
Cyber security
Authored by 许明月 许明月
Computers
3rd Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 5 pts
a user is granted access only after successfully presenting two pieces of evidence to verify or identify who they are
(a)
2.
FILL IN THE BLANK QUESTION
1 min • 5 pts
uses a cache to speed up access to web pages from a website
(a)
3.
FILL IN THE BLANK QUESTION
1 min • 5 pts
controls that are used on social networks and other websites to allow users to limit who can access data from their stored profile
(a)
4.
FILL IN THE BLANK QUESTION
1 min • 5 pts
protocol that is used to allow data to be sent securely over a network, such as the internet
(a)
5.
FILL IN THE BLANK QUESTION
1 min • 5 pts
software or hardware that sits between a computer and an external network which monitors and filters out all incoming and outgoing traffic
(a)
6.
FILL IN THE BLANK QUESTION
1 min • 5 pts
supplies domain names for internet hosts and is used to find IP addresses of domain names
(a)
7.
FILL IN THE BLANK QUESTION
1 min • 5 pts
use of unique human characteristics to identify a user as a form of authentication
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?