L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

Internet Safety Review

Internet Safety Review

9th Grade

20 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Testout Security 4.1-4.2

Testout Security 4.1-4.2

11th Grade - University

20 Qs

Online Safety and Security Quiz

Online Safety and Security Quiz

11th Grade

20 Qs

8.4 Protection of data

8.4 Protection of data

9th - 12th Grade

20 Qs

APCSP IOC-2.B Cybersecurity and Encryption

APCSP IOC-2.B Cybersecurity and Encryption

9th - 12th Grade

20 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

L3: Understanding Security Policies

L3: Understanding Security Policies

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Thomas Ray

Used 166+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The default password length for a Windows Server domain controller is:
0
5
7
14

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A network sniffer is software or hardware that:
Records user activity and transmits it to the server
Captures and analyzes network communication
Protects workstations from intrusions
Catalogs network data to create a secure index

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your password is 1Vu*cI!8sT.
Which attack method is your password vulnerable to?
Rainbow table
Brute force
Spidering
Dictionary

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Roblox requires a user name and password. How should Karl secure this password?

Save them to a text file

Enable session caching

Configure the browser to save passwords

Save it to an encrypted file

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which two characteristics would you recommend for Cames Joncannon's* Roblox password?

*Names, characters, businesses, places, events, locales, and incidents are either the products of the author's imagination or used in a fictitious manner. Any resemblance to actual persons, living or dead, or actual events is purely coincidental.

Hard to guess + Easy to remember

Includes Unicode characters + Easy to increment

Hard to guess + Unicode

Easy to remember + easy to increment

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Account lockout policies are used to prevent which type of security attack?
Brute force attacks
Users sharing passwords
Social engineering
Passwords being reused immediately

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is a common method for password collection?
Email attachments
Back door intrusions
SQL Injection
Network sniffers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?