Search Header Logo

Unit 11: Software and hardware security measures

Authored by Ralph Ellis

Computers

12th Grade

Used 25+ times

Unit 11: Software and hardware security measures
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scans files stored on a computer and data entering a computer system and compare these to a known database of viruses.

Anti-virus software

Firewall

Router

Kerberos

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Anti-virus Software:

Scans the computer periodically to check if any software has been installed which contains malicious code (viruses) that may harm the computer

Removes/quarantines these programs (or notifies the user) of its presence

Protects the computer by preventing important files (e.g. the boot sector or operating system) from being changed

is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Uses rules and/or algorithms to look for commands which may indicate malicious intent.

Heuristic analysis

Virus signature

Packet filtering

Biometric authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Firewall

Ice Ceiling

Airfloor

Earthgate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data packets do not pass through the firewall unless they match the established rule set defined by the administrator or applied by default.

Stateful inspection

Network Access Control

Packet filtering

Virtual Private Network

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Recognised methods of user authentication

User login procedures

Biometric authentication

Kerberos network authentication

Two-step verification

Social engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Uses two different forms of identity: your password, and a contact method such as an email address or phone number

Two-step verification

Security token

Knowledge-based authentication

Certificate-based authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?