Domain 4.3 & 4.4

Domain 4.3 & 4.4

Professional Development

30 Qs

quiz-placeholder

Similar activities

DCP Utilization and Maintenance

DCP Utilization and Maintenance

Professional Development

25 Qs

Tech Verse Quiz

Tech Verse Quiz

Professional Development

25 Qs

Class Quiz

Class Quiz

Professional Development

25 Qs

HyQuizz - Mùa 3 - Day 4

HyQuizz - Mùa 3 - Day 4

Professional Development

30 Qs

IT Systems and Tools Quiz

IT Systems and Tools Quiz

Professional Development

35 Qs

ACSR

ACSR

Professional Development

26 Qs

cryptography

cryptography

Professional Development

25 Qs

Domain 4.3 & 4.4

Domain 4.3 & 4.4

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Ayomide Oluwaga

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which phase of the asset lifecycle involves ensuring devices are from trusted vendors and free of backdoors?

Assignment/Accounting

Monitoring/Tracking

Acquisition/Procurement

Disposal/Decommissioning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During which phase of the asset lifecycle should ownership be assigned and data sensitivity classified?

Disposal/Decommissioning

Assignment/Accounting

Monitoring/Tracking

Acquisition/Procurement

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain why every phase of the asset lifecycle has security implications. Provide an example for one phase.

Only the acquisition phase has security implications because of vendor trust.

Security implications are present in every phase, such as preventing data leakage during disposal.

Only the monitoring phase is important for security.

Security is only relevant during assignment/accounting.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is planning to dispose of several old computers. What should be their primary security concern during this process?

Maximizing resale value

Preventing data leakage from discarded devices

Upgrading software before disposal

Assigning new ownership

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When acquiring new hardware or software, which of the following is NOT a recommended step in the acquisition/procurement process?

Source from unverified vendors

Source from trusted vendors

Verify integrity (check hashes, digital signatures)

Ensure compliance with security policies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary security concern with low-cost IoT devices?

Counterfeit products may have hidden backdoors

They are always more energy efficient

They are guaranteed to be virus-free

They come with lifetime warranties

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the role of a responsible owner in asset management?

Ensures the asset is secure and compliant

Uses the asset for personal tasks

Sells the asset when not needed

Ignores the asset’s security status

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?