The 'Discovia Security Awareness Training' quiz evaluates understanding of proper data handling, security protocols, and the importance of data encryption. It highlights misconceptions about network security and stresses the confidentiality of certain corporate data.
True
False
Rate this question:
True
False
Rate this question:
The usage is reasonable and does not interfere with the performance of the user’s job or the efficient conduct of Discovia’s business.
Does not include the use of your Discovia email address for non-business use
Does not include conducting Discovia business on non-business email accounts (such as gmail).
Does not include the installation of unlicensed or unapproved applications.
All of the above.
Rate this question:
Confidentiality, Integrity, Availability
Central Intelligence Agency
Culinary Institute of America
Character, Intelligence, Agreement
All of the above
Rate this question:
True
False
Rate this question:
It’s been cleared by my manager
It’s been cleared by a Senior Manager
The data is required for me to do my job
The data is encrypted and has been approved by my manager
None of the above
Rate this question:
Http://DiscoNet
The network F:\ Drive
The employee handbook
My new hire paperwork
Binders conveniently located in the office
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Turn it off immediately
Notify IT
Preserve the current state of the operating system
Disconnect the computer from the network
B,C, and D
Rate this question:
The client requires we use it
This is a trick question, installing software on my computer is never ok
The software is to make my computer perform better (anti-virus, reg cleaner.)
It is approved for use by IT Operations
There is a useful business application for it
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
The project manager should download the source file to their local laptop for further examination and/or repair.
The file should be emailed as an attachment to Operations and/or Forensics (as appropriate) for their examination and advice.
The file should be examined from the network drive or download locally to an Operations virtual machine or Forensics lab computer.
The file should be emailed to the client so they can confirm it has been corrected.
All of the above
Rate this question:
True
False
Rate this question:
The usage is limited to Terminal Server or OWA and company data is not stored locally
Actually it never is
It is not a Mac
It is approved by IT Operations
As a substitute for my company issued computer as long as I return the company machine to IT
Rate this question:
Never
After 90 Days
With CEO and/or President approval
If I intend to keep the stock for at least a year
B,C, and D
C and D
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.