Please enter your email:

1. What should staff do to remotely connect to Cultural Infusion systems?


2. Which of the following is the strongest password?


3. Someone has emailed you a Word document, how can you check this is not a malicious file?


4. How should users with remote access privileges use their remote access connection?


5. What can you do to help you keep track of your passwords?


6. What should staff not do to their mobile devices?


7. Where should Cultural Infusion files be stored on your own devices?


8. What is the main reason it is important to store all work related files on the server?


9. What must be done with no longer required confidential papers?


10. What security protocols should be used with wireless network connections?


Question 1 of 10