CHAPTER 2 SBITP

CHAPTER 2 SBITP

University

5 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Week 2 Quiz

Cybersecurity Fundamentals Week 2 Quiz

KG - University

10 Qs

basic computer design

basic computer design

University

10 Qs

Network Management Week 14

Network Management Week 14

University

10 Qs

How Safe are you? (Disclaimer: I do not own these questions)

How Safe are you? (Disclaimer: I do not own these questions)

University

10 Qs

COMPUTER HARDWARE OUTPUT

COMPUTER HARDWARE OUTPUT

1st Grade - Professional Development

10 Qs

Machine Learning (Introduction)

Machine Learning (Introduction)

University

10 Qs

Planning and Implementation of Information Security

Planning and Implementation of Information Security

University

10 Qs

introduction to computer graphics

introduction to computer graphics

University

10 Qs

CHAPTER 2 SBITP

CHAPTER 2 SBITP

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

SITI (PMJ)

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the CORRECT way to create a password?

Your children's or pet's names

Using look-alike substitutions of numbers or symbols

Using common names or words from the dictionary

A combination of upper and lowercase letters mixed with numbers and symbols.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the form of a palm scan, fingerprint scan and iris scan

Single sign-on

Strong authentication

Biometric authentication

Two-factor authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Plaintext has been transformed into different form  through encryption for anyone who does not have a key

Identify the answer statement above

Keyword

Public key

Ciphertext

Private key

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Network is crucial to assist the security-related certifications. Identify the CORRECT security requirements for developing the effective security policy.

Physical security

User ID

Rights management

Auditing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify from the following that is NOT a common biometric device?

Fingerprint reader

Retina scanner

Face recognition

Employee Punch card

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers