
Super ITF+
Authored by Paul Pesce
Instructional Technology
University
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
55 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is NOT a threat to personal information being revealed?
Dumpster Diving
Shoulder Surfing
Water Damage
Password Crackers
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of form/input validation would a developer choose, if he wants to prioritize security and reliability?
Voluntary
Client-side
Server-side
n-tier
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is proving who a person is?
Authorization
Authentication
Confidentiality
Prioritization
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spying on a coworker to watch them enter their pin on the phone is an examples of what?
Password Cracking
Dumpster Diving
Shoulder Surfing
Unauthorized WiFi Access
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is used to give permission to a user of a computer to access certain files?
Authorization
Authentication
Confidentiality
Prioritization
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best way to prevent someone from accessing the files on a stolen laptop?
Windows Defender
Strong Password
Make your password, "password". They'll never guess it.
Full Disk Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is NOT an example of 2-Factor Authentication?
Using your debit card and pin at an ATM.
Using your credit card with a chip in it to purchase groceries.
Using a combination and key to open a safe.
Using a key card and finger print to enter a building.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?