Access Control InClass Rvw

Access Control InClass Rvw

10th - 12th Grade

28 Qs

quiz-placeholder

Similar activities

Ôn tập kiểm tra học kỳ 1 môn Tin học 7

Ôn tập kiểm tra học kỳ 1 môn Tin học 7

1st Grade - Professional Development

24 Qs

Computer Science IT quiz WIP - IT Level 3 by MZH

Computer Science IT quiz WIP - IT Level 3 by MZH

9th - 12th Grade

23 Qs

Quiz Jaringan Komputer

Quiz Jaringan Komputer

11th Grade

25 Qs

E-Tech Quiz

E-Tech Quiz

12th Grade

24 Qs

Kelas 11-TIK7-Corel Draw

Kelas 11-TIK7-Corel Draw

11th Grade

25 Qs

Latihan Soal Kelas X

Latihan Soal Kelas X

10th Grade

25 Qs

9B Action

9B Action

9th - 10th Grade

25 Qs

Java Review

Java Review

9th Grade - University

25 Qs

Access Control InClass Rvw

Access Control InClass Rvw

Assessment

Quiz

Computers

10th - 12th Grade

Easy

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The process of restricting access to a resource to only permitted users

access control
cracked password
personal identification number (PIN)
registry

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Refers to the number of incorrect logon attempts permitted before a system locks an account. Each bad logon attempt is tracked by the bad logon counter

account lockout
Credential Guard
polymorphic virus
removable device

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Also known as auditing

accounting
decryption
principle of least privilege
residual risk

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The process of identifying an individual

authentication
DMZ (demilitarized zone)
risk avoidance
risk

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An authentication method that identifies and recognizes people based on physical traits

biometrics
DNS spoofing
risk transfer
Secure Sockets Layer (SSL)

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A type of attack that tries as many possible combinations of characters as time and money permit.

brute force attack
domain user
Role
security baseline

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A form of attach which attempts all words in one or more dictionaries. Lists of common passwords are also typically tested.

dictionary attack
Honey net
sniffers
STRIDE

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?