Network Security 8

Network Security 8

11th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Computer Specs & Computer Network/Security

Computer Specs & Computer Network/Security

9th - 12th Grade

20 Qs

Wireless TLJ ZAHA

Wireless TLJ ZAHA

12th Grade

20 Qs

Text and Image representation

Text and Image representation

11th Grade

22 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

20 Qs

JAVA method

JAVA method

12th Grade

21 Qs

Term 3 - CCDI - Adv - Checkpoint Quiz1

Term 3 - CCDI - Adv - Checkpoint Quiz1

12th Grade

20 Qs

COMP_Technical Quiz_Round 2

COMP_Technical Quiz_Round 2

12th Grade - University

20 Qs

Network Security 8

Network Security 8

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Paul Getz

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A laptop that is equipped with a fingerprint scanner that authenticates the user is using which of the following types of technology?

Pattern recognition

Hand geometry

Biometrics

Tamper detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IT department receives a shipment of 20 new computers, and Alice has been assigned the task of preparing them for deployment to end users. The first thing she does is affix a metal tag with a bar code on it to each computer. Which of the following terms best describes the function of this procedure?

Asset tracking

Tamper detection

Device hardening

Port security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of physical security is most likely to detect an insider threat?

Smartcards

Motion detection

Video surveillance

Biometrics

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following physical security mechanisms can either “fail close” or “fail open”?

Motion detectors

Video cameras

Honeypots

Door locks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Smart lockers are storage devices that can provide users with access to supplies, deliveries, and other items using various security mechanisms. Which of the following are technologies that smart lockers can use to authenticate users and provide secure access to their contents?

NFC

RFID

Bluetooth

Biometrics

All of the above

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are common types of cameras used for video surveillance of secured network installations? (Choose all that apply.)

IP

LDAP

CCTV

NAC

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of attack can best be prevented by implementing a program of employee education and training?

Social engineering

War driving

Logic bomb

Evil twin

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?