Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

15 Qs

quiz-placeholder

Similar activities

Draft Teachers Handbook Quiz

Draft Teachers Handbook Quiz

KG - University

15 Qs

Quiz II U.6

Quiz II U.6

KG - University

13 Qs

1ere - Overseas

1ere - Overseas

12th Grade

20 Qs

Progress Test 4 (Unit9, Unit 10, English File, C1)

Progress Test 4 (Unit9, Unit 10, English File, C1)

University

17 Qs

Week 22: Progressive Reforms and War

Week 22: Progressive Reforms and War

5th Grade

18 Qs

RRR-Q4

RRR-Q4

KG - University

11 Qs

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

Assessment

Quiz

others

Practice Problem

Easy

Created by

Eric Jones

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

What are the potential problems associated with big data storage? (check all that apply)

A. It's hard to analyze due to the large dataset size.
B. The dataset becomes so large it can no longer be managed.
C. The data is usually stored on insecure devices.
D. The information retrieved from big data isn't useful for businesses

2.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

What are some ways that organizations can store large amounts of data? (Select all that apply)

A. Network Attached Storage (NAS)
B. Storage Area Network (SAN)
C. USB Flash Drives
D. Directly on individual computers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file transfer protocol uses Secure Shell version 2 (SSH2) to secure data transfers?

A. FTP
B. TFTP
C. SCP
D. SFTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

On a Windows system, which set of permissions can be set on drives, folders, and files?

A. Share
B. NTFS
C. Both Share and NTFS
D. Neither Share nor NTFS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a recommended hardware security measure?

A. Assign Co-owner share permissions to Everyone.
B. Door locks
C. Allow anonymous logins to the FTP server.
D. Share permissions can be set only on a folder.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Faraday cage do in terms of security measures?

A. Blocks all electromagnetic emissions
B. Detects and neutralizes harmful malware
C. Acts as a physical barrier to access network cables
D. Encrypts all data transferred within its bounds

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an attack method that uses a USB charging station in public places?

A. Card cloning
B. Skimming
C. Malicious universal serial bus (USB) cable
D. Protected cable distribution

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?