Search Header Logo

Cyber security

Authored by 许明月 许明月

Computers

3rd Grade

Used 5+ times

Cyber security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 5 pts

a user is granted access only after successfully presenting two pieces of evidence to verify or identify who they are

(a)  

2.

FILL IN THE BLANK QUESTION

1 min • 5 pts

uses a cache to speed up access to web pages from a website

(a)  

3.

FILL IN THE BLANK QUESTION

1 min • 5 pts

controls that are used on social networks and other websites to allow users to limit who can access data from their stored profile

(a)  

4.

FILL IN THE BLANK QUESTION

1 min • 5 pts

protocol that is used to allow data to be sent securely over a network, such as the internet

(a)  

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

software or hardware that sits between a computer and an external network which monitors and filters out all incoming and outgoing traffic

(a)  

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

supplies domain names for internet hosts and is used to find IP addresses of domain names

(a)  

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

use of unique human characteristics to identify a user as a form of authentication

(a)  

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?