Data Breaches: Protection & Prevention


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

When should users share sign-in credentials?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 75,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Which of these is included in sign-in credentials for every user?

2. Which of these is the best approach to lost devices?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

This worksheet/quiz combo allows you to quickly measure your knowledge of data security best practices. You will identify security threats as well as common protocols for preventing breaches.

Quiz & Worksheet Goals

In this quiz and worksheet you'll assess your understanding of:

  • When users should share login information
  • The components of a standard login credential
  • Best practices for dealing with a lost device

Skills Practiced

  • Reading comprehension - ensure that you draw the most important information from the material, such as how a company should decide who has access to data
  • Making connections - use understanding of the concept of corporate data usage to identify why companies wish to keep data long term
  • Knowledge application - use your knowledge to answer questions about specific practices that will help prevent data breaches and improper use of credentials

Additional Learning

If you are still curious about this topic, review the lesson titled Data Breaches: Protection & Prevention. You will learn about concepts like:

  • Hardware vs. software breaches
  • What kind of culture a company should encourage to increase data security
  • How encryption helps prevent data from being used improperly