Logical Security

Logical Security

10th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

Computer Viruses

Computer Viruses

6th - 10th Grade

10 Qs

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

Antivirus

Antivirus

12th Grade

10 Qs

Cybersecurity 1

Cybersecurity 1

5th Grade - University

12 Qs

Securitate Cibernetica

Securitate Cibernetica

1st - 10th Grade

11 Qs

Security of Data

Security of Data

11th - 12th Grade

10 Qs

Chapter 8: Safety and security

Chapter 8: Safety and security

10th - 11th Grade

14 Qs

Logical Security

Logical Security

Assessment

Quiz

Computers

10th - 12th Grade

Hard

Created by

Kevin Davis

Used 18+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

What is Logical Security?

The Steps taken to setup a username and password.

The specific controls put into place to manage access to computer systems and physical spaces

Restricting access to a building or campus

Creating Security questions for your account.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Antivirus/ Anti-Malware Software

to keep bad people out of your system

to scan your music, pictures, and videos for quality

For photo and video editing

To protect you while playing games online.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the 3 Firewall Functions? (check all that apply).

Packet Filter

Search Engine

Stateful Inspection

Spam Filter

Proxy Filter

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Firewall acts as what in your Network Security

A way to track what websites you are visiting

A way to scan and filter content on social media

The first line of defense

A protection against ALL human errors

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Mac Address filtering is normally performed on _______

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the simplest Email Filters

Phishing

Antivirus

Spam

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that attempts to avoid detection by masking itself from applications is what kind of virus?

Phage

Armored

Stealth

Rootkit

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Rootkit can be described as_______

viruses can directly attack your antivirus software and potentially destroy the virus definition database file.

A virus that exploits the enhancements made to many application programs.

programs that enter a system or network under the guise of another program.

software programs that have the ability to hide certain things from the operating system. They do so by obtaining (and retaining) administrative-level access.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the Following Best describes Ransomeware.

an attack that uses a dictionary of common words to attempt to find the user’s password.

software that is often delivered through an unsuspecting random download. It takes control of a system and demands that a third party be paid.

A virus that attacks multiple sectors of the computer.

A virus that pretends to be a legitimate program but is actually attacking the system, leaving a backdoor for access into the computer, file shares, or servers.