Search Header Logo
Module 5, final concepts

Module 5, final concepts

Assessment

Presentation

Computers

7th - 12th Grade

Medium

Created by

Carissa Mulford

Used 1+ times

FREE Resource

17 Slides • 15 Questions

1

Module 5, final concepts

By Miranda Cauldwell

2

media

3

Multiple Choice

What is authentication?

1

Any method a computer uses to determine who or what can access it

2

Any method a computer uses to determine what a verified user can do

3

The record-keeping and tracking of user activities on a computer network

4

Multiple Choice

What is the purpose of Authorization?

1

Who can access the network?

2

What all can a person access on the network?

3

What all did the person access while on the network?

5

Multiple Choice

What is the purpose of Accounting?

1

Who can access the network?

2

What all can a person access on the network?

3

What all did the person access while on the network?

6

Multiple Choice

What is accounting?

1

Any method a computer uses to determine who or what can access it

2

Any method a computer uses to determine what a verified user can do

3

The record-keeping and tracking of user activities on a computer network

7

Multiple Choice

A ______ records events that occur in an OS or other software, or messages between different users of a communication software.

1

Cookie

2

Log file

3

Tracking

4

Cache

8

media

9

media

10

Multiple Choice

What does MAC stand for?

1

Mandatory Access Control

2

Mechanism Accessory Console

3

Migration Activity Console

11

media

12

Multiple Choice

As the owner of a spreadsheet, you can determine who in your environment has read only access and who has read/write access, what is this known as?

1

MAC

2

RBAC

3

DAC

4

TAC

13

media

14

media

15

media

16

Multiple Choice

Which of the following is an example of a biometric reading?

1

Password

2

Iris scan

3

PIN

4

SMS token

17

media

18

media

19

Multiple Choice

What is the benefit of using a SSO?

1

It is more secure since it is a form of two factor authentication

2

A user only has to log in once to access a lot of applications

3

This secures all applications since they have to log into each application

4

This method is secure since it requires a fingerprint to log-in

20

media

21

media

22

Multiple Choice

Which of the following is a password best practice?

1

Do not use a password manager

2

Never reuse passwords

3

Keep the passwords simple and not complex

4

Never have a password expiration date

23

Multiple Choice

Why should a user not use the same password across multiple websites?

1

In case a website is compromised and that password is captured

2

You can never trust any banking website

3

This is wrong, it is safe to reuse passwords across websites

4

It makes it easier to remember all the passwords if you do not reuse passwords

24

media

25

media

26

media

27

media

28

media

29

Multiple Choice

What is data that is physically stored in a digital form such as databases, spreadsheets, archives, or external storage drives?

1

Data in transit

2

Data at rest

3

Data in motion

4

Data in use

30

Multiple Choice

At what level is encryption for data at rest done?

1

The whole disk

2

The database

3

Individual files/folders

4

All of the above

31

Multiple Choice

What is the term used to describe data that is in transit through networks?

1

Data in transit

2

Data in motion

3

Data in flight

32

Multiple Choice

What is private data in transit?

1

Data sent via email

2

Data sent within a private network

3

Data sent via SMS

4

Data transferred from one computer to another via USB

Module 5, final concepts

By Miranda Cauldwell

Show answer

Auto Play

Slide 1 / 32

SLIDE