Search Header Logo

Cybersecurity Essentials Part 2

Authored by David Winters

Computers

12th Grade

Used 19+ times

Cybersecurity Essentials Part 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the components of the inner perimeter of ICS devices?Each correct answer represents a complete solution. Choose two.

Data file

Application program

Hard drive

Operating system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ryan noticed that while powering on his computer, some special programs load the computer’s operating system. Which of the following is responsible for this?

BIOS

CMOS

Operating system

Bootloader

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Olvin wants to minimize his computer OS's exposure to threats. Which process will help him accomplish this task?

Multitasking

Hardening

Packet filtering

Backtracking

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ryan needs to attach a keyboard to his computer. Which type of connector will he use for this purpose?

Series-B

Series-C

Series-A

Series-D

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Ria has installed Autorun in her computer due to which malware programs located on the media are running automatically and infecting the computer. Which of the following actions will Ria perform to remove this threat?Each correct answer represents a complete solution. Choose two.

Enable Auto Insert Notification.

Modify the Windows registry to turn off Autorun.

Download an app to turn off Autorun.

Set the Autorun value to 0 to turn off Autorun using Registry Editor.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following statements are true about the operating system? Choose two.

It is a program designed to control and coordinate the operation of the computer system.

It is capable of dealing with user inputs and helps the user to complete the task.

It is software designed to perform a group of coordinated functions, tasks, or activities.

It works as the interface between the user and the hardware.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stella has implemented a resource access control method that allows the system to restrict or permit access to objects based on the user’s role within the organization. Which of the following access control methods is referred to in this scenario?

DAC

MAC

RBAC

ABAC

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?