This test is run by .
Note that your final mark will not be saved in the system.
Note that your final mark will not be saved in the system.
Protection MatchUp
Target Level
Pass
Running Total
0
0%
Attempt
1 of 3
Click on a top box, then click on its match below. Or, drag a top box and drop it onto the correct match. Match all pairs before clicking ‘Check’.
Policies, e.g. information security
Disaster recovery procedures
Encryption
Principle of least privilege
Security staff
Staff training
Password
Staff access rights
Two-factor authentication
Rules and procedures that businesses use to protect against malware attacks, data breaches and loss, etc.
Allow, deny, read only, write, etc. to files and shared folders
Implemented after a data breach, or after a hazard such as flood, fire or equipment failure
Teaching users about the policies, and how to follow them
Uses two methods of identifying a user, e.g. something they know, are, have, location, etc.
Carry out walkthroughs of buildings and check people entering the building are authorised to
Giving users as little access to a computer system as possible by default
Converting plain text to cipher text using keys, to make data difficult to decode if intercepted
Combination of letters, numbers and symbols used to log in, used as well as a username