L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

Informatika Kelas 5 Bab 2

Informatika Kelas 5 Bab 2

5th Grade - University

19 Qs

PRUEBA FINAL COMPUTACION

PRUEBA FINAL COMPUTACION

1st Grade - University

18 Qs

HTML - podstawy

HTML - podstawy

9th Grade

18 Qs

TIN 11 BÀI 11 KIỂU MẢNG

TIN 11 BÀI 11 KIỂU MẢNG

11th Grade

18 Qs

Online Platform Block Q

Online Platform Block Q

11th - 12th Grade

20 Qs

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

20 Qs

Quis Internet

Quis Internet

11th Grade

20 Qs

L3: Understanding Security Policies

L3: Understanding Security Policies

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Thomas Ray

Used 167+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The default password length for a Windows Server domain controller is:

0
5
7
14

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A network sniffer is software or hardware that:

Records user activity and transmits it to the server
Captures and analyzes network communication
Protects workstations from intrusions
Catalogs network data to create a secure index

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?

Rainbow table
Brute force
Spidering
Dictionary

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Roblox requires a user name and password. How should Karl secure this password?

Save them to a text file

Enable session caching

Configure the browser to save passwords

Save it to an encrypted file

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which two characteristics would you recommend for Cames Joncannon's* Roblox password?

*Names, characters, businesses, places, events, locales, and incidents are either the products of the author's imagination or used in a fictitious manner. Any resemblance to actual persons, living or dead, or actual events is purely coincidental.

Hard to guess + Easy to remember

Includes Unicode characters + Easy to increment

Hard to guess + Unicode

Easy to remember + easy to increment

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Account lockout policies are used to prevent which type of security attack?

Brute force attacks
Users sharing passwords
Social engineering
Passwords being reused immediately

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is a common method for password collection?

Email attachments
Back door intrusions
SQL Injection
Network sniffers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?