Search Header Logo

Cyber & Risk Management

Authored by Robert Parslow

Computers

10th Grade

Used 4+ times

Cyber & Risk Management
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following are classed as Biometric security

Finger Print scanners

Optical scanners

Facial recognition

All of the above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following should be installed and configured to protect a Technology System?

Time out/auto log off

Anti-virus software

Screen Saver and password

Regedit

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a way of keeping data secure?

Save it to multiple locations

Carry out regular back ups

Give it to a third party to look after

None of the above

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a secure ways of transferring data between computer systems

Instant messaging

Drop box

Vis email

Encrypted VPN

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What can Bluetooth be used for?

Sending data

Connecting devices

Hands Free phone calls

All of the above

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the most secure protocol to enable of a WiFi router?

WEP

WPA3

WPA2

WPA

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a type of two factor authentication ?

App-Generated Codes

Physical Authentication Keys

Email-Based Systems

All of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?