J808 LO4.4 Preventative Measures (Logical)

J808 LO4.4 Preventative Measures (Logical)

10th - 11th Grade

12 Qs

quiz-placeholder

Similar activities

HTML forms

HTML forms

11th Grade - University

10 Qs

T Levels How to ensure confidentiality

T Levels How to ensure confidentiality

11th Grade

10 Qs

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

Device Config and Mgmt, Module 3 quiz

Device Config and Mgmt, Module 3 quiz

9th - 12th Grade

16 Qs

BTEC DIT C3 LAB - User Access Restriction

BTEC DIT C3 LAB - User Access Restriction

10th - 11th Grade

10 Qs

A words - GCSE Computer Science

A words - GCSE Computer Science

1st - 10th Grade

13 Qs

GCSE - 2.3 Producing Robust Programs

GCSE - 2.3 Producing Robust Programs

9th - 11th Grade

15 Qs

BTEC Level 2 Networking and Cybersecurity Revision

BTEC Level 2 Networking and Cybersecurity Revision

9th - 12th Grade

13 Qs

J808 LO4.4 Preventative Measures (Logical)

J808 LO4.4 Preventative Measures (Logical)

Assessment

Quiz

Computers

10th - 11th Grade

Medium

Created by

David Anderson

Used 52+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which prevention measure type is encrypting data?

Physical

Logical

Secure destruction of data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ are used to control who can edit a file.

Authentication

Anti virus software

Access rights

Permissions

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password is for

creating a backup

authenticating a user.

locking a door.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you need a username, password, and a text code to login - this is called:

Double Password

Two-step authentication

Three-step encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a password is simple then

it can be guessed by an attacker.

it is easier to share.

you don't have to change it again.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the choice of logical protection measures depend upon?

The type of data being protected.

Where the data is stored.

How the data is stored.

When the data is stored.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Access Rights?

Rights to use a computer.

Rights to access restricted files etc.

Rights to access software.

Rights to access the hard drive.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?