FOC Digital Security

FOC Digital Security

9th - 10th Grade

20 Qs

quiz-placeholder

Similar activities

iGCSE Computer Science: Software

iGCSE Computer Science: Software

9th - 12th Grade

20 Qs

IGCSE ICT Full Forms

IGCSE ICT Full Forms

9th - 10th Grade

16 Qs

Network Security J277

Network Security J277

9th Grade

24 Qs

Computer Crimes and Computer Ethics

Computer Crimes and Computer Ethics

6th - 10th Grade

21 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

08 - Protecting Yourself QUIZ

08 - Protecting Yourself QUIZ

9th - 12th Grade

17 Qs

Cyber Security

Cyber Security

9th - 12th Grade

15 Qs

CompTIA ITF+ - Database Vocabulary

CompTIA ITF+ - Database Vocabulary

9th - 12th Grade

20 Qs

FOC Digital Security

FOC Digital Security

Assessment

Quiz

Computers

9th - 10th Grade

Medium

Created by

Megan DeLena

Used 16+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an audit trail?

A log of financial transactions

A file that records access attempts

A list of passwords and user names on a network

A record of hacking attempts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a single sign on account?

A security measure that allows only on failed login attempt

An individual's unique identity required to access an organization's network

When you enter your name into one account and you are automatically signed into other accounts

An organization's shared login credentials for general network access

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password ______ is a service that stores all of your account information securely.

vault

binder

manager

Collection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A passcode is another name for a(n) ______

user name

encryption algorithm

passphrase

PIN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) screen ______ restricts access to a computer or mobile device until a user performs a certain action.

control

firewall

check

lock

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a back door?

A file recovery method that circumvents the computer or mobile device's network

An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer

A hardware device that reinforces security settings on a computer or network

A program or set of instructions that allows a user to bypass security controls when accessing a computer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should an AUP specify?

the acceptable use of technology by employees for personal reasons

The guidelines for using licensed software

A list of IP addresses know to be safe

A user's personal authentication methods

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?