
Security Fundamentals Chap 1
Authored by Alan O'Neill
others
9th - 12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What do you call the scope that hacker can use to break into a system?
attack surface
defence in depth
principle of least privilege
risk mitigation
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a physical or logical device used to capture keystrokes?
USB flash drive
Keylogger
PDA
Smartphone
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is needed to highly secure a system?
lots of time
system update
more money
disabled administrator account
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the best way to protect against social engineering?
stronger encryption
stronger authentication
risk mitigation
employee awareness
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the first line of defence when setting up a network?
physically secure the network
configure authentication
configure encryption
configure an ACL
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is used to provide protection when one line of defence is breached?
attack surface
principle of least privilege
risk mitigation
defence in depth
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What method used by a hacker relies on the trusting nature of the person being attacked?
attack surface
social engineering
risk avoidance
principle of least privilege
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?