4 Questions
How should data and software storage on mobile devices be handled before disposal?
Securely erased or destroyed
What is considered off-limits for work communication?
Personal email services and messengers
What is an example of using information assets for unauthorized purposes?
Distributing pirated software
What is an action that shows respect for information assets?
Using assets only for authorized purposes
Test your knowledge on protecting shared facilities and equipment with this quiz. Learn about access control systems, secure storage of sensitive equipment, and safeguarding sensitive information in public areas. Brush up on best practices for maintaining physical security for server infrastructure.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free