Physical Security for Shared Facilities and Equipment Quiz
4 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

How should data and software storage on mobile devices be handled before disposal?

  • Transferred to a new device
  • Securely erased or destroyed (correct)
  • Stored in a secure location
  • Left intact

What is considered off-limits for work communication?

  • Personal email services and messengers (correct)
  • Using company-provided email for personal communication
  • Instant messaging apps
  • Social media platforms

What is an example of using information assets for unauthorized purposes?

  • Accessing work-related documents from home
  • Distributing pirated software (correct)
  • Storing company data on personal cloud services
  • Using company-provided software for personal projects

What is an action that shows respect for information assets?

<p>Using assets only for authorized purposes (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Physical Security Quiz
9 questions

Physical Security Quiz

LucrativeMagenta avatar
LucrativeMagenta
Physical Security Fundamentals
8 questions
Physical Security and Virtual World
20 questions
Physical Security Concepts Quiz
48 questions
Use Quizgecko on...
Browser
Browser