Cyber & Risk Management

Cyber & Risk Management

10th Grade

10 Qs

quiz-placeholder

Similar activities

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Network Security Protocols

Network Security Protocols

10th Grade

15 Qs

Cyber Security Threats

Cyber Security Threats

10th Grade

15 Qs

NOVA Cybersecurity 101

NOVA Cybersecurity 101

6th - 12th Grade

13 Qs

Computer Hardware

Computer Hardware

10th Grade

10 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

HT3 Digital Graphics

HT3 Digital Graphics

KG - 12th Grade

10 Qs

Final Exam

Final Exam

KG - University

11 Qs

Cyber & Risk Management

Cyber & Risk Management

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Robert Parslow

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following are classed as Biometric security

Finger Print scanners

Optical scanners

Facial recognition

All of the above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following should be installed and configured to protect a Technology System?

Time out/auto log off

Anti-virus software

Screen Saver and password

Regedit

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a way of keeping data secure?

Save it to multiple locations

Carry out regular back ups

Give it to a third party to look after

None of the above

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a secure ways of transferring data between computer systems

Instant messaging

Drop box

Vis email

Encrypted VPN

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What can Bluetooth be used for?

Sending data

Connecting devices

Hands Free phone calls

All of the above

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the most secure protocol to enable of a WiFi router?

WEP

WPA3

WPA2

WPA

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a type of two factor authentication ?

App-Generated Codes

Physical Authentication Keys

Email-Based Systems

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?