Search Header Logo

uNIT 3: dATA PROTECTION

Authored by Abhishek Pandey

Computers

University

Used 3+ times

uNIT 3: dATA PROTECTION
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The two most common security postures are referred to as ____________and __________________. ________ .

Default DENY, Default ALLOW

Default STOP, Default ALLOW

Default WAIT, Default ALLOW

ALL

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ admits or denies traffic attempting to access the network based on predefined rules.

Packet filtering

Content Filtering

Filtering

ALL

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. ________is the use of biological markers to determine identity.

Biometrics

Cryptography

Forensics

Steganography

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is the encoding of data so that the plain text is transformed into something unintelligible, called _______________________

Cipher text

Biometrics

Biometrics TEXT

ALL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________are programs that seem innocuous but are reallymalicious codes.

Trojan horses

Worms

Worms

all

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers