Cyber Security Study Guide

Cyber Security Study Guide

10th Grade

23 Qs

quiz-placeholder

Similar activities

Yr7- Understanding computers Lessons 1-3

Yr7- Understanding computers Lessons 1-3

7th - 11th Grade

20 Qs

Panduan Blogger untuk Pelajar

Panduan Blogger untuk Pelajar

10th Grade

20 Qs

Hardware and Components

Hardware and Components

5th - 11th Grade

19 Qs

Bài 11. Tệp và quản lý tệp

Bài 11. Tệp và quản lý tệp

10th Grade

20 Qs

Ôn tập học kỳ I

Ôn tập học kỳ I

9th - 12th Grade

20 Qs

El Computador

El Computador

5th - 11th Grade

20 Qs

TIK VII YT, GC, VIDCOF

TIK VII YT, GC, VIDCOF

7th - 12th Grade

20 Qs

From Binary To Denary Conversion - IGCSE

From Binary To Denary Conversion - IGCSE

7th Grade - Professional Development

20 Qs

Cyber Security Study Guide

Cyber Security Study Guide

Assessment

Quiz

Computers

10th Grade

Medium

Created by

ANTONIO MONTOYA

Used 29+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location.

Where would be the next best place to keep your backup media?

In a locked fireproof safe.

On a shelf next to the backup device.

In a locked room.

In a drawer in your office.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a disadvantage of using the cloud for data storage?

Cloud storage allows you to save files to the internet.

You can access files from any computer with an internet connection.

Cloud storage backups require a reliable internet connection.

Cloud storage allows you to save files to the internet.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which Internet protocol is used to transmit encrypted data?

DNS

HTTPS

FTP

HTTP

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Non-repudiation

Authentication

Integrity

Authorization

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?

Fault tolerance

Cloud backups

Business Plan

Prioritization

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts.

Which of the following policies are BEST to configure? (Select TWO).

Enforce password history

Maximum password age

Account lockout duration

Account lockout threshold

Minimum password length

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SMTP

SSL

POP3

IMAP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?