Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

4th Grade

20 Qs

quiz-placeholder

Similar activities

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Digital Devices

Digital Devices

1st - 12th Grade

15 Qs

Internet Services

Internet Services

2nd - 5th Grade

25 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

Teknologi Layanan Berbasis Luas XI TKJ

Teknologi Layanan Berbasis Luas XI TKJ

1st - 12th Grade

15 Qs

OSI Model

OSI Model

1st - 10th Grade

16 Qs

josh and tates quiz

josh and tates quiz

KG - University

19 Qs

The CIA Triad

The CIA Triad

1st - 8th Grade

24 Qs

Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

Assessment

Quiz

Computers

4th Grade

Medium

Created by

NURRUL ISMAIL

Used 18+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is NOT the need for Physical Security? To prevent ...

any unauthorized access to computer systems

tampering/stealing of data from computer systems

the loss of data/damage to systems against any natural calamities

any viruses or malicious code from computer systems.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select a few steps can be done to avoid data breaches caused by physical security threats:

Train staff on social engineering

Secure workstations

Protect the portables (laptop)

•Disable the drives

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Choose the natural physical security treats?

Floods

Earthquakes

Bombings

War

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

These following techniques are used for authentication:

•Smart cards

•Proximity cards

•Biometrics

•Attendance List

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user must move his/her head very close to the scanner and has to focus on the green light in the scanner. Choose the correct authentication method describe above.

Voice Recognition

Facial Recognition

Iris recognition

Retina recognition

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select the appropriate security measures to protect the workplace.

•Keep a fix distance between terminal

•Locked unattended terminal screens

•Use CCTV cameras for monitoring

•Never assign a guest account for other users.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"When the computer is locked by _______, none can access your documents, browse your computer, or use programs on your computer." Which tools describe the function as above?

PC Lock Up

Desktop Lock

Access Lock

1st Security Agent

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?