Which of the following security measures is a form of biometrics?
Cybersecurity Quiz

Quiz
•
Computers
•
12th Grade
•
Medium
Tarase Mcgee
Used 17+ times
FREE Resource
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Fingerprint scanner
Chassis intrusion detection
TPM
BIOS password
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?
Include the original operating system discs and product keys with the computers
Use data wiping software to clear the hard drives
Reformat the hard drives
Delete user data and applications from the hard drives
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following protocols can be enabled so email is encrypted on a mobile device?
SSL
IMAP
POP3
SMTP
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which Internet protocol is used to transmit encrypted data?
FTP
HTTP
HTTPS
DNS
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?
Configure your device to remotely backup important data to the Cloud.
Configure your device to backup important data to your personal computer.
Don't put important information on your mobile device.
Only use apps, such as email apps, that store data on the app provider's servers.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?
Integrity
Authentication
Authorization
Non-repudiation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?
Authentication
Access control
Accounting
Access control
Create a free account and access millions of resources
Similar Resources on Quizizz
48 questions
CIW IBA Lesson 3 Review

Quiz
•
9th - 12th Grade
43 questions
ITF + Chapter 2

Quiz
•
12th Grade
40 questions
Introduction to Computer Science

Quiz
•
9th - 12th Grade
45 questions
Internet Infrastructure

Quiz
•
11th Grade - University
40 questions
3rd Periodical Examination ETech

Quiz
•
12th Grade
50 questions
Principles of IT EOY Test Prep

Quiz
•
9th - 12th Grade
40 questions
HTML Practice 2 of 4

Quiz
•
11th - 12th Grade
40 questions
TestOut Quiz DLP U/V/W

Quiz
•
11th Grade - University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University