Creating a Secure System (5.1 - 5.3)

Creating a Secure System (5.1 - 5.3)

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

ITS Study Guide

ITS Study Guide

9th - 11th Grade

25 Qs

Cybersecurity Quiz Unit 1

Cybersecurity Quiz Unit 1

12th Grade

33 Qs

Microsoft 365 Unified Endpoint Management

Microsoft 365 Unified Endpoint Management

11th Grade - University

28 Qs

Networks Issues and Communication

Networks Issues and Communication

10th Grade

25 Qs

Cybersecurity General Review

Cybersecurity General Review

12th Grade

30 Qs

Cyber security

Cyber security

12th Grade

25 Qs

Unit 6 Exam Review Part 1

Unit 6 Exam Review Part 1

9th - 12th Grade

26 Qs

Cybersecurity: CIA. threats and vulnerabilities

Cybersecurity: CIA. threats and vulnerabilities

12th Grade

25 Qs

Creating a Secure System (5.1 - 5.3)

Creating a Secure System (5.1 - 5.3)

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Teagan Graves

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What is the primary goal of information security?

Confidentiality

 Availability

Integrity

All of the above

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a strong password?

"password123"

 "123456"

"letmein"

 "P@BwOrd1"

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What does the acronym "VPN" stand for in the context of computer security?

Virtual Personal Network

Very Private Network

Virtual Private Network

Validated Personal Network

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which type of malware is designed to self-replicate and spread across networks?

Trojan Horse

Spyware

Worm

Ransomware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What is the process of converting data into a secret code to prevent unauthorized access called?

Decryption

Encryption

 Authentication

Firewall

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which security principle involves limiting access to only those who need it to perform their job functions?

Least Privilege

Defense in Depth

Social Engineering

Phishing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What type of attack involves an attacker intercepting and altering communication between two parties without their knowledge?

Phishing

Man-in-the-Middle (MitM)

DDoS

SQL Injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?