Security II

Security II

11th Grade

15 Qs

quiz-placeholder

Similar activities

Ethical, Legal and Social Issues of Computing

Ethical, Legal and Social Issues of Computing

9th - 11th Grade

20 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

OCR GCSE CS MCQs 2.3 Defensive Design

OCR GCSE CS MCQs 2.3 Defensive Design

10th - 11th Grade

20 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

9th - 12th Grade

12 Qs

Part C Unit 10 Practice Exam

Part C Unit 10 Practice Exam

9th - 12th Grade

10 Qs

08 - Protecting Yourself QUIZ

08 - Protecting Yourself QUIZ

9th - 12th Grade

17 Qs

computer security measures

computer security measures

11th Grade

20 Qs

Cyber System Hardening Quiz

Cyber System Hardening Quiz

11th Grade

12 Qs

Security II

Security II

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Sandra Battle

Used 11+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of using password managers?

They store passwords in an encrypted format

They eliminate the need for password explanation.

They Generate random and complex passwords

They require the users to reuse passwords across multiple sites

Answer explanation

One of the main advantages of using password managers is that they store passwords in an encrypted format. This helps protect the passwords from unauthorized access in case of a data breach or unauthorized access to the password manager itself. Password managers often have the capability to generate random and complex passwords for users. This is advantageous as it helps users create strong and unique passwords without having to remember them but this is not a password manager's primary purpose. Password managers encourage users to use unique passwords for each site or service they use. Reusing passwords across multiple sites can be a security risk, as a compromise of one site can potentially lead to unauthorized access to other accounts. Password managers do not eliminate the need for password expiration. Password expiration is a separate security measure that is typically implemented to ensure that passwords are regularly changed, reducing the risk of compromised passwords.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the act of manipulating individuals to reveal their passwords or sensitive information?

Social engineering

Wire tapping

Eavesdropping

Snooping

Answer explanation

This term specifically refers to the act of manipulating individuals to reveal their passwords or sensitive information. It involves exploiting psychological vulnerabilities or using deceptive techniques to gain unauthorized access. Wiretapping is the act of intercepting and listening to telephonic or digital communications by tapping into the wire or cable carrying the communication. It does not involve manipulating individuals to reveal passwords or sensitive information. Snooping refers to the unauthorized act of observing or accessing someone else's private information or activities. It does not involve manipulating individuals to reveal passwords or sensitive information. Eavesdropping involves secretly listening to or monitoring private conversations or communications without permission. It does not encompass the act of manipulating individuals to reveal passwords or sensitive information.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a business continuity plan, what is a key consideration for deciding whether to store backups locally, in cloud storage, or off-site?

The cost of storage solutions.

The size of the data to be backed up.

The speed of the local network

The need to ensure data availability and quick recovery in case of a disruption.

Answer explanation

Choosing where to store backups in a business continuity plan should primarily be based on ensuring data availability and quick recovery during a disruption. Each option—local, cloud, or off-site—has different advantages and considerations regarding access speed, cost, security, and protection from local disasters. While cost is a factor in choosing a storage solution, the primary consideration should be data availability and quick recovery in case of a disruption. While network speed can influence how quickly backups can be accessed or updated, the primary consideration in a business continuity plan should be data availability and quick recovery in case of a disruption. While the size of the data can influence the type of storage solution used, the main consideration should still be ensuring data availability and quick recovery during a disruption.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST describes the concept of RAID 1 in data redundancy?

Disk Mirroring

Disk Shadowing

Disk Stripping

Disk Stripping with parity

Answer explanation

RAID 1, also known as disk mirroring, involves using two disks where each write operation is performed on both disks. If one disk fails, the other can continue functioning. Disk striping is a feature of RAID 0, not RAID 1. It involves spreading data across multiple disks, but does not provide redundancy in case of disk failure. This is a feature of RAID 5, not RAID 1. It combines the benefits of disk striping with additional parity data to enable data recovery in case of a disk failure. Disk shadowing is not a term associated with RAID levels. It does not correctly describe RAID 1.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following specifically refers to a deliberate attack aimed at overwhelming a system or network, rendering it unavailable?

Service Outage

Power Outage

Denial of Service Attacks (Dos Attack).

Destruction

Answer explanation

A denial of service (DoS) attack is a deliberate and malicious act aimed at overwhelming a system or network with excessive traffic or requests. The intention is to render the targeted system or network unavailable to its intended users. This is the correct answer as it specifically refers to the described attack. Destruction involves physical damage or harm caused by events like natural disasters, fires, or deliberate acts. While destruction can render systems unavailable, it is not specifically related to overwhelming a system or network with excessive traffic or requests. While a power outage can impact the availability of information systems, it is not a deliberate attack aimed at overwhelming the system. Power outages occur due to factors like severe weather conditions or infrastructure issues, affecting the electrical power supply and potentially causing service disruptions. A service outage refers to the unavailability or disruption of a specific service. While service outages can be caused by various factors, including hardware failures or software issues, they are not specifically related to overwhelming a system or network as described in the question.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are considered reputable software sources

Freeware websites with no user rating or reviews

Third-Party websites offering cracked software

peer-to-peer file sharing networks

official vendor websites and app stores

Answer explanation

Official vendor websites and app stores, such as Microsoft Store, Apple App Store, or Google Play Store, are reputable software sources. These platforms provide legitimate and authorized software that has undergone security checks, ensuring users download genuine and safe applications. Freeware websites can provide legitimate software options, but those without user ratings or reviews may lack credibility. User ratings and reviews often provide insights into the quality, safety, and user experience of the software, helping users make informed decisions. Third-party websites offering cracked software are not reputable sources. Such websites often distribute unauthorized and modified versions of software, which can be illegal and compromised with malware or other security risks. Peer-to-peer file-sharing networks are not typically considered reputable software sources. While they may offer access to various software applications, the authenticity, integrity, and security of the downloaded files cannot be guaranteed. There is a higher risk of downloading malware or pirated software from such networks.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is HTTPS used for the most?

Secure web communication

encryption of emails messages

secure file storage

encryption of mobile applications.

Answer explanation

HTTPS encryption ensures secure web communication by encrypting the data transmitted between a web browser and a web server. It provides confidentiality and integrity, protecting sensitive information from eavesdropping and tampering during transmission. HTTPS encryption is not specifically tied to encrypting mobile applications. It is a protocol used for securing communication over the web. HTTPS encryption is not specifically designed for encrypting email messages. It is primarily used for securing web communication. HTTPS encryption is not directly related to secure file storage. It focuses on securing data transmission over the web.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?