Byoc Game 10 Security Challenge PDF
Document Details
Tags
Summary
This document is a quiz about BYOC (Bring Your Own Computer) security. It presents multiple-choice questions about best practices for using personal devices while working. The quiz covers topics such as verifying security software, safe file transfer methods, and handling suspicious emails. It is a quick quiz on security procedures.
Full Transcript
**GAME 10: BYOC SECURITY CHALLENGE** **1Introduction (10 seconds)** \"Welcome to the BYOC Device Security Challenge! This game will help assess your understanding of how to securely use personal devices while working with company resources.\" **2. Quiz Game (90 seconds)** Present 5 multiple-choi...
**GAME 10: BYOC SECURITY CHALLENGE** **1Introduction (10 seconds)** \"Welcome to the BYOC Device Security Challenge! This game will help assess your understanding of how to securely use personal devices while working with company resources.\" **2. Quiz Game (90 seconds)** Present 5 multiple-choice questions on the best practices for securely managing personal devices. Each question will have 4 options, with only one being the correct answer. 1\. Before accessing company files on your personal device, you should: \- A. Disable all firewalls \- B. Verify that your device has updated security software \- C. Share the device with friends and family \- D. Use any available internet connection **Correct Answer: B** 2\. What's the safest method to transfer sensitive work files using a BYOC device? \- A. Send it as an attachment in a personal email \- B. Use a secure file transfer tool \- C. Upload it to your social media account \- D. Use an outdated USB drive **Correct Answer: B** 3\. When installing new software on your personal device for work, you should: \- A. Ensure it's an authorized application \- B. Download any software without checking the source \- C. Disable antivirus software temporarily \- D. Install multiple versions of the same software **Correct Answer: A** 4\. What's the best action to take if you receive a suspicious email on your personal device? \- A. Forward it to your coworkers \- B. Delete it without reporting \- C. Open it to see if it\'s dangerous \- D. Report it to the IT security team **Correct Answer: D** 5\. If your BYOC device becomes compromised, the first step is to: \- A. Disconnect from the company network \- B. Continue working as usual \- C. Restart the device and try again later \- D. Use another device without notifying IT **Correct Answer: A** **3. Review and Conclusion (20 seconds)** Conclude by reviewing the answers and highlighting the importance of secure practices while using personal devices for work. **Scoring**: 4-5 correct answers: Excellent grasp of BYOC security! 2-3 correct answers: You're on the right track but could improve. 0-1 correct answers: Time for a BYOC security refresher course.