which factor is most likely to have contributed to the breach?

inadequate storage of encryption keys

outdated encryption algorithms

lack of employee training on encryption procedures

absence of a data retention policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?