IT Policies Training
![]() |
![]() |
![]() |
Title of test:![]() IT Policies Training Description: IT Policies Training |




New Comment |
---|
NO RECORDS |
Which of the following data are concidered "High Risk"? (select all that apply). Payroll. ITAR. Data Sheets. HIPPA. Forecasts. IP. Customer Information. Which of the following is a valid password? (Check all that apply). fruitrollup1. G1antSquid. X*ty1. W@iting4Godot. It is ok to access ITAR information from a foreign country as long as you are using encryption and a VPN. TRUE. FALSE. It is forbidden to use company phones for personal use. Even local calls. TRUE. FALSE. The following software is acceptable on your work PC so long as it is non-disruptive. (Check all that apply). Shareware (license unpaid). Shareware (license paid). Freeware. Licensed Software owned by user. Software owned by Crossbow for which Crossbow has enough Licenses. What happens to original disks and license keys once the software is installed?. It is kept at the users desk in case it needs to be reinstalled. It is turned over to IT for safe keeping. It is lost, never to be seen again. It is turned over to the departmental librarian. IT is a fountain of knowlege that knows everything about every peice of software ever written including the obscure hunka-junk I downloaded for kicks and can't seem to get working. They'll support anything and everything!. TRUE. FALSE. Which of the following Internet activies are prohibited. (Check all that apply). PORN!. Cyberstalking. Hacking other people. Warez trading. Setting up one's own business. All of the above (If you select this one, don't select the others). It is allowed to use email and instant messages for non-business purposes. TRUE. FALSE. Email can never be hunted down and deleted. Use extreme caution when sending messages that may be construed as dubious, sordid or ribald. TRUE. FALSE. |