Cyber Security Study Guide

Quiz
•
Computers
•
10th Grade
•
Medium

ANTONIO MONTOYA
Used 29+ times
FREE Resource
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location.
Where would be the next best place to keep your backup media?
In a locked fireproof safe.
On a shelf next to the backup device.
In a locked room.
In a drawer in your office.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is a disadvantage of using the cloud for data storage?
Cloud storage allows you to save files to the internet.
You can access files from any computer with an internet connection.
Cloud storage backups require a reliable internet connection.
Cloud storage allows you to save files to the internet.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which Internet protocol is used to transmit encrypted data?
DNS
HTTPS
FTP
HTTP
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?
Non-repudiation
Authentication
Integrity
Authorization
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?
Fault tolerance
Cloud backups
Business Plan
Prioritization
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts.
Which of the following policies are BEST to configure? (Select TWO).
Enforce password history
Maximum password age
Account lockout duration
Account lockout threshold
Minimum password length
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following protocols can be enabled so email is encrypted on a mobile device?
SMTP
SSL
POP3
IMAP
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
OCR GCSE CS MCQs 2.3 Defensive Design

Quiz
•
10th - 11th Grade
19 questions
Computer basics

Quiz
•
KG - Professional Dev...
18 questions
Communication Technologies

Quiz
•
10th Grade
20 questions
Computer Technology

Quiz
•
9th - 12th Grade
20 questions
Component 3: A1 Modern Technologies

Quiz
•
10th - 11th Grade
21 questions
Mysql set 1

Quiz
•
9th - 12th Grade
22 questions
Computing Revision Task (G6):Online Safety & Cybersecurity Quiz

Quiz
•
6th Grade - University
20 questions
Komunikasi Sinkron dan Asinkron dalam Jaringan

Quiz
•
10th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
1.2 OSI & TCP IP Models Quiz

Quiz
•
10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade