Physical vs Software restrictions

Physical vs Software restrictions

10th Grade

10 Qs

quiz-placeholder

Similar activities

1.4 Wired and Wireless Networks

1.4 Wired and Wireless Networks

10th - 11th Grade

13 Qs

Q4 M3 POST TEST

Q4 M3 POST TEST

10th Grade

10 Qs

Software - Chapter 2

Software - Chapter 2

10th Grade

13 Qs

Software - Chapter 2

Software - Chapter 2

10th Grade

13 Qs

IGCSE ICT quiz

IGCSE ICT quiz

9th - 10th Grade

15 Qs

Types of Software

Types of Software

4th - 12th Grade

15 Qs

Software - Common Utility Programs

Software - Common Utility Programs

3rd - 12th Grade

10 Qs

System and Application Software

System and Application Software

10th Grade

10 Qs

Physical vs Software restrictions

Physical vs Software restrictions

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Normayne Mcdonald

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the most memorable and secure password for someone living at 72 Cork Street, Kingstown, St Vincent and Grenadines with a dog called Rover?

Rover

Vincent

TOwn72Kings

123456

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following measures is NOT a physical access restriction?

Guards

Firewalls

Fireproof Cabinets

Biometric systems

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When users purchase software, a single-user license agreement permits them to do any of the following EXCEPT:

install the software on only one computer

make one copy of the software as backup

rent or lease the software

give or sell the software to another individual if the software is removed from the user’s computer first

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The process of securing data by enciphering data prior to its transmission to a remote location is called:

archiving

backup

restore

encryption

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The main purpose of a firewall is to:

prevent fire from damaging a computer system

prevent fire from damaging backup media such as magnetic tape

prevent threats from an external network entering an internal network

detect and destroy viruses on a computer system

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

All the following are mechanisms to safeguard the integrity of a file EXCEPT ____________.

overwrite protection

passwords

read-only access

restricted access

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Making a file read-only is a file ____________ mechanism.

integrity

security

sharing

protection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?