Super ITF+

Super ITF+

University

55 Qs

quiz-placeholder

Similar activities

Electricitat 2n ESO

Electricitat 2n ESO

2nd Grade - University

50 Qs

Propiedades de los materiales. Madera y Metales

Propiedades de los materiales. Madera y Metales

2nd Grade - University

50 Qs

Tables in Word

Tables in Word

5th Grade - Professional Development

59 Qs

Electrónica digital

Electrónica digital

University

50 Qs

UTS SURVEILLANCE TNU XIIIB

UTS SURVEILLANCE TNU XIIIB

University

50 Qs

CÔNG NGHỆ 5 HK1

CÔNG NGHỆ 5 HK1

5th Grade - University

55 Qs

UJIAN DMA 1112 TEKNOLOGI PEMESINAN (KVTAA MPI)

UJIAN DMA 1112 TEKNOLOGI PEMESINAN (KVTAA MPI)

University

50 Qs

Desain Grafis Percetakan

Desain Grafis Percetakan

University

50 Qs

Super ITF+

Super ITF+

Assessment

Quiz

Instructional Technology

University

Practice Problem

Medium

Created by

Paul Pesce

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a threat to personal information being revealed?

Dumpster Diving

Shoulder Surfing

Water Damage

Password Crackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of form/input validation would a developer choose, if he wants to prioritize security and reliability?

Voluntary

Client-side

Server-side

n-tier

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is proving who a person is?

Authorization

Authentication

Confidentiality

Prioritization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spying on a coworker to watch them enter their pin on the phone is an examples of what?

Password Cracking

Dumpster Diving

Shoulder Surfing

Unauthorized WiFi Access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is used to give permission to a user of a computer to access certain files?

Authorization

Authentication

Confidentiality

Prioritization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to prevent someone from accessing the files on a stolen laptop?

Windows Defender

Strong Password

Make your password, "password". They'll never guess it.

Full Disk Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT an example of 2-Factor Authentication?

Using your debit card and pin at an ATM.

Using your credit card with a chip in it to purchase groceries.

Using a combination and key to open a safe.

Using a key card and finger print to enter a building.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology