CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

9th Grade

12 Qs

quiz-placeholder

Similar activities

APCSP 2.1.1 - 2.1.3 Review

APCSP 2.1.1 - 2.1.3 Review

9th - 12th Grade

15 Qs

APCSP Topic 5 Impact of Computing

APCSP Topic 5 Impact of Computing

9th - 12th Grade

13 Qs

ITF Cert Review

ITF Cert Review

9th - 12th Grade

15 Qs

CC 6:19 - 6:24 Terms

CC 6:19 - 6:24 Terms

9th Grade

11 Qs

Big Idea 5

Big Idea 5

9th - 12th Grade

16 Qs

SecPro Unit 6.1 and 6.2 Terminology Quiz

SecPro Unit 6.1 and 6.2 Terminology Quiz

9th - 12th Grade

10 Qs

CSP I - Unit 8 Vocabulary

CSP I - Unit 8 Vocabulary

9th Grade

13 Qs

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

Assessment

Quiz

Computers

9th Grade

Medium

Used 9+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that downloads onto a computer disguised as a legitimate program

Trojan Horse

Virus

Worm

Keylogging

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.

Trojan Horse

Virus

Worm

Keylogging

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer program that can copy itself and infect a computer without permission or knowledge of the user.

Trojan Horse

Virus

Worm

Keylogging

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A process for securing access to a given system that identifies the party requesting access through only one category of credentials.

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The most common example of this authentication is matching a password to a username.

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication method that asks users to provide multiple types of credentials to confirm their identity.

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The disadvantage of this authentication is it makes accessing your data might become more painful and time-consuming

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?