Search Header Logo

Cybersecurity Lessons 1-3

Authored by Alejandro Hidalgo

Computers

Professional Development

Used 1+ times

Cybersecurity Lessons 1-3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of locks can be used with swinging, sliding, power-operated, and vertical-lift doors, as well as on fence gates?

Cipher locks

Electronic deadbolts

Standard key-locking deadbolts

Cam Locks

Answer explanation

Electronic deadbolts can be used with swinging, sliding, power-operated, and vertical-lift doors, as well as on fence gates.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is defined as the right of an individual to re-enter a property?

Ingress

Regress

Digress

Egress

Answer explanation

Regress is the term used to describe the legal right to re-enter a property.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following access-control gates are used where high levels of operational safety and security are needed?

Sliding gates

Bi-folding gates

Swinging gates

Vertical lift gates

Answer explanation

Sliding gates are used where high levels of operational safety and security are needed.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term is used to describe the legal right to leave a property?

Ingress

Digress

Egress

Regress

Answer explanation

Egress is defined as the legal right to leave a property.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term involves applying physical security initiatives to provide security for the basic physical and organizational architectures needed for the operation of an enterprise, an organization, or a society?

Physical security

Network security

Infrastructure security

Cybersecurity

Answer explanation

The term infrastructure security involves applying physical security initiatives to provide security for the basic physical and organizational structures needed for the operation of an enterprise, an organization, or a society.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of locks are used in access-control and management systems?

Solenoid-Operated Deadbolt Locks

Knob Locks

Cipher Locks

Standard Key-Locking Deadbolts Locks

Answer explanation

Cipher locks requiring personal access codes known by the user are often used in access-control and management systems. These locks operate by unlocking magnetic door locks when the correct programmed code is entered by the user on the cipher-lock keypad.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices offers improved data security due to the presence of intelligent circuitry that can be used to hide the user's data until an authentication process has been performed?

Biometric Scanner

Magnetic stripe card

RFID Badge

Smart card

Answer explanation

A smart card offers improved data security due to the presence of intelligent circuitry that can be used to hide the user’s data until an authentication process has been performed. It contains information about its owner, such as passwords, personal identification numbers (PINs), network keys, digital certificates, and other Personally Identifiable Information (PII) that can be used in the authentication process.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?