Search Header Logo

Security 1

Authored by Paul Getz

Computers

11th - 12th Grade

Used 6+ times

Security 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security device requires the user to insert some type of identification card to validate access?

PIN code

Badge reader

Security token

Biometrics

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone has configured an external server with an IP address that should belong to one of your sister company's servers. With this new computer, they are attempting to establish a connection to your internal network. What type of attack is this?

Spoofing

On-path attack

Zombie/botnet

Non-compliant system

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of security device often incorporates RFID technology to grant personnel access to secure areas or resources?

Smartcard

Security token

Access control vestibule

Key fob

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are configuring a wireless network for a small office. What should you enable for the best encryption possible for network transmissions?

WPS

WEP

WPA

WPA3

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You work for a company that has employees fill out and manually sign personnel documents. Once the signed documents are scanned into a system, the paper copies are no longer needed. What should be done with the paper documents?

Place them in the recycle bin.

Shred them.

Place them in the trash.

Keep them in a locked cabinet.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which types of security threats involve the attacker attempting to directly contact a potential victim? (Choose two.)

Spoofing

Phishing

Social engineering

Brute-force attacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee uses their security badge to enter the building through a secured door. Another person tries to enter the building behind them before the door closes without swiping a badge. What type of behavior is the second person demonstrating?

Shoulder surfing

On-path attack

Brute-force

Tailgating

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?