Cybersecurity Lessons 1-3

Cybersecurity Lessons 1-3

Professional Development

10 Qs

quiz-placeholder

Similar activities

IT ENGLISH: Research Project Topics - Smart Surveillance

IT ENGLISH: Research Project Topics - Smart Surveillance

Professional Development

10 Qs

Cybersecurity training

Cybersecurity training

Professional Development

10 Qs

IT ENGLISH: Research Project Topics - Secure Coding Practices

IT ENGLISH: Research Project Topics - Secure Coding Practices

Professional Development

10 Qs

UD Cybersecurity Pro

UD Cybersecurity Pro

Professional Development

10 Qs

SEC+ Ch.9 Review Test

SEC+ Ch.9 Review Test

Professional Development

15 Qs

IT ENGLISH: Research Project Topics - Python Programming Languag

IT ENGLISH: Research Project Topics - Python Programming Languag

Professional Development

10 Qs

IT Security Awareness

IT Security Awareness

Professional Development

10 Qs

CCIE overview

CCIE overview

Professional Development

15 Qs

Cybersecurity Lessons 1-3

Cybersecurity Lessons 1-3

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Alejandro Hidalgo

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of locks can be used with swinging, sliding, power-operated, and vertical-lift doors, as well as on fence gates?

Cipher locks

Electronic deadbolts

Standard key-locking deadbolts

Cam Locks

Answer explanation

Electronic deadbolts can be used with swinging, sliding, power-operated, and vertical-lift doors, as well as on fence gates.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is defined as the right of an individual to re-enter a property?

Ingress

Regress

Digress

Egress

Answer explanation

Regress is the term used to describe the legal right to re-enter a property.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following access-control gates are used where high levels of operational safety and security are needed?

Sliding gates

Bi-folding gates

Swinging gates

Vertical lift gates

Answer explanation

Sliding gates are used where high levels of operational safety and security are needed.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term is used to describe the legal right to leave a property?

Ingress

Digress

Egress

Regress

Answer explanation

Egress is defined as the legal right to leave a property.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term involves applying physical security initiatives to provide security for the basic physical and organizational architectures needed for the operation of an enterprise, an organization, or a society?

Physical security

Network security

Infrastructure security

Cybersecurity

Answer explanation

The term infrastructure security involves applying physical security initiatives to provide security for the basic physical and organizational structures needed for the operation of an enterprise, an organization, or a society.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of locks are used in access-control and management systems?

Solenoid-Operated Deadbolt Locks

Knob Locks

Cipher Locks

Standard Key-Locking Deadbolts Locks

Answer explanation

Cipher locks requiring personal access codes known by the user are often used in access-control and management systems. These locks operate by unlocking magnetic door locks when the correct programmed code is entered by the user on the cipher-lock keypad.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices offers improved data security due to the presence of intelligent circuitry that can be used to hide the user's data until an authentication process has been performed?

Biometric Scanner

Magnetic stripe card

RFID Badge

Smart card

Answer explanation

A smart card offers improved data security due to the presence of intelligent circuitry that can be used to hide the user’s data until an authentication process has been performed. It contains information about its owner, such as passwords, personal identification numbers (PINs), network keys, digital certificates, and other Personally Identifiable Information (PII) that can be used in the authentication process.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?