Security For IT Users Mock 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Gillyjim
G
Gillyjim
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,896
Questions: 36 | Attempts: 4,901

SettingsSettingsSettings
SecurITy For IT Users Mock 1 - Quiz

In modern times, the use of computers and the internet in particular has never been more important. As such, it’s even more important that you know how to safely conduct yourself online. Take the quiz to find out how.


Questions and Answers
  • 1. 

     Question 1 - Unwanted unsolicited messages, sent by unknown sources, are known as?    

    • A.

      Viruses

    • B.

      Trojans

    • C.

      Hoaxes

    • D.

      Spam

    Correct Answer
    D. Spam
    Explanation
    Unwanted unsolicited messages, sent by unknown sources, are commonly referred to as "spam". Spam messages are typically sent in bulk and can include various types of content such as advertisements, scams, or malicious links. The term "spam" originated from a Monty Python skit in which the word was repeated excessively, much like how unwanted messages can flood someone's inbox. Spam is a nuisance and can be harmful if it contains malware or attempts to deceive recipients.

    Rate this question:

  • 2. 

    Question 2 - A computer can be protected from the risk of unwanted emails by?

    • A.

      Using anti-virus software

    • B.

      Using anti-spam software

    • C.

      Never using free email sites.

    • D.

      Using a firewall

    Correct Answer
    B. Using anti-spam software
    Explanation
    A computer can be protected from the risk of unwanted emails by using anti-spam software. Anti-spam software is specifically designed to filter and block unwanted or unsolicited emails, minimizing the risk of receiving spam messages in your inbox.

    Rate this question:

  • 3. 

    Question 3 - Which one of the following describes how a virus can enter a computer

    • A.

      By installing licensed software

    • B.

      By forwarding email attachments from an unknown source

    • C.

      By opening email attachments from an unknown source

    • D.

      By not downloading files from obscure websites.

    Correct Answer
    C. By opening email attachments from an unknown source
    Explanation
    Opening email attachments from an unknown source can allow a virus to enter a computer. Viruses can be attached to emails and when the attachment is opened, the virus is executed, infecting the computer. It is important to be cautious when opening attachments from unknown sources to avoid the risk of virus infection.

    Rate this question:

  • 4. 

    Question 4 - What action should you take if you receive a chain letter email?

    • A.

      Forward the email to others

    • B.

      Download it onto your system

    • C.

      Open it immediately

    • D.

      Delete the email

    Correct Answer
    D. Delete the email
    Explanation
    If you receive a chain letter email, the best action to take is to delete the email. Chain letters are usually considered spam and can be annoying or even harmful. Forwarding the email to others can contribute to the spread of spam and potentially harm others. Downloading the email onto your system can put your computer at risk of viruses or malware. Opening it immediately can also be risky as it may contain harmful content. Therefore, the safest and most appropriate action is to delete the email.

    Rate this question:

  • 5. 

    Question 5 -Which one fo the following best describes phishing??

    • A.

      An email directing the recipient to enter personal details on a fake website

    • B.

      An email warning the recipient of a computer virus threat

    • C.

      An email advertyising a department store

    • D.

      An unwanted email that installs a virus on the recipeint's computer

    Correct Answer
    A. An email directing the recipient to enter personal details on a fake website
    Explanation
    Phishing is a type of cyber attack where the attacker poses as a legitimate entity and tries to deceive the recipient into providing their personal information, such as passwords or credit card details, by directing them to a fake website that looks authentic. This answer accurately describes phishing as it involves an email that directs the recipient to enter personal details on a fake website, which is a common tactic used by phishers to steal sensitive information from unsuspecting individuals.

    Rate this question:

  • 6. 

    Question 6 - To ensure that anti-virus software is effective you must?

    • A.

      Install windows software updates

    • B.

      Update the anti-virus software regularly

    • C.

      Restrict computer access to known persons

    • D.

      Install the latest versions of software

    Correct Answer
    B. Update the anti-virus software regularly
    Explanation
    To ensure that anti-virus software is effective, it is necessary to update it regularly. This is because new viruses and malware are constantly being developed, and updating the software allows it to stay up-to-date with the latest threats. By regularly updating the anti-virus software, it can effectively detect and remove any new viruses or malware that may infect the system. Installing windows software updates, restricting computer access to known persons, and installing the latest versions of software are also important for overall system security, but they do not specifically address the effectiveness of the anti-virus software.

    Rate this question:

  • 7. 

    Question 7 - Which one of the following will minimize the risk of your computer from being infected by a malicious program?

    • A.

      PC diadnostic software

    • B.

      Anti-spyware software

    • C.

      Key management software

    • D.

      Anti-spam software

    Correct Answer
    B. Anti-spyware software
    Explanation
    Using anti-spyware software helps minimize the risk of a computer being infected by a malicious program. Spyware is a type of malicious software that can collect personal information, monitor online activities, and cause other harmful effects. Anti-spyware software is specifically designed to detect and remove spyware from a computer system, thereby reducing the risk of infection. This software scans the system for any signs of spyware, blocks malicious websites, and provides real-time protection against potential threats. By using anti-spyware software, users can protect their computers and personal information from being compromised by malicious programs.

    Rate this question:

  • 8. 

    Question 8 - Which product below protects a computer from the risk of malicious programs?

    • A.

      PC diagnostic software.

    • B.

      Anti-spyware software.

    • C.

      Key management software

    • D.

      Anti-spam software

    Correct Answer
    B. Anti-spyware software.
    Explanation
    Anti-spyware software is designed to protect a computer from malicious programs that are specifically designed to spy on the user's activities, gather personal information, and transmit it to unauthorized third parties. It detects and removes spyware, adware, and other potentially unwanted programs that can compromise the security and privacy of the computer. PC diagnostic software is used to diagnose and troubleshoot hardware and software issues, key management software is used for managing encryption keys, and anti-spam software is used to filter and block unwanted email messages.

    Rate this question:

  • 9. 

    Question 9 - Internet-based attacks on your computer are prevented by which of the following?

    • A.

      Firewall software

    • B.

      Anti-spam software

    • C.

      Anti-virus software

    • D.

      Anti Malware software

    Correct Answer
    A. Firewall software
    Explanation
    Firewall software is designed to prevent unauthorized access to a computer or network by monitoring and controlling incoming and outgoing network traffic. It acts as a barrier between the internal network and the internet, filtering out potential threats and blocking malicious traffic. Unlike anti-spam, anti-virus, and anti-malware software which primarily focus on specific types of threats, firewall software provides a more comprehensive protection by blocking various types of internet-based attacks such as hacking attempts, malware, and unauthorized access. Therefore, firewall software is the most effective solution for preventing internet-based attacks on a computer.

    Rate this question:

  • 10. 

    Question 10 -A computer hacker can be described as?

    • A.

      A skilled programmer who writes computer games.

    • B.

      A skilled programmer who creates software and trains youngsters on how to write software.

    • C.

      A skilled programmer who uses authorised access to exploit information available on a computer.

    • D.

      A skilled programmer who secretly invades computers without authorisation.

    Correct Answer
    D. A skilled programmer who secretly invades computers without authorisation.
    Explanation
    The correct answer is "A skilled programmer who secretly invades computers without authorization." This answer accurately describes a computer hacker as someone who uses their programming skills to gain unauthorized access to computers and exploit the information available on them. Hackers often break into computer systems without permission and may engage in activities such as stealing data, causing damage, or engaging in illegal activities.

    Rate this question:

  • 11. 

    Question 11 - Using the default password on a network is a security risk. Which is the most serious?

    • A.

      Easy visibility to other users.

    • B.

      Fast access.

    • C.

      High resistance to application of updates.

    • D.

      Low resistance to potential hackers.

    Correct Answer
    D. Low resistance to potential hackers.
    Explanation
    Using the default password on a network is a security risk because it makes it easier for potential hackers to gain unauthorized access to the network. This is the most serious issue among the options given because it directly compromises the security of the network and can lead to unauthorized access, data breaches, and other malicious activities. Easy visibility to other users, fast access, and high resistance to application of updates may also pose security risks, but they are not as severe as low resistance to potential hackers.

    Rate this question:

  • 12. 

    Question 12 - Your user information, including your password, can be changed using which of the following?

    • A.

      Task manager.

    • B.

      Control Panel.

    • C.

      MS Word Options.

    • D.

      Windows Firewall.

