Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

4th Grade

20 Qs

quiz-placeholder

Similar activities

Ozzy's Super Mario

Ozzy's Super Mario

2nd - 4th Grade

15 Qs

G4 - Scratch - Reviewing

G4 - Scratch - Reviewing

4th - 5th Grade

19 Qs

Ms. Word 2016

Ms. Word 2016

3rd - 6th Grade

20 Qs

EV3 Programming

EV3 Programming

1st Grade - University

20 Qs

Standard Linux Commands

Standard Linux Commands

1st - 10th Grade

20 Qs

Aplikom

Aplikom

1st Grade - University

20 Qs

WEB BROWSERS

WEB BROWSERS

4th Grade

20 Qs

computers fun

computers fun

4th - 6th Grade

20 Qs

Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

Assessment

Quiz

Computers

4th Grade

Practice Problem

Medium

Created by

NURRUL ISMAIL

Used 19+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is NOT the need for Physical Security? To prevent ...

any unauthorized access to computer systems

tampering/stealing of data from computer systems

the loss of data/damage to systems against any natural calamities

any viruses or malicious code from computer systems.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select a few steps can be done to avoid data breaches caused by physical security threats:

Train staff on social engineering

Secure workstations

Protect the portables (laptop)

•Disable the drives

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Choose the natural physical security treats?

Floods

Earthquakes

Bombings

War

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

These following techniques are used for authentication:

•Smart cards

•Proximity cards

•Biometrics

•Attendance List

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user must move his/her head very close to the scanner and has to focus on the green light in the scanner. Choose the correct authentication method describe above.

Voice Recognition

Facial Recognition

Iris recognition

Retina recognition

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select the appropriate security measures to protect the workplace.

•Keep a fix distance between terminal

•Locked unattended terminal screens

•Use CCTV cameras for monitoring

•Never assign a guest account for other users.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"When the computer is locked by _______, none can access your documents, browse your computer, or use programs on your computer." Which tools describe the function as above?

PC Lock Up

Desktop Lock

Access Lock

1st Security Agent

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?