MTA Security Fundamentals Lesson 1 Review

MTA Security Fundamentals Lesson 1 Review

10th Grade - Professional Development

21 Qs

quiz-placeholder

Similar activities

Security Domain

Security Domain

Professional Development

20 Qs

Review: Information Assurance and Security

Review: Information Assurance and Security

University

20 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

7th - 12th Grade

20 Qs

Testout Security Pro

Testout Security Pro

9th - 12th Grade

16 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

MidTerm Trivia Quiz Module 1-4

MidTerm Trivia Quiz Module 1-4

University

20 Qs

Cybersecurity Essentials

Cybersecurity Essentials

9th Grade - University

20 Qs

MTA Security Fundamentals Lesson 1 Review

MTA Security Fundamentals Lesson 1 Review

Assessment

Quiz

Computers

10th Grade - Professional Development

Hard

Created by

Ms. Nennig

Used 12+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are valid risk responses?

Mitigation

Transfer

Investment

Avoidance

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are considered removable devices or drives?

iPod

Netbook

USB flash drive

Burnable DVD drive

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following would be considered appropriate security measures for a building's external security perimeter?

Motion dector

Parking lot lights

Turnstile

Guard patrols

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When traveling on business and headed out to dinner with a client, which of the following should be done to secure a laptop?

Lock it in the car trunk

Store it out of sight in a dresser drawer

Secure it to a piece of furniture with a laptop security cable

Check it at the Front Desk

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to the process of eliminating a risk by choosing to not engage in an action or activity?

Mitigation

Residual risk

Avoidance

Acceptance

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following technologies could be used to help ensure the confidentiality of proprietary manufacturing techniques for an auto parts manufacturing business?

Strong encryption

Guard patrols

A laptop safe

Strong authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The information security acronym CIA stands for which of the following?

Confidentiality, Identity, Access control

Confidentiality, Integrity, Access control

Confidentiality, Integrity, Availability

Control, Identity, Access Control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?