Provision IT Policy Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rdclairm
R
Rdclairm
Community Contributor
Quizzes Created: 1 | Total Attempts: 251
| Attempts: 251 | Questions: 17
Please wait...
Question 1 / 17
0 %
0/100
Score 0/100
1. Which of the following is an example of a strong password?

Explanation

By using a strong password and changing it often, you prevent outsiders from gaining access to our company data

Submit
Please wait...
About This Quiz
Provision IT Policy Quiz - Quiz

When we are given computers at our work places there are some things we need to ensure we understand on its use. Do you know the entire do`s... see moreand don’ts when it comes to your company computer? Test how well you understand the IT policy by taking the quiz below. see less

2. If you receive an unsolicited telephone call from someone claiming to need your password, what would you do?

Explanation

This is one of the most common methods for gaining access to our network by outsiders.

Submit
3. Which is the best way to protect the sensitive data in your computer when you go out for lunch?

Explanation

Customer and client information can be accessed or viewed by investors, vendors, or contractors while you are away from your computer. Always lock your comptuer with a password while you are away.

Submit
4. Where should your important TEAM files be stored?

Explanation

All shared data should be stored in a team drive on the network where it is accessible and backed up.

Submit
5. Which of the following should NOT be accessed from your Provision computer?

Explanation

These activities have no place in a professional setting and should not be accessed using your computer.

Submit
6. The data on your computer and/or network drive is owned by...

Explanation

All data which is stored on your computer or any network drive is property of Provision Ministry Group.

Submit
7. If you find a portable USB drive on the ground, you should...

Explanation

This form of social engineering can be used to gain access to a computer or network. Outsiders may purposely "drop" a drive which contains a trojan virus or other malware which can give them outside access to our network or cause problems with your computer.

Submit
8. When connecting from your home office, up to how much time will the IT department work with you to get your computer connected?

Explanation

If you are a full-time home-based employee, the Provision IT Department will assist you with computer-related work issues at home. If you do not work full-time at home, IT will spend up to 20 minutes by phone to assist you with work related issues.

Submit
9. How often should your system password be changed?

Explanation

The current policy requires users to change their passwords every 30 days. Passwords must also be changed randomly and not follow any patterns.

Submit
10. If you have access to customer files, what must your screensaver/idle timeout be set to?

Explanation

The screensaver/idle timeout should be set to 10-15 minutes when you have access to customer files. This is necessary to ensure the security and privacy of the customer information. If the screensaver/idle timeout is set to a shorter time, there is a risk of unauthorized access to the customer files if the computer is left unattended. On the other hand, if the timeout is set to a longer time, there is a higher chance of someone accessing the customer files without proper authorization. Therefore, setting the screensaver/idle timeout to 10-15 minutes strikes a balance between security and convenience.

Submit
11. Which of the following conditions must be met when creating your computer password?

Explanation

Passwords must be at least 8 characters long and contain at least 3 of the following: uppercase, lowercase, numbers, and symbols.

Submit
12. According to the IT Policies, who may delegate authority to retrieve, monitor, access, copy, download, listen to or delete anything stored on or sent through an employee's computer?

Explanation

Only the People Services Manager or CEO have the right to grant this permission to any individual.

Submit
13. How often will you receive a new computer from the IT department?

Explanation

The current life-cycle for all laptops is 2-3 years and desktops 3-4 years. The IT Department tracks the life of every computer and will replace it when timing and budgeting allows. Please do not contact the IT department to request a new computer or ask when you will get a new one.

Submit
14. How can you contact the Provision IT Service Desk?

Explanation

You may call, email, or submit a ticket online. The IT personnel are very friendly and love to help, but they have short attention spans. If you ask for something when you bump into them in the hall, chances are they will be stopped by 5 other people and will probably forget your issue by the time they return to their desk. Please try to submit a ticket or call the IT service desk.

Submit
15. To whom may you give your computer login/password?

Explanation

You may not disclose your password to ANYONE except the IT Department in response to a specific call for service or in the execution of their regular assigned duties.

Submit
16. Which of the following are NOT permitted when accessing the Internet at work?

Explanation

The Internet is a tool that we use, but it can be abused by accessing materials inappropriate for Provision Ministry Group. Streaming videos and music drains network resources and causes the network to run slowly for everyone.

Submit
17. Which of the following file types should you NEVER open, even if it is from a coworker or friend (select 2)?

Explanation

These types of files can be used to execute viruses and malware. If you receive ANY attachment that is unsolicited, DO NOT OPEN IT and delete the email immediately.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 21, 2008
    Quiz Created by
    Rdclairm
Cancel
  • All
    All (17)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is an example of a strong password?
If you receive an unsolicited telephone call from someone claiming to...
Which is the best way to protect the sensitive data in your computer...
Where should your important TEAM files be stored?
Which of the following should NOT be accessed from your Provision...
The data on your computer and/or network drive is owned by...
If you find a portable USB drive on the ground, you should...
When connecting from your home office, up to how much time will the IT...
How often should your system password be changed?
If you have access to customer files, what must your screensaver/idle...
Which of the following conditions must be met when creating your...
According to the IT Policies, who may delegate authority to retrieve,...
How often will you receive a new computer from the IT department?
How can you contact the Provision IT Service Desk?
To whom may you give your computer login/password?
Which of the following are NOT permitted when accessing the Internet...
Which of the following file types should you NEVER open, even if it is...
Alert!

Advertisement