Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security

Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security

University

10 Qs

quiz-placeholder

Similar activities

Computer Architecture Unit 3

Computer Architecture Unit 3

University

15 Qs

BCA

BCA

University

10 Qs

Assessment 08

Assessment 08

University

15 Qs

Information Technology & Business Canvas Model

Information Technology & Business Canvas Model

University

13 Qs

CID421 Introduction to 3D CAD SOLIDWORK

CID421 Introduction to 3D CAD SOLIDWORK

University

12 Qs

GIS Unit-1

GIS Unit-1

University

15 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security

Pop Quiz for Topic 2.1 Show Security Policy & 2.2 Show Security

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

ROSILAWATI (PMS)

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

“Written document that states how an organization plans to protect the company’s information technology assets.”

Identify the CORRECT answer that is related to the above statement.

      

Security Procedures

Security Policy

Security Confidentiality

Security Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Below is the security factors that have to be determined while creating a security policy,

EXCEPT.   

Is the computer located at a home or a business?

Is there full-time Internet access?

Is the computer a laptop?

Is there a large storage?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the criteria for a strong password.     

A mixture of letters, numbers and symbols

A word from the dictionary

Less than 8 characters

An obvious word

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose a level of permission that the user had when they has ability to traverse a folder, create a folder, view folder permissions and change folder permission.        

Full Control

Modify

Read

Write

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain Security Procedures.    

A collection of rules, guidelines, and checklists

An outline the protections that should be enacted to ensure that the organization’s assets face minimal risks.

A step by step of necessary activities that performs a specific security task or function

Identifies the rules and procedures for all individuals accessing and using an organization's IT assets and resources.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the CORRECT statement of Software Firewall.

It compares physical characteristics against stored profiles to authenticate people

A program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected

A physical appliance that is deployed to enforce a network boundary

A physical card that has an embedded integrated chip that acts as a security token

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Backing up data is one of the most effective ways of protecting against __________.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?