Data Security Awareness Refresher

Create an illustration showing various symbols of data security, such as a lock, shield, and data files, with a digital background that represents cyberspace and online safety.

Data Security Awareness Refresher

Enhance your understanding of data security and ensure you are equipped to handle sensitive information responsibly. This quiz will test your knowledge of data protection practices essential for today's digital workflows.

Key areas covered include:
- Information classification
- Data handling best practices
- Password security
- Handling personal information

20 Questions5 MinutesCreated by SecureFile240
Name:
Guide:
Once you select an answer it will automatically go to the next question.
You're not able to go back to the previous questions.
You can only answer once.
Guide:
Once you select an answer it will automatically go to the next question.
You're not able to go back to the previous questions.
You can only answer once.
What are the information that are available for external release? These are existing products, office locations and job offerings, to name a few.
Public
Internal Use Only
Confidential
Top secret
What are informations that are not to be leaked outside of the company? Samples are copies of contracts, reports, research data and product information.
Public
Internal Use Only
Confidential
Top secret
What information should be kept only within specified groups, like budget, survey results, and customer data?
Public
Internal Use Only
Confidential
Top secret
What information should be kept only within specific persons, like real virus and business alliance documents?
Public
Internal Use Only
Confidential
Top secret
This information are related to a natural person or a ‘Data Subject’, that can be used to directly or indirectly identify the person.
Personal Information
Privileged Information
Sensitive Information
Diet Information
Which of this is not a part of personal information?
Name
Address
Email Address
Favorite Food
These are sensitive personal information which, under the Rules of Court and other pertinent laws, constitutes privileged communication.
Personal Information
Privileged Information
Sensitive Information
Public Information
Which of this is not part of a Sensitive information?
Blood Type
Sex Life
Ethnic Origin
IP Address
This is an operation or set of operations performed on personal data or on sets of personal data whether or not by automated means.
Processing Documents
Processing Data
Processing Information
Processing Files
TRUE OR FALSE: Is priest and penitent part of Privileged Information
True
False
What is the best password to use?
Password
1234
#a11is%s33n
JohnDoe
TRUE or FALSE: It’s okay to share customer or employee information to unauthorized users.
True
False
Which is not a practice of Data Handling?
Shred physical documents or permanently delete files when no longer in use.
Do not store files on public folders, unsecured network servers, or unauthorized media.
Use only authorized devices protected with full-disk encryption.
For collaboration, such as sharing information and discussions, only use Messenger.
None of the above.
TRUE OR FALSE: For online storage purposes, use ONLY OneDrive for Business and Sharebox (official online storage tools) with your Trend Micro domain account.
True
False
TRUE OR FALSE: You can disclose any Trend Micro sensitive information (Top Secret, Confidential, Internal Use Only) in Social Media (i.e. Facebook, Twitter, LinkedIn, etc.).
True
False
TRUE OR FALSE: Before getting a file from customers device, you need to compress the file with password protected.
True
False
TRUE OR FALSE: You can leave computer workstations, mobile phones, laptops, tablets, or other devices unsecured.
True
False
THANK YOU FOR PARTICIPATING.
THANK YOU FOR PARTICIPATING.
{"name":"Data Security Awareness Refresher", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Enhance your understanding of data security and ensure you are equipped to handle sensitive information responsibly. This quiz will test your knowledge of data protection practices essential for today's digital workflows.Key areas covered include:- Information classification- Data handling best practices- Password security- Handling personal information","img":"https:/images/course8.png"}
Powered by: Quiz Maker