security best practices

security best practices

10th Grade - University

20 Qs

quiz-placeholder

Similar activities

E-Commerce

E-Commerce

University - Professional Development

16 Qs

DCN5511: Chapter 5 - 7

DCN5511: Chapter 5 - 7

University

15 Qs

TO PAS AIJ

TO PAS AIJ

11th Grade

20 Qs

Pengantar Teknologi Informasi 8

Pengantar Teknologi Informasi 8

University

17 Qs

MOTD 2 DSE-C

MOTD 2 DSE-C

University

20 Qs

Quize FTP Server

Quize FTP Server

10th - 11th Grade

19 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

12AIT - All About W3C <3

12AIT - All About W3C <3

10th Grade - University

18 Qs

security best practices

security best practices

Assessment

Quiz

Computers

10th Grade - University

Medium

Created by

Meredith Watkins

Used 150+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Due to a recent string of thefts in your office, you need to harden your local system.what action are most appropriate for your situation?
Install a hardware lock
disable unused services
install antimalware
buy a new computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What option can you configure on your workstation to increase security when you leave your desk?
file encryption
multi factor authentication
single sign-on
Screensaver password

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have just landed at the airport and have an unexpected six-hour layover. you want to use your smartphone to get some work done.what should you disable as a precautionary device hardening measure to help prevent potential attacks?
autofill
Bluetooth
polo
FFC

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Claire,a co-worker,is browsing the internet and wants to know if it's safe to enter her credit card information into a website.what do you tell her to look for?
HTTPS://
HTTP://
SSL://
TLS://

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You enabled file encryption on your local computer.while you were on vacation,one of your co-workers managed to get on your computer and share your important files with other users.how did they do this?
they logged on and disabled  encryption
they used the disk recovery tool to access the encrypted files.
all user logging into the system have access to encrypted files.
They logged on with your username and password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ray, a co-worker,is concerned that his computer is infected with adware. what symptoms should you tell ray to look for to confirm his suspicions?
Excessive pop-ups.
pizza
search polo
multifactor login redirection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software will help protect your computer from malicious network traffic?
Software firewall 
password complexity tool
antispyware
antivirus

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?