Super ITF+

Super ITF+

University

55 Qs

quiz-placeholder

Similar activities

Chapter 3 Assignment

Chapter 3 Assignment

9th Grade - University

50 Qs

final exam semlepas

final exam semlepas

12th Grade - University

50 Qs

SO4L UTS Big D4t4

SO4L UTS Big D4t4

University

50 Qs

AUT 201 Pre/Post test

AUT 201 Pre/Post test

University

60 Qs

QU1Z PR4 U4S PPW

QU1Z PR4 U4S PPW

University

50 Qs

LV13  IMI MOCK TEST

LV13 IMI MOCK TEST

University

55 Qs

Module ICT #1

Module ICT #1

University

54 Qs

Herramientas Digitales apoyo evaluación EXTRAORDINARIA

Herramientas Digitales apoyo evaluación EXTRAORDINARIA

University

51 Qs

Super ITF+

Super ITF+

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Paul Pesce

Used 5+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a threat to personal information being revealed?

Dumpster Diving

Shoulder Surfing

Water Damage

Password Crackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of form/input validation would a developer choose, if he wants to prioritize security and reliability?

Voluntary

Client-side

Server-side

n-tier

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is proving who a person is?

Authorization

Authentication

Confidentiality

Prioritization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spying on a coworker to watch them enter their pin on the phone is an examples of what?

Password Cracking

Dumpster Diving

Shoulder Surfing

Unauthorized WiFi Access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is used to give permission to a user of a computer to access certain files?

Authorization

Authentication

Confidentiality

Prioritization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to prevent someone from accessing the files on a stolen laptop?

Windows Defender

Strong Password

Make your password, "password". They'll never guess it.

Full Disk Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT an example of 2-Factor Authentication?

Using your debit card and pin at an ATM.

Using your credit card with a chip in it to purchase groceries.

Using a combination and key to open a safe.

Using a key card and finger print to enter a building.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?