Physical Security for Shared Facilities and Equipment Quiz
4 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

How should data and software storage on mobile devices be handled before disposal?

  • Transferred to a new device
  • Securely erased or destroyed (correct)
  • Stored in a secure location
  • Left intact

What is considered off-limits for work communication?

  • Personal email services and messengers (correct)
  • Using company-provided email for personal communication
  • Instant messaging apps
  • Social media platforms

What is an example of using information assets for unauthorized purposes?

  • Accessing work-related documents from home
  • Distributing pirated software (correct)
  • Storing company data on personal cloud services
  • Using company-provided software for personal projects

What is an action that shows respect for information assets?

<p>Using assets only for authorized purposes (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Physical Security Quiz
9 questions

Physical Security Quiz

LucrativeMagenta avatar
LucrativeMagenta
Physical Security and Virtual World
20 questions
Physical Security Principles Quiz
40 questions

Physical Security Principles Quiz

WellPositionedCarolingianArt avatar
WellPositionedCarolingianArt
Physical Security Concepts Quiz
48 questions
Use Quizgecko on...
Browser
Browser