
Lesson 4: User Access Policy
Authored by Ronnie Adom
Information Technology (IT)
9th - 12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does system monitoring detect?
A) Work schedules
B) Login attempts
C) Office layouts
D) Employee pay
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why do companies monitor emails?
A) To track sales
B) To limit storage
C) To block spam
D) To prevent leaks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a risk of excessive monitoring?
A) Privacy concerns
B) Faster workflow
C) Better teamwork
D) Less hacking
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why track login times?
A) To check attendance
B) To reduce breaks
C) To prevent theft
D) To stop updates
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What must monitoring follow?
A) IT guidelines
B) Work contracts
C) Privacy laws
D) Manager approval
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a serious AUP violation?
A) Social media use
B) Weak passwords
C) Using work Wi-Fi
D) Data theft
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a first-time violation penalty?
A) Instant firing
B) Verbal warning
C) Bonus reduction
D) Full suspension
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?