L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

9th - 10th Grade

20 Qs

Digital Citizenship

Digital Citizenship

8th - 12th Grade

20 Qs

Cybersecurity & Intellectual Property Review

Cybersecurity & Intellectual Property Review

9th - 12th Grade

17 Qs

CyberSecurity Test Review (FCs)

CyberSecurity Test Review (FCs)

9th - 12th Grade

20 Qs

INTERNET

INTERNET

7th - 9th Grade

20 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

Year 8 Computing - Cyber Crime

Year 8 Computing - Cyber Crime

8th - 9th Grade

20 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

L3: Understanding Security Policies

L3: Understanding Security Policies

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Thomas Ray

Used 165+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The default password length for a Windows Server domain controller is:
0
5
7
14

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A network sniffer is software or hardware that:
Records user activity and transmits it to the server
Captures and analyzes network communication
Protects workstations from intrusions
Catalogs network data to create a secure index

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
Rainbow table
Brute force
Spidering
Dictionary

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Roblox requires a user name and password. How should Karl secure this password?

Save them to a text file

Enable session caching

Configure the browser to save passwords

Save it to an encrypted file

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which two characteristics would you recommend for Cames Joncannon's* Roblox password?

*Names, characters, businesses, places, events, locales, and incidents are either the products of the author's imagination or used in a fictitious manner. Any resemblance to actual persons, living or dead, or actual events is purely coincidental.

Hard to guess + Easy to remember

Includes Unicode characters + Easy to increment

Hard to guess + Unicode

Easy to remember + easy to increment

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Account lockout policies are used to prevent which type of security attack?
Brute force attacks
Users sharing passwords
Social engineering
Passwords being reused immediately

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is a common method for password collection?
Email attachments
Back door intrusions
SQL Injection
Network sniffers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?