Unit 11: Software and hardware security measures

Unit 11: Software and hardware security measures

12th Grade

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Essentials

Cybersecurity Essentials

9th Grade - University

20 Qs

Cisco 2, Module 10

Cisco 2, Module 10

12th Grade

15 Qs

VPN Quiz - 21 Nov 23

VPN Quiz - 21 Nov 23

9th - 12th Grade

15 Qs

Cybersecurity Legislation and Standards Quiz

Cybersecurity Legislation and Standards Quiz

12th Grade

20 Qs

A level CS Unit 17 Security

A level CS Unit 17 Security

12th Grade

20 Qs

AAA Security and Access Management Quiz

AAA Security and Access Management Quiz

11th Grade - University

15 Qs

MTA Networking Fundamentals: Lesson 1

MTA Networking Fundamentals: Lesson 1

11th Grade - University

16 Qs

Managing User Security 3.1

Managing User Security 3.1

9th - 12th Grade

25 Qs

Unit 11: Software and hardware security measures

Unit 11: Software and hardware security measures

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ralph Ellis

Used 23+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scans files stored on a computer and data entering a computer system and compare these to a known database of viruses.

Anti-virus software

Firewall

Router

Kerberos

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Anti-virus Software:

Scans the computer periodically to check if any software has been installed which contains malicious code (viruses) that may harm the computer

Removes/quarantines these programs (or notifies the user) of its presence

Protects the computer by preventing important files (e.g. the boot sector or operating system) from being changed

is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Uses rules and/or algorithms to look for commands which may indicate malicious intent.

Heuristic analysis

Virus signature

Packet filtering

Biometric authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Firewall

Ice Ceiling

Airfloor

Earthgate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data packets do not pass through the firewall unless they match the established rule set defined by the administrator or applied by default.

Stateful inspection

Network Access Control

Packet filtering

Virtual Private Network

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Recognised methods of user authentication

User login procedures

Biometric authentication

Kerberos network authentication

Two-step verification

Social engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Uses two different forms of identity: your password, and a contact method such as an email address or phone number

Two-step verification

Security token

Knowledge-based authentication

Certificate-based authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?