
SecurityFundamentalsVocabReviewDay1
Quiz
•
Computers
•
10th - 12th Grade
•
Medium
Used 2+ times
FREE Resource
Enhance your content in a minute
58 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of eliminating a risk by choosing not to participate in an action or activity describes which of the following?
Risk avoidance
Risk mitigate
Residual risk
Risk acceptance
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describes the constraints and practices that users must agree to in order to access the corporate network, corporate resources, and the internet
Acceptable use policy
Password policy
Security policy
Virtual secure mode (VSM)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refers to the number of incorrect logon attempts permitted before a system locks an account. Each bad logon attempt is tracked by the bad logon counter, and when the counter exceeds the account lockout threshold, no further logon attempts are permitted.
account lockout
credential guad
fine-grained password policy
password setting object (PSO)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Windows security mechanism that protects security tokens by storing them in a virtual container separate from other processes
security policy
password settings object (PSO)
virtual secure mode (VSM)
group policy object (GPO)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password that gets access to an encrypted password file from a workstation or server. Once he or she has access, the attacker starts running password cracking tools against the file, with an eye toward breaking as many passwords as possible and leveraging them to further compromise the company’s network and systems.
password policy
cracked password
sniffers
strong password
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password that is hard to guess because it is long and has a mix of different types of characters. It also has random enough where it could not be easily guessed.
strong password
cracked password
password settings policy (PSO)
password policy
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A specially designed software (and in some cases hardware) applications that capture network packets as they traverse a network, displaying them for the attacker.
sniffers
device guard
credential guard
virtual secure mode (VSM)
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
53 questions
Sejarah Komputer
Quiz
•
10th - 11th Grade
60 questions
Orientasi Dasar Perangkat Lunak dan Gim
Quiz
•
10th Grade
60 questions
ôn tập bài 5-10 tin 11
Quiz
•
11th Grade - University
59 questions
HTML, CSS, and Design
Quiz
•
6th - 12th Grade
56 questions
PH INFOR KELAS X
Quiz
•
2nd Grade - University
56 questions
Python Quiz
Quiz
•
10th Grade
60 questions
MIL 1st Quarter Exam
Quiz
•
11th - 12th Grade
63 questions
BTEC L2 IT Online World Aim A Quiz
Quiz
•
6th - 10th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
Discover more resources for Computers
15 questions
Internet Vocabulary Notebook Check #2 - CTEA(2024)
Quiz
•
12th Grade
11 questions
Internet Terms Vocabulary- Notebook Check #1- CTEA
Quiz
•
12th Grade
50 questions
Money Matters Fall 2025 Final Exam — Worksheet Questions
Quiz
•
12th Grade
47 questions
CSF Final Exam Practice
Quiz
•
9th - 12th Grade