    Correct Answer
    B. Control Panel.
    Explanation
    The Control Panel is a feature in Windows operating systems that allows users to view and change system settings. Within the Control Panel, there are various options for managing user information, including the ability to change passwords. The Task Manager is used to monitor and manage running processes, not to change user information. MS Word Options is specific to Microsoft Word and does not have the capability to change user information. Windows Firewall is used to manage network connections and security settings, but it does not provide options for changing user information. Therefore, the correct answer is Control Panel.

    Rate this question:

  • 13. 

    Question 13 - The BEST way to remember a password is?

    • A.

      Commit it to memory

    • B.

      Keep a note of it in your wallet.

    • C.

      Tell your manager.

    • D.

      Use the name of your Cat.

    Correct Answer
    A. Commit it to memory
    Explanation
    Committing a password to memory is the best way to remember it because it eliminates the risk of someone finding and using the password if it is written down or stored in a physical location like a wallet. Remembering the password also ensures that it is readily accessible whenever needed, without the need to rely on external sources or disclosing it to others. Using the name of a cat or any other personal information as a password is not recommended as it can be easily guessed or hacked.

    Rate this question:

  • 14. 

    Question 14 - A user name and password are entered when logging onto a computer. Which one of the following is a feature of using a user name?

    • A.

      It authenticates the user and gives access to all information.

    • B.

      It limits access to relevant levels of information.

    • C.

      It enables an accurate audit trail of transactions to be kept.

    • D.

      It gives the user anonymity.

    Correct Answer
    B. It limits access to relevant levels of information.
    Explanation
    A user name is used to identify a specific user and is typically associated with certain privileges or access levels. By using a user name, the system can limit access to only the relevant levels of information that the user is authorized to access. This helps to ensure that users can only view or modify the information that is necessary for their role or responsibilities, enhancing security and protecting sensitive data from unauthorized access.

    Rate this question:

  • 15. 

    Question 15 - Why should users log off from a computer when they are finished for the day?

    • A.

      To reduce the use of electricity.

    • B.

      To prevent data from getting corrupted.

    • C.

      To prevent unauthorised access to data

    • D.

      To cool off the hardware

    Correct Answer
    C. To prevent unauthorised access to data
    Explanation
    Logging off from a computer when finished for the day helps prevent unauthorized access to data. When a user logs off, their session is terminated, and any sensitive information or personal data that may be stored on the computer remains protected. This is especially important in shared or public computer environments, where other users may attempt to access or misuse someone else's data if they are not logged off properly. Logging off also ensures that any active connections or processes are terminated, reducing the risk of data corruption or unauthorized activity.

    Rate this question:

  • 16. 

    Question 16 - Which one of the following statements shows respect for confidentiality of information?

    • A.

      Discussing confidential information over a telephone line.

    • B.

      Uploading confidential information to a shared web site.

    • C.

      Disclosing confidential information only to authorised systems or individuals

    • D.

      Posting confidential data on your company notice board

    Correct Answer
    C. Disclosing confidential information only to authorised systems or individuals
    Explanation
    The correct answer is "Disclosing confidential information only to authorised systems or individuals." This statement demonstrates respect for confidentiality by ensuring that confidential information is only shared with those who have the proper authorization and need-to-know. This helps to protect sensitive information from being accessed or disclosed to unauthorized individuals or systems, maintaining its confidentiality and integrity.

    Rate this question:

  • 17. 

    Question 17 - If you disclose inappropriate or personal information on a fake website, which one of the following is the MOST damaging consequence?

    • A.

      Theft of identity.

    • B.

      Data corruption.

    • C.

      Loss of job.

    • D.

      Intimidation

    Correct Answer
    A. Theft of identity.
    Explanation
    Disclosing inappropriate or personal information on a fake website can lead to the theft of identity. This means that someone can use the information provided to impersonate the individual, potentially causing financial loss, damage to their reputation, and even legal issues. Identity theft is a serious consequence that can have long-lasting and damaging effects on an individual's life.

    Rate this question:

  • 18. 

    Question 18 - Why do we use a PIN number on a mobile device?

    • A.

      It encrypts information being stored on a computer

    • B.

      It protects information from risk of unauthorised access.

    • C.

      It decrypts information being stored on a computer

    • D.

      It removes the need for a password.

    Correct Answer
    B. It protects information from risk of unauthorised access.
    Explanation
    A PIN number is used on a mobile device to protect information from the risk of unauthorized access. This means that without the correct PIN, someone cannot access the information stored on the mobile device, ensuring that the data remains secure and confidential.

