Security Fundamentals Review Day 2

Security Fundamentals Review Day 2

10th - 12th Grade

71 Qs

quiz-placeholder

Similar activities

Living Online Module Review (Part 1)

Living Online Module Review (Part 1)

9th - 10th Grade

69 Qs

Quiz bee 1st quarter

Quiz bee 1st quarter

10th Grade

73 Qs

Web Design final

Web Design final

9th - 12th Grade

71 Qs

مراجعة الوحدة الثالثة المايكروبت تقنية رقمية1-3

مراجعة الوحدة الثالثة المايكروبت تقنية رقمية1-3

11th Grade

72 Qs

TIK KELAS 7

TIK KELAS 7

KG - University

70 Qs

AP CSP AP Test Study

AP CSP AP Test Study

9th - 12th Grade

68 Qs

Python03条件判断

Python03条件判断

11th Grade - University

67 Qs

IBCA Semester Exam Review

IBCA Semester Exam Review

KG - University

66 Qs

Security Fundamentals Review Day 2

Security Fundamentals Review Day 2

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

71 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Creating MD5 hash for files is an example of ensuring what?

Confidentiality
Availability
Least privilege
Integrity

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Role separation improves server security by:

 Enforcing principle of least privilege.
Installing applications on separate hard disks.
Physically separating high security servers from other servers.
Placing servers on separate VLANs.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

The process of restricting access to a resource to only permitted users, applications, or computer systems.

access control

availability

attack surface

authorization

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The exposure, the reachable and exploitable vulnerabilities that a system or technology has.

attack surface

confidentiality

attack surface analysis

vulnerability assessment

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Helps to identify the attack surface that an organization may be susceptible to.

attack surface analysis

defense in depth

role separation

attack surface

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Describes a resource being accessible to a user, application, or computer system when required. In other words, availability means that when a user needs to get to information, he or she has the ability to do so.

availability

access control

authorization

attack surface analysis

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems.

confidentiality

attack surface

integrity

availability

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers