Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

9th Grade

15 Qs

quiz-placeholder

Similar activities

Network Security

Network Security

9th Grade

13 Qs

Studio - U3 - L02.1 Threats to Cyber Security

Studio - U3 - L02.1 Threats to Cyber Security

9th Grade

10 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Computer General 2

Computer General 2

8th - 10th Grade

15 Qs

Unit 2_Lesson 12 Computing Systems Test Study Guide

Unit 2_Lesson 12 Computing Systems Test Study Guide

9th - 12th Grade

14 Qs

Code.org Unit 2 - The Internet Review

Code.org Unit 2 - The Internet Review

9th - 12th Grade

15 Qs

Cyber Security Review 1

Cyber Security Review 1

9th Grade

17 Qs

Y9 Social Engineering

Y9 Social Engineering

9th Grade

10 Qs

Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

Studio - Camb Tech - U3 - Cyber Security Key Terms Quiz

Assessment

Quiz

Computers

9th Grade

Easy

Created by

Andy Johnson

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of access management in a computer system/network?

To manage the access to a computer system/network

To manage the speed of the internet connection

To manage the temperature of the computer system

To manage the color scheme of the computer system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does account lockout do in a computer system?

Locks any account when a user fails a login attempt more than a set number of times

Locks the computer system after a certain time of inactivity

Locks the keyboard and mouse of the computer system

Locks the computer system from accessing the internet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of anti-malware software?

To prevent, detect and eradicate malicious software

To create new types of malicious software

To enhance the speed of the computer system

To track the user's online activities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does an anomaly based software do in a computer system?

Detects computer intrusions and misuse by monitoring system activity

Monitors the user's internet browsing history

Monitors the temperature of the computer system

Monitors the user's social media activities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered as an asset in the context of cyber security?

Social media platforms

Internet service providers

Computer hardware and software

Data, finance and secrets that should be secured against cyber security incidents

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who are attackers in the context of cyber security?

Individuals or organisations that protect computer systems/networks

Individuals or organisations that use computer systems/networks legally

Individuals or organisations that target computer systems/networks illegally

Individuals or organisations that develop computer systems/networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an audit trail in a computer system/network?

A record of activities on a computer system/network

A record of internet browsing history

A record of social media activities

A record of computer hardware and software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?