Security Fundamentals Chap 1

Security Fundamentals Chap 1

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

HHB 1.6 Metabolic Pathways

HHB 1.6 Metabolic Pathways

11th Grade

17 Qs

W.32: Geographic Factors in Military Decision-Making

W.32: Geographic Factors in Military Decision-Making

9th Grade

15 Qs

Device Configuration and Management Assessment

Device Configuration and Management Assessment

9th Grade

20 Qs

China/Japan Test

China/Japan Test

11th Grade

20 Qs

Unit 2: Practical Life Skills Review

Unit 2: Practical Life Skills Review

12th Grade - University

20 Qs

Purpose, Audience, Audience Needs Checkpoint

Purpose, Audience, Audience Needs Checkpoint

9th - 12th Grade

20 Qs

8.3 Imperialism

8.3 Imperialism

8th Grade - University

20 Qs

Dave Ramsey's Financial Principles Quiz

Dave Ramsey's Financial Principles Quiz

12th Grade

20 Qs

Security Fundamentals Chap 1

Security Fundamentals Chap 1

Assessment

Quiz

others

9th - 12th Grade

Hard

Created by

Alan O'Neill

Used 6+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do you call the scope that hacker can use to break into a system?
attack surface
defence in depth
principle of least privilege
risk mitigation

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a physical or logical device used to capture keystrokes?
USB flash drive
Keylogger
PDA
Smartphone

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is needed to highly secure a system?
lots of time
system update
more money
disabled administrator account

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the best way to protect against social engineering?
stronger encryption
stronger authentication
risk mitigation
employee awareness

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first line of defence when setting up a network?
physically secure the network
configure authentication
configure encryption
configure an ACL

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is used to provide protection when one line of defence is breached?
attack surface
principle of least privilege
risk mitigation
defence in depth

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What method used by a hacker relies on the trusting nature of the person being attacked?
attack surface
social engineering
risk avoidance
principle of least privilege

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?