Search Header Logo

SecurityFundamentalsVocabReviewDay1

Computers

10th - 12th Grade

Used 2+ times

SecurityFundamentalsVocabReviewDay1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of eliminating a risk by choosing not to participate in an action or activity describes which of the following?

Risk avoidance

Risk mitigate

Residual risk

Risk acceptance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describes the constraints and practices that users must agree to in order to access the corporate network, corporate resources, and the internet

Acceptable use policy

Password policy

Security policy

Virtual secure mode (VSM)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Refers to the number of incorrect logon attempts permitted before a system locks an account. Each bad logon attempt is tracked by the bad logon counter, and when the counter exceeds the account lockout threshold, no further logon attempts are permitted.

account lockout

credential guad

fine-grained password policy

password setting object (PSO)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Windows security mechanism that protects security tokens by storing them in a virtual container separate from other processes

security policy

password settings object (PSO)

virtual secure mode (VSM)

group policy object (GPO)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password that gets access to an encrypted password file from a workstation or server. Once he or she has access, the attacker starts running password cracking tools against the file, with an eye toward breaking as many passwords as possible and leveraging them to further compromise the company’s network and systems.

password policy

cracked password

sniffers

strong password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password that is hard to guess because it is long and has a mix of different types of characters. It also has random enough where it could not be easily guessed.

strong password

cracked password

password settings policy (PSO)

password policy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A specially designed software (and in some cases hardware) applications that capture network packets as they traverse a network, displaying them for the attacker.

sniffers

device guard

credential guard

virtual secure mode (VSM)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?