
Network Threat Prevention 2
Authored by Paul Glyne-Thomas
Computers
8th - 10th Grade
Used 13+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Brute force attacks usually involve an offensive weapon
true
false
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Brute force attacks may be mittigated against by
Avoiding short passwords
Using letters only
Permitting an infinite number of guesses
Using letters, upper case and lower, numbers and special characters
Using the longest words in the dictionary
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What physical means can be used to prevent Brute Force attacks?
Biometric access
Passwords
Smart cards
Encrypting data asymmetrically
Two Factor Authentication
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
SQL injections involve adding an SQL command to a password
true
false
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is data validation?
Cleansing the data before it reaches the database
Only allowing users with certain privileges to access the database
Encrypting the input form
Biometric measures at point of entry
Armed police with tasers, vicious dogs, batons and powerful nerve agents
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Whitelisting is
Racist
Only allowing certain data to enter the system
Against the geneva convention
Preventing data based on the IEEE 1394 Protocol
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Blacklisting is
Racist
Not permitting certain data to enter the system
Only wearing dark clothing
Following a vegan diet
Colour coding the keyboard
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?