L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

Computer Science - X

Computer Science - X

8th - 10th Grade

20 Qs

Administrasi Infrastruktur Jaringan 1

Administrasi Infrastruktur Jaringan 1

11th Grade

20 Qs

Trắc nghiệm Bài 14_15 tin học K10

Trắc nghiệm Bài 14_15 tin học K10

10th Grade

20 Qs

Google

Google

7th - 12th Grade

20 Qs

BÀI 24-25 TIN 10

BÀI 24-25 TIN 10

10th Grade

20 Qs

Lecture Exercise Topic 1.3

Lecture Exercise Topic 1.3

12th Grade

21 Qs

PSTS1 Informatika

PSTS1 Informatika

10th Grade

17 Qs

مراجعة حاسب2 ثلاث وحدات

مراجعة حاسب2 ثلاث وحدات

11th Grade

16 Qs

L3: Understanding Security Policies

L3: Understanding Security Policies

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Thomas Ray

Used 167+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The default password length for a Windows Server domain controller is:

0
5
7
14

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A network sniffer is software or hardware that:

Records user activity and transmits it to the server
Captures and analyzes network communication
Protects workstations from intrusions
Catalogs network data to create a secure index

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?

Rainbow table
Brute force
Spidering
Dictionary

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Roblox requires a user name and password. How should Karl secure this password?

Save them to a text file

Enable session caching

Configure the browser to save passwords

Save it to an encrypted file

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which two characteristics would you recommend for Cames Joncannon's* Roblox password?

*Names, characters, businesses, places, events, locales, and incidents are either the products of the author's imagination or used in a fictitious manner. Any resemblance to actual persons, living or dead, or actual events is purely coincidental.

Hard to guess + Easy to remember

Includes Unicode characters + Easy to increment

Hard to guess + Unicode

Easy to remember + easy to increment

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Account lockout policies are used to prevent which type of security attack?

Brute force attacks
Users sharing passwords
Social engineering
Passwords being reused immediately

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is a common method for password collection?

Email attachments
Back door intrusions
SQL Injection
Network sniffers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?