CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

9th Grade

12 Qs

quiz-placeholder

Similar activities

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

Computer Safety and Security

Computer Safety and Security

9th Grade

13 Qs

Information Security

Information Security

9th Grade

9 Qs

encryptions and dos

encryptions and dos

9th - 11th Grade

9 Qs

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

9th - 12th Grade

13 Qs

Operating Systems & System Software

Operating Systems & System Software

9th Grade

8 Qs

J277 - Wireless Networks

J277 - Wireless Networks

8th - 11th Grade

11 Qs

10.3 Authentication

10.3 Authentication

9th - 12th Grade

11 Qs

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

Assessment

Quiz

Computers

9th Grade

Medium

Used 9+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that downloads onto a computer disguised as a legitimate program

Trojan Horse

Virus

Worm

Keylogging

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.

Trojan Horse

Virus

Worm

Keylogging

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer program that can copy itself and infect a computer without permission or knowledge of the user.

Trojan Horse

Virus

Worm

Keylogging

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A process for securing access to a given system that identifies the party requesting access through only one category of credentials.

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The most common example of this authentication is matching a password to a username.

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication method that asks users to provide multiple types of credentials to confirm their identity.

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The disadvantage of this authentication is it makes accessing your data might become more painful and time-consuming

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?