    Rate this question:

  • 19. 

    Question 19 - Which one of the following is a facility of a public network?

    • A.

      Public service.

    • B.

      No data security

    • C.

      . Access to all confidential information

    • D.

      Resource sharing

    Correct Answer
    D. Resource sharing
    Explanation
    Resource sharing is a facility of a public network. In a public network, multiple users can access and share resources such as files, printers, and databases. This allows for efficient utilization of resources and promotes collaboration among users. However, it is important to note that while resource sharing is a feature of a public network, it does not necessarily mean that there is no data security or that there is access to all confidential information. These aspects depend on the specific security measures and access controls implemented in the network.

    Rate this question:

  • 20. 

    Question 20 - Which one of the following statements about wireless networks is TRUE?

    • A.

      They cannot be intercepted by unknown users.

    • B.

      They can be visible and accessible to other users.

    • C.

      They work over long distances.

    • D.

      They limit accessibility to other users.

    Correct Answer
    B. They can be visible and accessible to other users.
    Explanation
    Wireless networks can be visible and accessible to other users. Unlike wired networks, where physical access is required to intercept data, wireless networks transmit data through radio waves, which can be intercepted by anyone within range. This poses a security risk as unauthorized users can potentially access and exploit the network. Therefore, it is important to implement security measures such as encryption and password protection to safeguard wireless networks.

    Rate this question:

  • 21. 

    Question 21 - Using an unsecured network is sometimes unavoidable, which one of the following describes how confidential information should be sent in that situation?

    • A.

      In a compressed only format.

    • B.

      In an encrypted format.

    • C.

      In an unsigned email.

    • D.

      As quickly as possible.

    Correct Answer
    B. In an encrypted format.
    Explanation
    When using an unsecured network, it is important to protect confidential information. The best way to do this is by sending the information in an encrypted format. Encryption ensures that the data is scrambled and can only be accessed by authorized individuals with the correct decryption key. This adds an extra layer of security and helps to prevent unauthorized access or interception of the confidential information.

    Rate this question:

  • 22. 

    Question 22 - Which one of the following describes Bluetooth?

    • A.

      . Long-range wireless protocol for exchanging data

    • B.

      Short-range wireless protocol for exchanging data

    • C.

      Long-range wired protocol for exchanging data

    • D.

      Short-range wired protocol for exchanging data

    Correct Answer
    B. Short-range wireless protocol for exchanging data
    Explanation
    Bluetooth is a short-range wireless protocol used for exchanging data. It allows devices to connect and communicate with each other wirelessly over short distances. Bluetooth technology is commonly used for connecting devices such as smartphones, tablets, laptops, and headphones to each other, enabling the transfer of data, audio, and other information between them.

    Rate this question:

  • 23. 

    Question 23 - Where would the guidelines and procedures for the secure use of IT within an organization be held?

    • A.

      The IT Department.

    • B.

      The Company Director’s office.

    • C.

      The Purchasing Department

    • D.

      The Sales Department.

    Correct Answer
    A. The IT Department.
    Explanation
    The guidelines and procedures for the secure use of IT within an organization would be held in the IT Department. This department is responsible for managing and maintaining the organization's IT infrastructure and ensuring its security. They would have the necessary expertise and knowledge to develop and enforce these guidelines and procedures to protect the organization's IT systems and data from potential threats and breaches.

    Rate this question:

  • 24. 

    Question 24 - How would you find out about an organisation’s privacy policy?

    • A.

      By reading the latest issue of the Financial Times

    • B.

      By speaking to the Finance Department.

    • C.

      By reading the policy in the organisation’s policy manual

    • D.

      By speaking to the Sales Department

    Correct Answer
    C. By reading the policy in the organisation’s policy manual
    Explanation
    To find out about an organization's privacy policy, one would need to read the policy in the organization's policy manual. This is the most reliable and direct source of information regarding the organization's privacy practices and guidelines. The Financial Times may provide information about the organization, but it is unlikely to have specific details about the privacy policy. Speaking to the Finance Department or the Sales Department may provide some insights, but it is not guaranteed that they would have the most up-to-date or comprehensive information on the privacy policy. Therefore, the best option is to refer to the organization's policy manual.

    Rate this question:

  • 25. 

    Question 25 - If you wanted to use a device that is NOT part of the organisation’s IT infrastructure, what IT security checks should you carry out before using it?

    • A.

      The checks listed in the device manual

    • B.

      Interview the requesting person

    • C.

      The checks advised by a fellow worker

    • D.

      The checks listed in the organisation’s security policy

    Correct Answer
    D. The checks listed in the organisation’s security policy
    Explanation
    The correct answer is to refer to the organization's security policy because it is the official document that outlines the specific security measures and checks that need to be followed. The device manual may provide some information, but it may not cover all the necessary security checks. Interviewing the requesting person or relying on the advice of a fellow worker may not guarantee adherence to proper security protocols. Therefore, the organization's security policy is the most reliable source for determining the appropriate IT security checks before using a device not part of the organization's IT infrastructure.

    Rate this question:

  • 26. 

    Question 26 - If you were asked to allow access to a shared IT resource, who would you ask if you were unsure of the security procedure?

    • A.

      A technically well-informed team member

    • B.

      A senior member of the cleaning Department

    • C.

      The Systems Administrator

    • D.

      . The Maintenance Department

    Correct Answer
    C. The Systems Administrator
    Explanation
    The Systems Administrator would be the appropriate person to ask if unsure of the security procedure for accessing a shared IT resource. They are responsible for managing and maintaining the IT systems, including security protocols and procedures. As an expert in their field, they would have the knowledge and understanding of the necessary security measures to ensure the resource is accessed safely and securely.

    Rate this question:

  • 27. 

    Question 27 - How would a breach in IT security be reported?

    • A.

      By letter to your manager

    • B.

      Using the telephone

    • C.

      Using the channel identified in the organisation’s security policy

    • D.

      By emailing the IT Manager.

    Correct Answer
    C. Using the channel identified in the organisation’s security policy
    Explanation
    A breach in IT security would be reported using the channel identified in the organization's security policy. This means that there is a specific method or process outlined in the policy that employees should follow when reporting a security breach. This could include using a specific reporting system or contacting a designated person or department within the organization. By following the established channel, the organization can ensure that the breach is reported promptly and to the appropriate individuals who can take the necessary actions to address and mitigate the security issue.

    Rate this question:

  • 28. 

    Question 28 - If you were to select a large group of adjacent files and delete them, What could be an unexpected consequence?

    • A.

      The computer may crash

    • B.

      The selected files will be moved to the Recycle Bin

    • C.

      An important file may accidentally be deleted

    • D.

      A delete file confirmation window may appear

    Correct Answer
    C. An important file may accidentally be deleted
    Explanation
    If a large group of adjacent files is selected and deleted, there is a possibility that an important file may be accidentally deleted. This can happen if the user mistakenly includes the important file in the selection or if the user is not aware of the contents of the files being deleted. Therefore, it is important to double-check the selection before proceeding with the deletion to avoid any unintended consequences.

    Rate this question:

  • 29. 

    Question 29 - What could happen if a computer suddenly malfunctions due to overheating?

    • A.

      The operating system will automatically save all files and shutdown.

    • B.

      All open files will be recovered

    • C.

      All off-site backups will be lost.

    • D.

      Any files saved only on the hard disk of the computer may be lost.

    Correct Answer
    D. Any files saved only on the hard disk of the computer may be lost.
    Explanation
    If a computer suddenly malfunctions due to overheating, any files saved only on the hard disk of the computer may be lost. This is because the overheating can cause damage to the hard disk, leading to data corruption or loss. While the operating system may automatically save and shutdown, and open files may be recovered, any files that were only saved on the hard disk may not be recoverable if it becomes damaged. Off-site backups, which are stored separately from the computer, would not be affected by the overheating and therefore would not be lost.

    Rate this question:

  • 30. 

    Question 30 - Why it is important to have a secure, off-site backup copy of files?

    • A.

      To ensure that in the event of fire, flood or theft backup files are not destroyed

    • B.

      To make the files easily accessible to other locations of the organisation

    • C.

      To enable speedy recovery

    • D.

      To reduce the chance of data corruption due to a virus attack

    Correct Answer
    A. To ensure that in the event of fire, flood or theft backup files are not destroyed
    Explanation
    Having a secure, off-site backup copy of files is important to ensure that in the event of fire, flood, or theft, the backup files are not destroyed. Storing backups off-site protects them from physical damage or loss that could occur at the primary location. This ensures that even if the original files are destroyed or inaccessible, the backup copies can be retrieved and used for recovery purposes. By keeping backups in a separate location, organizations can mitigate the risk of losing important data due to unforeseen circumstances.

