Week 11 - Stategy & Planning

Week 11 - Stategy & Planning

University

20 Qs

quiz-placeholder

Similar activities

13) 210.4 Configuring an OpenLDAP server

13) 210.4 Configuring an OpenLDAP server

University

15 Qs

Five pillar of information security

Five pillar of information security

University

15 Qs

AACS3013 Quick Revision C1-C3

AACS3013 Quick Revision C1-C3

University

20 Qs

DATA LINK LAYER CONTROL

DATA LINK LAYER CONTROL

University

20 Qs

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

Database Management System

Database Management System

12th Grade - Professional Development

18 Qs

CompTIA A+ 1002 201-220

CompTIA A+ 1002 201-220

University

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Week 11 - Stategy & Planning

Week 11 - Stategy & Planning

Assessment

Quiz

Computers

University

Hard

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of IT Governance?

To reduce costs

To monitor staff performance

To align IT with business goals

To increase social media presence

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which framework is commonly used for IT Governance?

COBIT

SWOT

ERP

CRM

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad in information security stand for?

Confidentiality, Integrity, Availability

Compliance, Investigation, Access

Control, Identity, Authentication

Confidentiality, Identity, Authority

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a physical security control?

Firewall

Antivirus software

Security camera

Password policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an ethical issue in IT?

Using secure passwords

Privacy of software

Backing up data

Encrypting files

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of an Acceptable Use Policy (AUP)?

To increase productivity

To monitor user activity

To define permitted use of IT resources

To provide access to all data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company encrypts its data to ensure what principle of the CIA triad?

Integrity

Confidentiality

Accessibility

Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?