CNET151 Chap 10 - Security Policies

CNET151 Chap 10 - Security Policies

11th Grade

25 Qs

quiz-placeholder

Similar activities

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

7th - 12th Grade

20 Qs

EPlus Certified Computer Network Specialist

EPlus Certified Computer Network Specialist

University

20 Qs

NETESS 2.0 MODULE 13 QUIZ - Build a Home Network

NETESS 2.0 MODULE 13 QUIZ - Build a Home Network

12th Grade

20 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Hardware & Software

Hardware & Software

KG - University

20 Qs

Security and Performance

Security and Performance

12th Grade

20 Qs

Software

Software

10th - 11th Grade

20 Qs

CNET151 Chap 10 - Security Policies

CNET151 Chap 10 - Security Policies

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Karen Diggs

Used 4+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security policy is a document that defines how an organization will deal with some aspect of security. True or False?

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Effective user policies must cover passwords. True or False?

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A good password should have at least eight characters and use all lowercase letters. True or False?

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization should not permit end users to install anything on their computers. True or False?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After an employee discontinues employment, his or her workstation hard drive should be searched. True or False?

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The concept of least privileges means that no one person can perform critical tasks. True or False?

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One reason allowing a user to change the desktop configuration poses a security risk is that to change a desktop, the user must be given rights that also allow them to change other system settings. True or False?

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?