Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security
Quiz
•
Computers
•
University
•
Practice Problem
•
Medium
ROSILAWATI (PMS)
Used 3+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
“Written document that states how an organization plans to protect the company’s information technology assets.”
Identify the CORRECT answer that is related to the above statement.
Security Procedures
Security Policy
Security Confidentiality
Security Availability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Below is the security factors that have to be determined while creating a security policy,
EXCEPT.
Is the computer located at a home or a business?
Is there full-time Internet access?
Is the computer a laptop?
Is there a large storage?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the criteria for a strong password.
A mixture of letters, numbers and symbols
A word from the dictionary
Less than 8 characters
An obvious word
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose a level of permission that the user had when they has ability to traverse a folder, create a folder, view folder permissions and change folder permission.
Full Control
Modify
Read
Write
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Explain Security Procedures.
A collection of rules, guidelines, and checklists
An outline the protections that should be enacted to ensure that the organization’s assets face minimal risks.
A step by step of necessary activities that performs a specific security task or function
Identifies the rules and procedures for all individuals accessing and using an organization's IT assets and resources.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the CORRECT statement of Software Firewall.
It compares physical characteristics against stored profiles to authenticate people
A program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected
A physical appliance that is deployed to enforce a network boundary
A physical card that has an embedded integrated chip that acts as a security token
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Backing up data is one of the most effective ways of protecting against __________.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Computer and Other Human Inventions
Quiz
•
University
15 questions
Robotics Prelim
Quiz
•
University
11 questions
SCM and Logistics
Quiz
•
University
10 questions
UTILITY PROGRAM
Quiz
•
University
10 questions
Data Warehouse - Foundations
Quiz
•
University
13 questions
Digital Technology Office 365 - 29May2020
Quiz
•
University - Professi...
7 questions
Data mining-Clustering-1
Quiz
•
University
15 questions
GIS Unit III
Quiz
•
University
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
20 questions
christmas songs
Quiz
•
KG - University
20 questions
Holiday Trivia
Quiz
•
9th Grade - University
15 questions
Holiday Movies
Quiz
•
University
14 questions
Christmas Trivia
Quiz
•
3rd Grade - University
20 questions
Christmas Trivia
Quiz
•
University
8 questions
5th, Unit 4, Lesson 8
Lesson
•
KG - Professional Dev...
20 questions
Disney Trivia
Quiz
•
University
