Security Fundamentals Chap 1

Security Fundamentals Chap 1

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Quiz Unit 3.1 System Hardening

Quiz Unit 3.1 System Hardening

9th - 12th Grade

15 Qs

Kuis Pemrograman dan Komputasi

Kuis Pemrograman dan Komputasi

9th Grade

16 Qs

EOPA Practice Test #5

EOPA Practice Test #5

12th Grade

20 Qs

Industry Vocabulary Showdown

Industry Vocabulary Showdown

9th - 12th Grade

15 Qs

04 - Third Party Politics (Topic 5.5).

04 - Third Party Politics (Topic 5.5).

11th Grade

16 Qs

Principles of I.T. ACP Fall 2024

Principles of I.T. ACP Fall 2024

9th Grade

25 Qs

IT2- Computer Security Worksheet

IT2- Computer Security Worksheet

10th Grade

19 Qs

Land of Inequality - Upfront

Land of Inequality - Upfront

9th Grade

16 Qs

Security Fundamentals Chap 1

Security Fundamentals Chap 1

Assessment

Quiz

others

9th - 12th Grade

Hard

Created by

Alan O'Neill

Used 6+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do you call the scope that hacker can use to break into a system?
attack surface
defence in depth
principle of least privilege
risk mitigation

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a physical or logical device used to capture keystrokes?
USB flash drive
Keylogger
PDA
Smartphone

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is needed to highly secure a system?
lots of time
system update
more money
disabled administrator account

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the best way to protect against social engineering?
stronger encryption
stronger authentication
risk mitigation
employee awareness

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first line of defence when setting up a network?
physically secure the network
configure authentication
configure encryption
configure an ACL

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is used to provide protection when one line of defence is breached?
attack surface
principle of least privilege
risk mitigation
defence in depth

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What method used by a hacker relies on the trusting nature of the person being attacked?
attack surface
social engineering
risk avoidance
principle of least privilege

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?