ICT topic 5 security policies

HideShow resource information

1. Definition of User Accounts

  • Does not allows the manager of the system to manage user accounts by ISSUEof access levels to users
  • Does not allows the manager of the system to manage user accounts by ALLOCATING of access levels to users
  • Allows the manager of the system to manage user accounts by ALLOCATING of access levels to users
  • Allows the manager of the system to manage user accounts by ISSUE ofaccess levels to users
1 of 5

Other questions in this quiz

2. Most companies will have to cope with a situation that will cause the loss of hardware, software, data or communication services. This loss can be caused by;

  • Burnt building
  • Phising
  • Hardware failure
  • Hacking

3. There are 6 factors which influence the choice of a network, which one is included ?

  • Size of Organisation
  • SIze of Company
  • Size of Database
  • Size of Network
  • Size of Storage

4. Peer To Peer

  • A small network where each computer has the same status, processing is local on a single PC, resources are shared.
  • Preferred choice for large networks. All computers are not the same status. Usually a more powerful computer is used as the central computer.

5. Software that can help with a security strategy for example ...

  • Code it all
  • Encryption
  • Save in hidden area
  • Padlock

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »