ICT topic 5 security policies

?

1. Most companies will have to cope with a situation that will cause the loss of hardware, software, data or communication services. This loss can be caused by;

  • Phising
  • Hacking
  • Hardware failure
  • Burnt building
1 of 5

Other questions in this quiz

2. Software that can help with a security strategy for example ...

  • Save in hidden area
  • Code it all
  • Encryption
  • Padlock

3. Peer To Peer

  • A small network where each computer has the same status, processing is local on a single PC, resources are shared.
  • Preferred choice for large networks. All computers are not the same status. Usually a more powerful computer is used as the central computer.

4. Definition of User Accounts

  • Does not allows the manager of the system to manage user accounts by ISSUEof access levels to users
  • Allows the manager of the system to manage user accounts by ALLOCATING of access levels to users
  • Allows the manager of the system to manage user accounts by ISSUE ofaccess levels to users
  • Does not allows the manager of the system to manage user accounts by ALLOCATING of access levels to users

5. There are 6 factors which influence the choice of a network, which one is included ?

  • Size of Database
  • Size of Storage
  • Size of Organisation
  • Size of Network
  • SIze of Company

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »