Security 1

Security 1

11th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

ASPEK LEGAL TIK XII

ASPEK LEGAL TIK XII

12th Grade

20 Qs

Pengayaan Informatika

Pengayaan Informatika

12th Grade

20 Qs

Quis Internet

Quis Internet

11th Grade

20 Qs

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

10th - 12th Grade

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

แบบทดสอบ เรื่อง โปรแกรมไมโครซอฟต์เอกเซลล์

แบบทดสอบ เรื่อง โปรแกรมไมโครซอฟต์เอกเซลล์

12th Grade

20 Qs

Online Platform Block Q

Online Platform Block Q

11th - 12th Grade

20 Qs

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

20 Qs

Security 1

Security 1

Assessment

Quiz

Computers

11th - 12th Grade

Hard

Created by

Paul Getz

Used 6+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security device requires the user to insert some type of identification card to validate access?

PIN code

Badge reader

Security token

Biometrics

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone has configured an external server with an IP address that should belong to one of your sister company's servers. With this new computer, they are attempting to establish a connection to your internal network. What type of attack is this?

Spoofing

On-path attack

Zombie/botnet

Non-compliant system

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of security device often incorporates RFID technology to grant personnel access to secure areas or resources?

Smartcard

Security token

Access control vestibule

Key fob

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are configuring a wireless network for a small office. What should you enable for the best encryption possible for network transmissions?

WPS

WEP

WPA

WPA3

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You work for a company that has employees fill out and manually sign personnel documents. Once the signed documents are scanned into a system, the paper copies are no longer needed. What should be done with the paper documents?

Place them in the recycle bin.

Shred them.

Place them in the trash.

Keep them in a locked cabinet.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which types of security threats involve the attacker attempting to directly contact a potential victim? (Choose two.)

Spoofing

Phishing

Social engineering

Brute-force attacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee uses their security badge to enter the building through a secured door. Another person tries to enter the building behind them before the door closes without swiping a badge. What type of behavior is the second person demonstrating?

Shoulder surfing

On-path attack

Brute-force

Tailgating

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?