Security Fundamentals Chap 1

Security Fundamentals Chap 1

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

8.3 Imperialism

8.3 Imperialism

8th Grade - University

20 Qs

The Preaching and Miracles of Jesus

The Preaching and Miracles of Jesus

9th - 12th Grade

20 Qs

Civil Rights Quiz Review

Civil Rights Quiz Review

11th Grade

19 Qs

Apache Hadoop and Spark Quiz

Apache Hadoop and Spark Quiz

11th Grade

18 Qs

Elements of Fiction Quiz

Elements of Fiction Quiz

9th Grade

20 Qs

China/Japan Test

China/Japan Test

11th Grade

20 Qs

IT3- Internet and Networking Basics Worksheet

IT3- Internet and Networking Basics Worksheet

10th Grade

20 Qs

Purpose, Audience, Audience Needs Checkpoint

Purpose, Audience, Audience Needs Checkpoint

9th - 12th Grade

20 Qs

Security Fundamentals Chap 1

Security Fundamentals Chap 1

Assessment

Quiz

others

9th - 12th Grade

Hard

Created by

Alan O'Neill

Used 6+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do you call the scope that hacker can use to break into a system?
attack surface
defence in depth
principle of least privilege
risk mitigation

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a physical or logical device used to capture keystrokes?
USB flash drive
Keylogger
PDA
Smartphone

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is needed to highly secure a system?
lots of time
system update
more money
disabled administrator account

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the best way to protect against social engineering?
stronger encryption
stronger authentication
risk mitigation
employee awareness

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first line of defence when setting up a network?
physically secure the network
configure authentication
configure encryption
configure an ACL

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is used to provide protection when one line of defence is breached?
attack surface
principle of least privilege
risk mitigation
defence in depth

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What method used by a hacker relies on the trusting nature of the person being attacked?
attack surface
social engineering
risk avoidance
principle of least privilege

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?