Creating a Secure System (5.1 - 5.3)

Creating a Secure System (5.1 - 5.3)

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

9th Grade - University

25 Qs

Digital Threats and how to solve them

Digital Threats and how to solve them

11th Grade

25 Qs

Network Security - Modules 5-7

Network Security - Modules 5-7

12th Grade

27 Qs

Asesmen Diagnostik Keamanan Jaringan Kelas 12 TKJ

Asesmen Diagnostik Keamanan Jaringan Kelas 12 TKJ

12th Grade

35 Qs

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

12th Grade - University

27 Qs

Defensive Design

Defensive Design

9th Grade

25 Qs

Cyber II | AAA & Authentication Intro by Mr. B

Cyber II | AAA & Authentication Intro by Mr. B

12th Grade

25 Qs

Microsoft Certification Device Configuration and Management

Microsoft Certification Device Configuration and Management

11th Grade - University

28 Qs

Creating a Secure System (5.1 - 5.3)

Creating a Secure System (5.1 - 5.3)

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Teagan Graves

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What is the primary goal of information security?

Confidentiality

 Availability

Integrity

All of the above

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a strong password?

"password123"

 "123456"

"letmein"

 "P@BwOrd1"

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What does the acronym "VPN" stand for in the context of computer security?

Virtual Personal Network

Very Private Network

Virtual Private Network

Validated Personal Network

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which type of malware is designed to self-replicate and spread across networks?

Trojan Horse

Spyware

Worm

Ransomware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What is the process of converting data into a secret code to prevent unauthorized access called?

Decryption

Encryption

 Authentication

Firewall

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which security principle involves limiting access to only those who need it to perform their job functions?

Least Privilege

Defense in Depth

Social Engineering

Phishing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What type of attack involves an attacker intercepting and altering communication between two parties without their knowledge?

Phishing

Man-in-the-Middle (MitM)

DDoS

SQL Injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?