Cyber Security Solutions

Cyber Security Solutions

9th - 12th Grade

11 Qs

quiz-placeholder

Similar activities

UAS Aplikasi Server Polisma

UAS Aplikasi Server Polisma

12th Grade

12 Qs

ASJ

ASJ

11th Grade

15 Qs

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

12th Grade

14 Qs

Quis Keamanan Data

Quis Keamanan Data

10th Grade - University

15 Qs

Server Quiz

Server Quiz

11th Grade

15 Qs

keamanan jaringan komputer

keamanan jaringan komputer

11th Grade

15 Qs

Unit 1 LO5 Ethical and Operational Issues and Threats

Unit 1 LO5 Ethical and Operational Issues and Threats

12th Grade

15 Qs

Firewalls and Malware

Firewalls and Malware

11th Grade

12 Qs

Cyber Security Solutions

Cyber Security Solutions

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Jared Rigby

Used 17+ times

FREE Resource

11 questions

Show all answers

1.

MATCH QUESTION

1 min • 5 pts

Match the following methods of protecting a computer system with their definition

Allowing different users different permissions for files and programs

Anti-malware software

A string of characters used to gain access to a computer system

Access Levels

Prevents certain packets of data from entering/leaving a network

Firewalls

Uses a database of known harmful software to search for dangerous files on a device

Two-factor authentication

Users are required to verify their identify in 2 different ways

Passwords

2.

DRAG AND DROP QUESTION

1 min • 5 pts

Firewalls are available as a special hardware device or as ​ (a)   . A firewall will block ​ (b)   of information that are from certain malicious IP addresses. It can also block packets that are for ​ (c)   that are not used. When packets are blocked from entering a computer or network they are said to be ​ (d)   . A firewall can look at the data inside each packet of data. This is known as ​ (e)   . Computers that are protected by the firewall are part of the trusted network.

software
packets
ports
dropped
packet inspection

3.

REORDER QUESTION

1 min • 5 pts

Put the stages of initializing a HTTPS connection with SSL/TLS in order.

Client browser requests a secure connection

If the certificate is valid, the browser will send an encrypted session key to the server

Server responds be sending a copy of its security certificate

The browser inspects and verifies the server certificate

The server and browser can now communicate using the session key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these user authentication methods are not bio-metric

Retina scan

Facial recognition

2FA

Fingerprint scanning

5.

REORDER QUESTION

1 min • 5 pts

Put the following passwords in order from weakest to strongest

rigby

password

MrR1GbY1$tH3Be5t!

RiGbY

R1GbY!

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The user who has access to all files, data and programs on a computer system is known as the ______________.

7.

DROPDOWN QUESTION

1 min • 1 pt

A ​ (a)   is a type of malware that is triggered by running an infected file, whereas a ​ (b)   is able to self-replicate and will often spread automatically through a local network.

virus
worm
trojan-horse
hacker

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?