FOC Digital Security

FOC Digital Security

9th - 10th Grade

20 Qs

quiz-placeholder

Similar activities

Identidad Corporativa

Identidad Corporativa

10th Grade

15 Qs

INFORMATIKA_8

INFORMATIKA_8

7th - 9th Grade

15 Qs

Quiz Informatika Bab 3 & 4

Quiz Informatika Bab 3 & 4

10th Grade

20 Qs

Excel - basic

Excel - basic

9th Grade

15 Qs

UH 1 BTIK

UH 1 BTIK

10th Grade

15 Qs

Cyber Security Homework 1

Cyber Security Homework 1

7th - 9th Grade

15 Qs

Network Quiz TH

Network Quiz TH

1st - 10th Grade

16 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

FOC Digital Security

FOC Digital Security

Assessment

Quiz

Computers

9th - 10th Grade

Medium

Created by

Megan DeLena

Used 16+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an audit trail?

A log of financial transactions

A file that records access attempts

A list of passwords and user names on a network

A record of hacking attempts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a single sign on account?

A security measure that allows only on failed login attempt

An individual's unique identity required to access an organization's network

When you enter your name into one account and you are automatically signed into other accounts

An organization's shared login credentials for general network access

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password ______ is a service that stores all of your account information securely.

vault

binder

manager

Collection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A passcode is another name for a(n) ______

user name

encryption algorithm

passphrase

PIN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) screen ______ restricts access to a computer or mobile device until a user performs a certain action.

control

firewall

check

lock

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a back door?

A file recovery method that circumvents the computer or mobile device's network

An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer

A hardware device that reinforces security settings on a computer or network

A program or set of instructions that allows a user to bypass security controls when accessing a computer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should an AUP specify?

the acceptable use of technology by employees for personal reasons

The guidelines for using licensed software

A list of IP addresses know to be safe

A user's personal authentication methods

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?