Security Fundamentals Review Day 2

Security Fundamentals Review Day 2

10th - 12th Grade

71 Qs

quiz-placeholder

Similar activities

Final exam Review

Final exam Review

9th - 12th Grade

71 Qs

Access Control Unit 2

Access Control Unit 2

11th - 12th Grade

70 Qs

Final Review Activity

Final Review Activity

9th - 12th Grade

70 Qs

Computational thinking Year 9

Computational thinking Year 9

6th - 11th Grade

70 Qs

IT Mid Term Examination

IT Mid Term Examination

7th - 11th Grade

70 Qs

Server, Konsola, Virtual, AD, DHCP, DNS, NAT, IIS, FTP

Server, Konsola, Virtual, AD, DHCP, DNS, NAT, IIS, FTP

7th Grade - Professional Development

72 Qs

variables y constantes cartilla2 - PHP

variables y constantes cartilla2 - PHP

10th - 11th Grade

73 Qs

UTS-XII-TKJ

UTS-XII-TKJ

11th Grade

75 Qs

Security Fundamentals Review Day 2

Security Fundamentals Review Day 2

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

71 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Creating MD5 hash for files is an example of ensuring what?

Confidentiality
Availability
Least privilege
Integrity

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Role separation improves server security by:

 Enforcing principle of least privilege.
Installing applications on separate hard disks.
Physically separating high security servers from other servers.
Placing servers on separate VLANs.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

The process of restricting access to a resource to only permitted users, applications, or computer systems.

access control

availability

attack surface

authorization

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The exposure, the reachable and exploitable vulnerabilities that a system or technology has.

attack surface

confidentiality

attack surface analysis

vulnerability assessment

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Helps to identify the attack surface that an organization may be susceptible to.

attack surface analysis

defense in depth

role separation

attack surface

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Describes a resource being accessible to a user, application, or computer system when required. In other words, availability means that when a user needs to get to information, he or she has the ability to do so.

availability

access control

authorization

attack surface analysis

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems.

confidentiality

attack surface

integrity

availability

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?