Copyright

Computer Security Policies Examples

Instructions:

Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which of the following is a motivator for an organization to create a computer security policy?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Which of the following is an example of a requirement set forth in an acceptable use policy?

2. What is an example of an occurrence for which the disaster recovery policy would be needed?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

The questions in this quiz and worksheet will assess your understanding of computer security policies, such as data breach and disaster recovery policies. You can retake the multiple-choice quiz as many times as needed until you feel confident in your knowledge of these policies.

Quiz & Worksheet Goals

You'll be quizzed on the following topics:

  • Motivation for an organization to create a computer security policy
  • Example of a requirement set forth in an acceptable use policy
  • Events that would warrant the need for a disaster recovery policy
  • Criteria commonly defined in a data breach policy
  • Policies associated with remote access

Skills Practiced

  • Knowledge application - use your knowledge to answer questions about reasons to create a computer security policy
  • Critical thinking - apply relevant concepts to examine information about remote access in a different light
  • Information recall - access the knowledge you've gained regarding criteria commonly defined in a data breach policy

Additional Learning

Further your understanding of this topic with a related lesson titled Computer Security Policies Examples. Here are some of the topics you'll find in this lesson:

  • Cyber attacks
  • Acceptable use policy
  • Password use policy
  • Wireless communication policy
  • Data breach
Support