Cyber Security Solutions

Cyber Security Solutions

9th - 12th Grade

11 Qs

quiz-placeholder

Similar activities

Quiz 3 - Meningkatkan Keamanan Informasi

Quiz 3 - Meningkatkan Keamanan Informasi

9th Grade

15 Qs

TES EVALUASI PROXY SERVER

TES EVALUASI PROXY SERVER

12th Grade

15 Qs

PROXY

PROXY

1st - 10th Grade

10 Qs

BTEC Level 2 Networking and Cybersecurity Revision

BTEC Level 2 Networking and Cybersecurity Revision

9th - 12th Grade

13 Qs

Revision OCR J277 1.1-1.4

Revision OCR J277 1.1-1.4

10th - 11th Grade

15 Qs

computer networking -2

computer networking -2

12th Grade

10 Qs

Basic Website Development Quiz

Basic Website Development Quiz

9th - 12th Grade

15 Qs

Technical Terms - Internet (A-Z) - Application Server

Technical Terms - Internet (A-Z) - Application Server

12th Grade

10 Qs

Cyber Security Solutions

Cyber Security Solutions

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Jared Rigby

Used 17+ times

FREE Resource

11 questions

Show all answers

1.

MATCH QUESTION

1 min • 5 pts

Match the following methods of protecting a computer system with their definition

Uses a database of known harmful software to search for dangerous files on a device

Two-factor authentication

Prevents certain packets of data from entering/leaving a network

Passwords

A string of characters used to gain access to a computer system

Anti-malware software

Users are required to verify their identify in 2 different ways

Access Levels

Allowing different users different permissions for files and programs

Firewalls

2.

DRAG AND DROP QUESTION

1 min • 5 pts

Firewalls are available as a special hardware device or as ​ (a)   . A firewall will block ​ (b)   of information that are from certain malicious IP addresses. It can also block packets that are for ​ (c)   that are not used. When packets are blocked from entering a computer or network they are said to be ​ (d)   . A firewall can look at the data inside each packet of data. This is known as ​ (e)   . Computers that are protected by the firewall are part of the trusted network.

software
packets
ports
dropped
packet inspection

3.

REORDER QUESTION

1 min • 5 pts

Put the stages of initializing a HTTPS connection with SSL/TLS in order.

Client browser requests a secure connection

Server responds be sending a copy of its security certificate

The browser inspects and verifies the server certificate

If the certificate is valid, the browser will send an encrypted session key to the server

The server and browser can now communicate using the session key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these user authentication methods are not bio-metric

Retina scan

Facial recognition

2FA

Fingerprint scanning

5.

REORDER QUESTION

1 min • 5 pts

Put the following passwords in order from weakest to strongest

password

rigby

RiGbY

R1GbY!

MrR1GbY1$tH3Be5t!

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The user who has access to all files, data and programs on a computer system is known as the ______________.

7.

DROPDOWN QUESTION

1 min • 1 pt

A ​ (a)   is a type of malware that is triggered by running an infected file, whereas a ​ (b)   is able to self-replicate and will often spread automatically through a local network.

virus
worm
trojan-horse
hacker

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?