Logical Security

Logical Security

10th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

quiz_base_fill_in _blank

quiz_base_fill_in _blank

9th - 10th Grade

10 Qs

Empowerment Technologies 1st

Empowerment Technologies 1st

11th Grade

10 Qs

Seguridad informática: virus y antivirus

Seguridad informática: virus y antivirus

9th - 12th Grade

12 Qs

Antivirus

Antivirus

1st - 10th Grade

10 Qs

Understanding Malware and Social Engineering

Understanding Malware and Social Engineering

10th Grade - University

10 Qs

Malware Introduction

Malware Introduction

5th - 10th Grade

10 Qs

IT English Essentials: Unit 9 - Quiz 1

IT English Essentials: Unit 9 - Quiz 1

12th Grade

10 Qs

My First quiz

My First quiz

10th Grade

11 Qs

Logical Security

Logical Security

Assessment

Quiz

Computers

10th - 12th Grade

Hard

Created by

Kevin Davis

Used 18+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

What is Logical Security?

The Steps taken to setup a username and password.

The specific controls put into place to manage access to computer systems and physical spaces

Restricting access to a building or campus

Creating Security questions for your account.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Antivirus/ Anti-Malware Software

to keep bad people out of your system

to scan your music, pictures, and videos for quality

For photo and video editing

To protect you while playing games online.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the 3 Firewall Functions? (check all that apply).

Packet Filter

Search Engine

Stateful Inspection

Spam Filter

Proxy Filter

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Firewall acts as what in your Network Security

A way to track what websites you are visiting

A way to scan and filter content on social media

The first line of defense

A protection against ALL human errors

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Mac Address filtering is normally performed on _______

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the simplest Email Filters

Phishing

Antivirus

Spam

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that attempts to avoid detection by masking itself from applications is what kind of virus?

Phage

Armored

Stealth

Rootkit

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Rootkit can be described as_______

viruses can directly attack your antivirus software and potentially destroy the virus definition database file.

A virus that exploits the enhancements made to many application programs.

programs that enter a system or network under the guise of another program.

software programs that have the ability to hide certain things from the operating system. They do so by obtaining (and retaining) administrative-level access.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the Following Best describes Ransomeware.

an attack that uses a dictionary of common words to attempt to find the user’s password.

software that is often delivered through an unsuspecting random download. It takes control of a system and demands that a third party be paid.

A virus that attacks multiple sectors of the computer.

A virus that pretends to be a legitimate program but is actually attacking the system, leaving a backdoor for access into the computer, file shares, or servers.