Cyber & Risk Management

Cyber & Risk Management

10th Grade

10 Qs

quiz-placeholder

Similar activities

Computer Hardware

Computer Hardware

10th Grade

10 Qs

Biometrics-IGCSE ICT

Biometrics-IGCSE ICT

9th - 11th Grade

10 Qs

Hardware_Pointinf devices, scanners and readinf devices

Hardware_Pointinf devices, scanners and readinf devices

10th Grade

10 Qs

internet and www

internet and www

10th - 11th Grade

11 Qs

Cyber Security Threats

Cyber Security Threats

10th Grade

15 Qs

IGCSE CS INPUT DEVICES

IGCSE CS INPUT DEVICES

9th - 11th Grade

15 Qs

Network

Network

8th - 10th Grade

15 Qs

Digital Footprint and Online Security Quiz

Digital Footprint and Online Security Quiz

10th Grade

15 Qs

Cyber & Risk Management

Cyber & Risk Management

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Robert Parslow

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following are classed as Biometric security

Finger Print scanners

Optical scanners

Facial recognition

All of the above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following should be installed and configured to protect a Technology System?

Time out/auto log off

Anti-virus software

Screen Saver and password

Regedit

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a way of keeping data secure?

Save it to multiple locations

Carry out regular back ups

Give it to a third party to look after

None of the above

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a secure ways of transferring data between computer systems

Instant messaging

Drop box

Vis email

Encrypted VPN

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What can Bluetooth be used for?

Sending data

Connecting devices

Hands Free phone calls

All of the above

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the most secure protocol to enable of a WiFi router?

WEP

WPA3

WPA2

WPA

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a type of two factor authentication ?

App-Generated Codes

Physical Authentication Keys

Email-Based Systems

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?