
SecurityFundamentalsVocabReviewDay1
Computers
10th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
58 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of eliminating a risk by choosing not to participate in an action or activity describes which of the following?
Risk avoidance
Risk mitigate
Residual risk
Risk acceptance
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describes the constraints and practices that users must agree to in order to access the corporate network, corporate resources, and the internet
Acceptable use policy
Password policy
Security policy
Virtual secure mode (VSM)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refers to the number of incorrect logon attempts permitted before a system locks an account. Each bad logon attempt is tracked by the bad logon counter, and when the counter exceeds the account lockout threshold, no further logon attempts are permitted.
account lockout
credential guad
fine-grained password policy
password setting object (PSO)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Windows security mechanism that protects security tokens by storing them in a virtual container separate from other processes
security policy
password settings object (PSO)
virtual secure mode (VSM)
group policy object (GPO)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password that gets access to an encrypted password file from a workstation or server. Once he or she has access, the attacker starts running password cracking tools against the file, with an eye toward breaking as many passwords as possible and leveraging them to further compromise the company’s network and systems.
password policy
cracked password
sniffers
strong password
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password that is hard to guess because it is long and has a mix of different types of characters. It also has random enough where it could not be easily guessed.
strong password
cracked password
password settings policy (PSO)
password policy
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A specially designed software (and in some cases hardware) applications that capture network packets as they traverse a network, displaying them for the attacker.
sniffers
device guard
credential guard
virtual secure mode (VSM)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?