    Rate this question:

  • 31. 

    Question 31 - How can you best safeguard your personal data?

    • A.

      Keep it in your pocket

    • B.

      Using misleading file names

    • C.

      Saving files in your Documents folder

    • D.

      Making multiple copies of the data.

    Correct Answer
    D. Making multiple copies of the data.
    Explanation
    Making multiple copies of the data is the best way to safeguard personal data. By creating multiple copies, you can ensure that even if one copy is lost or compromised, you still have other copies as backups. This helps to minimize the risk of data loss and increases the chances of data recovery in case of any unforeseen events such as hardware failure or cyber attacks.

    Rate this question:

  • 32. 

    Question 32 - Which one of the following should you use to backup personal data?

    • A.

      A storage device, clearly labelled

    • B.

      A printout

    • C.

      A website offering a file sharing service

    • D.

      A shared area on a server

    Correct Answer
    A. A storage device, clearly labelled
    Explanation
    A storage device, clearly labelled, should be used to backup personal data because it provides a physical and secure way to store and retrieve data. By clearly labelling the storage device, it becomes easier to identify and access the specific backup files when needed. Additionally, using a storage device allows for offline access to the backup data, ensuring that it is not dependent on an internet connection or the availability of a specific website or server.

    Rate this question:

  • 33. 

    Question 33 - How would you prevent theft of your laptop if you needed to leave your desk for a short period?

    • A.

      Leave it with a security guard

    • B.

      Leave it with your supervisor

    • C.

      . Close the lid

    • D.

      Use a security cable to secure it to the desk

    Correct Answer
    D. Use a security cable to secure it to the desk
    Explanation
    Using a security cable to secure the laptop to the desk is an effective way to prevent theft. This ensures that the laptop cannot be easily taken or moved without removing the cable, providing a physical barrier against theft. Leaving it with a security guard or supervisor may not be feasible or available in all situations, and simply closing the lid does not provide any physical security.

    Rate this question:

  • 34. 

    Question 34 - Where would be a safe place to keep your MP3 player whilst you are in a public place?

    • A.

      Out of sight, on your person

    • B.

      Leave it on the bar

    • C.

      In your jacket pocket hanging over a chair

    • D.

      In your open bag on the floor

    Correct Answer
    A. Out of sight, on your person
    Explanation
    Keeping your MP3 player out of sight and on your person is a safe place to keep it while in a public place. This reduces the risk of it being stolen or lost. Leaving it on the bar or in your open bag on the floor makes it easily accessible to others, increasing the chances of it being taken. Placing it in your jacket pocket hanging over a chair also poses a risk as it could easily fall out or be taken without your knowledge. Therefore, the best option is to keep it on your person where it is secure and not easily visible to potential thieves.

    Rate this question:

  • 35. 

    Question 35 - How could confidential data stored on a USB memory stick be lost?

    • A.

      When the data stored on the storage device is encrypted

    • B.

      When the storage device is lost or stolen during transit

    • C.

      When the data files on the storage device are scanned for viruses.

    • D.

      When the storage device is accessed by a wireless device

    Correct Answer
    B. When the storage device is lost or stolen during transit
    Explanation
    Confidential data stored on a USB memory stick can be lost when the storage device is lost or stolen during transit. This means that if the USB memory stick is misplaced or stolen while being transported from one location to another, the confidential data stored on it can be accessed by unauthorized individuals. This highlights the importance of ensuring the security and protection of sensitive data during transportation to prevent potential data breaches.

    Rate this question:

  • 36. 

    Question 36 - How could a portable or removable device can be protected from theft when NOT in use?

    • A.

      By using a firewall

    • B.

      By using a device lock

    • C.

      By using anti virus software

    • D.

      By locking it in a drawer

    Correct Answer
    B. By using a device lock
    Explanation
    A device lock is a physical security measure that can be used to protect a portable or removable device from theft when it is not in use. It typically involves using a lock or a cable to secure the device to a fixed object, such as a desk or a wall. This prevents unauthorized individuals from easily stealing the device. By using a device lock, the device is physically secured and can provide an additional layer of protection against theft.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 05, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 06, 2010
    Quiz Created by
    Gillyjim
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.