Super ITF+

Super ITF+

University

55 Qs

quiz-placeholder

Similar activities

AUT 102 Pre/Post test

AUT 102 Pre/Post test

University

50 Qs

Entornos Virtuales de Aprendizaje para la educación híbrida

Entornos Virtuales de Aprendizaje para la educación híbrida

University

50 Qs

504L UT5 CL)UD C)MPUT1NG 2021-1

504L UT5 CL)UD C)MPUT1NG 2021-1

University

50 Qs

U45 CL0UD C0MPUT1N6

U45 CL0UD C0MPUT1N6

University

50 Qs

Unit 4: 21st Century Skills Quiz

Unit 4: 21st Century Skills Quiz

University

50 Qs

Topic 2- Hardware Troubleshooting

Topic 2- Hardware Troubleshooting

University

56 Qs

CNPM 4

CNPM 4

University

50 Qs

ICT 9 2nd Quarter Review

ICT 9 2nd Quarter Review

9th Grade - University

50 Qs

Super ITF+

Super ITF+

Assessment

Quiz

Instructional Technology

University

Practice Problem

Medium

Created by

Paul Pesce

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a threat to personal information being revealed?

Dumpster Diving

Shoulder Surfing

Water Damage

Password Crackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of form/input validation would a developer choose, if he wants to prioritize security and reliability?

Voluntary

Client-side

Server-side

n-tier

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is proving who a person is?

Authorization

Authentication

Confidentiality

Prioritization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spying on a coworker to watch them enter their pin on the phone is an examples of what?

Password Cracking

Dumpster Diving

Shoulder Surfing

Unauthorized WiFi Access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is used to give permission to a user of a computer to access certain files?

Authorization

Authentication

Confidentiality

Prioritization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to prevent someone from accessing the files on a stolen laptop?

Windows Defender

Strong Password

Make your password, "password". They'll never guess it.

Full Disk Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT an example of 2-Factor Authentication?

Using your debit card and pin at an ATM.

Using your credit card with a chip in it to purchase groceries.

Using a combination and key to open a safe.

Using a key card and finger print to enter a building.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?