Search Header Logo

POCS 2.1 and 2.2

Authored by Jesus Manjarrez

Computers

7th Grade

Used 10+ times

POCS 2.1 and 2.2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

10 sec • 1 pt

This quiz is about POCS 2.1 and 2.2.

Are you ready for this quiz?

I'm ready

Yes

Kinda

No.

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Section 2.1

Proceed

Don't Proceed

No.

Sure.

Ok.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle relates to protecting data against unauthorized changes?

Firewall

Intergrity

Bread.

Security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the practice of having multiple layers of security to protect against intruders?

Firewall

Onion Network

Defense in depth

AntiVirus

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Briefly Describe frameworks.

(use google)

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Nontraditional computing devices with Internet access describes ______.

(Use Google)

Evaluate responses using AI:

OFF

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the weakest link in an organization's security policy plan?

Employees

Backdoor

Cheap Antivirus

Disabled Firewall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?