Search Header Logo

Security Fundamentals Chap 1

Authored by Alan O'Neill

others

9th - 12th Grade

Used 6+ times

Security Fundamentals Chap 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do you call the scope that hacker can use to break into a system?

attack surface
defence in depth
principle of least privilege
risk mitigation

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a physical or logical device used to capture keystrokes?

USB flash drive
Keylogger
PDA
Smartphone

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is needed to highly secure a system?

lots of time
system update
more money
disabled administrator account

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the best way to protect against social engineering?

stronger encryption
stronger authentication
risk mitigation
employee awareness

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first line of defence when setting up a network?

physically secure the network
configure authentication
configure encryption
configure an ACL

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is used to provide protection when one line of defence is breached?

attack surface
principle of least privilege
risk mitigation
defence in depth

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What method used by a hacker relies on the trusting nature of the person being attacked?

attack surface
social engineering
risk avoidance
principle of least privilege

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?