Cybersecurity Essentials Part 2

Cybersecurity Essentials Part 2

12th Grade

20 Qs

quiz-placeholder

Similar activities

Networking

Networking

11th - 12th Grade

20 Qs

PRETEST

PRETEST

12th Grade

15 Qs

Introduction to Networks Cisco

Introduction to Networks Cisco

11th Grade - University

15 Qs

The Internet (ISP)

The Internet (ISP)

12th Grade - University

20 Qs

Computer Security Measure

Computer Security Measure

11th Grade - University

19 Qs

Computer Networks Review

Computer Networks Review

9th - 12th Grade

20 Qs

Networking Scenarios

Networking Scenarios

9th - 12th Grade

20 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

Cybersecurity Essentials Part 2

Cybersecurity Essentials Part 2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

David Winters

Used 19+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the components of the inner perimeter of ICS devices?Each correct answer represents a complete solution. Choose two.

Data file

Application program

Hard drive

Operating system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ryan noticed that while powering on his computer, some special programs load the computer’s operating system. Which of the following is responsible for this?

BIOS

CMOS

Operating system

Bootloader

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Olvin wants to minimize his computer OS's exposure to threats. Which process will help him accomplish this task?

Multitasking

Hardening

Packet filtering

Backtracking

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ryan needs to attach a keyboard to his computer. Which type of connector will he use for this purpose?

Series-B

Series-C

Series-A

Series-D

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Ria has installed Autorun in her computer due to which malware programs located on the media are running automatically and infecting the computer. Which of the following actions will Ria perform to remove this threat?Each correct answer represents a complete solution. Choose two.

Enable Auto Insert Notification.

Modify the Windows registry to turn off Autorun.

Download an app to turn off Autorun.

Set the Autorun value to 0 to turn off Autorun using Registry Editor.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following statements are true about the operating system? Choose two.

It is a program designed to control and coordinate the operation of the computer system.

It is capable of dealing with user inputs and helps the user to complete the task.

It is software designed to perform a group of coordinated functions, tasks, or activities.

It works as the interface between the user and the hardware.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Stella has implemented a resource access control method that allows the system to restrict or permit access to objects based on the user’s role within the organization. Which of the following access control methods is referred to in this scenario?

DAC

MAC

RBAC

ABAC

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?