Physical Security for Shared Facilities and Equipment Quiz
4 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

How should data and software storage on mobile devices be handled before disposal?

  • Transferred to a new device
  • Securely erased or destroyed (correct)
  • Stored in a secure location
  • Left intact
  • What is considered off-limits for work communication?

  • Personal email services and messengers (correct)
  • Using company-provided email for personal communication
  • Instant messaging apps
  • Social media platforms
  • What is an example of using information assets for unauthorized purposes?

  • Accessing work-related documents from home
  • Distributing pirated software (correct)
  • Storing company data on personal cloud services
  • Using company-provided software for personal projects
  • What is an action that shows respect for information assets?

    <p>Using assets only for authorized purposes</p> Signup and view all the answers

    More Like This

    Physical Security Fundamentals
    8 questions
    Physical Security and Virtual World
    20 questions
    Physical Security Principles Quiz
    40 questions

    Physical Security Principles Quiz

    WellPositionedCarolingianArt avatar
    WellPositionedCarolingianArt
    Physical Security Concepts Quiz
    48 questions
    Use Quizgecko on...
    Browser
    Browser