Cambridge Technicals in IT - Unit 02 - LO6.4

Cambridge Technicals in IT - Unit 02 - LO6.4

11th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Empowerment Technology Quiz 1

Empowerment Technology Quiz 1

11th Grade

20 Qs

COMPUTER SYSTEMS SERVICING 3

COMPUTER SYSTEMS SERVICING 3

12th Grade

20 Qs

STS Mapel Pilihan (Database) XI TJAT

STS Mapel Pilihan (Database) XI TJAT

11th Grade

20 Qs

Quiz Mengenai Email

Quiz Mengenai Email

5th Grade - University

20 Qs

Understanding Linux File Permissions

Understanding Linux File Permissions

10th Grade - University

20 Qs

Fase E. 12 TKJ 1. Jenis Layanan Hosting Spek Kebutuhan hosting

Fase E. 12 TKJ 1. Jenis Layanan Hosting Spek Kebutuhan hosting

12th Grade

20 Qs

Internet and App script

Internet and App script

5th Grade - University

22 Qs

Basis Data

Basis Data

11th Grade

20 Qs

Cambridge Technicals in IT - Unit 02 - LO6.4

Cambridge Technicals in IT - Unit 02 - LO6.4

Assessment

Quiz

Information Technology (IT)

11th - 12th Grade

Hard

Created by

K Wood

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is a common physical protection measure used to restrict access to server rooms?
Security keypads.
Firewall software.
Data encryption.
Multi-factor authentication.

Answer explanation

Security keypads restrict unauthorised physical access to server rooms.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Why should computers be placed above flood levels in an office?
To prevent theft.
To improve internet speed.
To avoid water damage.
To make access easier.

Answer explanation

Placing computers above flood levels helps prevent damage during floods.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which policy helps control who can access specific company files?
Staff access rights to information.
Data backup policy.
Security staff management.
Physical security audit.

Answer explanation

Staff access rights define which employees can view or edit sensitive data.

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the primary purpose of using biometric authentication in security?
To make login faster.
To enhance physical security.
To eliminate the need for passwords.
To increase employee satisfaction.

Answer explanation

Biometrics, such as fingerprint scanners, ensure only authorised users access systems.

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which policy ensures employees understand their role in information security?
Information security risk assessment.
Responsibilities of staff for security of information.
Disaster recovery plan.
Physical security implementation.

Answer explanation

Staff responsibilities policies outline security duties to prevent data breaches.

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What physical security measure can prevent unauthorised access to a workplace?
Strong password policies.
Shredding old documents.
Installing security staff at entrances.
Using anti-virus software.

Answer explanation

Security personnel can monitor and prevent unauthorised physical entry.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Why is shredding old paper-based records an important security measure?
It makes office cleaning easier.
It prevents unauthorised access to sensitive data.
It reduces printing costs.
It improves data accuracy.

Answer explanation

Shredding protects confidential information from being retrieved by unauthorised individuals.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?