SecurityFundamentalsVocabReviewDay1

SecurityFundamentalsVocabReviewDay1

10th - 12th Grade

58 Qs

quiz-placeholder

Similar activities

Diagnóstico secundaria

Diagnóstico secundaria

9th - 12th Grade

58 Qs

DIMA 223 Final Exam (Digital Marketing)

DIMA 223 Final Exam (Digital Marketing)

12th Grade - University

53 Qs

Introduction to Engineering Design Semester Final

Introduction to Engineering Design Semester Final

9th - 12th Grade

62 Qs

HTML

HTML

4th Grade - University

63 Qs

array review

array review

9th - 12th Grade

60 Qs

Search Skills

Search Skills

8th - 12th Grade

57 Qs

UTS Spreadsheet X Ak

UTS Spreadsheet X Ak

10th Grade

60 Qs

IBA Lesson 3: Introduction to Internet Technology Vocabulary

IBA Lesson 3: Introduction to Internet Technology Vocabulary

9th - 12th Grade

53 Qs

SecurityFundamentalsVocabReviewDay1

SecurityFundamentalsVocabReviewDay1

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of eliminating a risk by choosing not to participate in an action or activity describes which of the following?

Risk avoidance

Risk mitigate

Residual risk

Risk acceptance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describes the constraints and practices that users must agree to in order to access the corporate network, corporate resources, and the internet

Acceptable use policy

Password policy

Security policy

Virtual secure mode (VSM)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Refers to the number of incorrect logon attempts permitted before a system locks an account. Each bad logon attempt is tracked by the bad logon counter, and when the counter exceeds the account lockout threshold, no further logon attempts are permitted.

account lockout

credential guad

fine-grained password policy

password setting object (PSO)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Windows security mechanism that protects security tokens by storing them in a virtual container separate from other processes

security policy

password settings object (PSO)

virtual secure mode (VSM)

group policy object (GPO)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password that gets access to an encrypted password file from a workstation or server. Once he or she has access, the attacker starts running password cracking tools against the file, with an eye toward breaking as many passwords as possible and leveraging them to further compromise the company’s network and systems.

password policy

cracked password

sniffers

strong password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password that is hard to guess because it is long and has a mix of different types of characters. It also has random enough where it could not be easily guessed.

strong password

cracked password

password settings policy (PSO)

password policy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A specially designed software (and in some cases hardware) applications that capture network packets as they traverse a network, displaying them for the attacker.

sniffers

device guard

credential guard

virtual secure mode (VSM)

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?