Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

4th Grade

20 Qs

quiz-placeholder

Similar activities

Wireless Connecting

Wireless Connecting

1st - 9th Grade

15 Qs

Scratch Term 1

Scratch Term 1

4th Grade

20 Qs

Network topologies

Network topologies

1st - 7th Grade

16 Qs

Networks

Networks

4th - 12th Grade

18 Qs

PERKEMBANGAN TEKNOLOGI BEGERAK 1B-12

PERKEMBANGAN TEKNOLOGI BEGERAK 1B-12

KG - Professional Development

20 Qs

Network Concepts

Network Concepts

4th Grade

21 Qs

Computer Network

Computer Network

1st - 5th Grade

16 Qs

Computer Networks

Computer Networks

4th Grade

15 Qs

Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

Assessment

Quiz

Computers

4th Grade

Medium

Created by

NURRUL ISMAIL

Used 18+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is NOT the need for Physical Security? To prevent ...

any unauthorized access to computer systems

tampering/stealing of data from computer systems

the loss of data/damage to systems against any natural calamities

any viruses or malicious code from computer systems.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select a few steps can be done to avoid data breaches caused by physical security threats:

Train staff on social engineering

Secure workstations

Protect the portables (laptop)

•Disable the drives

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Choose the natural physical security treats?

Floods

Earthquakes

Bombings

War

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

These following techniques are used for authentication:

•Smart cards

•Proximity cards

•Biometrics

•Attendance List

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user must move his/her head very close to the scanner and has to focus on the green light in the scanner. Choose the correct authentication method describe above.

Voice Recognition

Facial Recognition

Iris recognition

Retina recognition

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select the appropriate security measures to protect the workplace.

•Keep a fix distance between terminal

•Locked unattended terminal screens

•Use CCTV cameras for monitoring

•Never assign a guest account for other users.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"When the computer is locked by _______, none can access your documents, browse your computer, or use programs on your computer." Which tools describe the function as above?

PC Lock Up

Desktop Lock

Access Lock

1st Security Agent

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?