Cybersecurity Quiz

Quiz
•
Computers
•
12th Grade
•
Medium
Tarase Mcgee
Used 17+ times
FREE Resource
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following security measures is a form of biometrics?
Fingerprint scanner
Chassis intrusion detection
TPM
BIOS password
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?
Include the original operating system discs and product keys with the computers
Use data wiping software to clear the hard drives
Reformat the hard drives
Delete user data and applications from the hard drives
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following protocols can be enabled so email is encrypted on a mobile device?
SSL
IMAP
POP3
SMTP
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which Internet protocol is used to transmit encrypted data?
FTP
HTTP
HTTPS
DNS
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?
Configure your device to remotely backup important data to the Cloud.
Configure your device to backup important data to your personal computer.
Don't put important information on your mobile device.
Only use apps, such as email apps, that store data on the app provider's servers.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?
Integrity
Authentication
Authorization
Non-repudiation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?
Authentication
Access control
Accounting
Access control
Create a free account and access millions of resources
Similar Resources on Wayground
40 questions
EMAIL SERVER DAN DATABASE SERVER

Quiz
•
12th Grade
50 questions
THI THỬ TA CNTT

Quiz
•
8th Grade - University
40 questions
A+101 - BIOS/UEFI

Quiz
•
10th Grade - University
40 questions
Creating a Secure System (5.8 - 5.11)

Quiz
•
9th - 12th Grade
46 questions
Module 1: Network Security Certification Exam

Quiz
•
9th - 12th Grade
46 questions
Latihan Soal Informatika Kelas XII

Quiz
•
12th Grade - University
44 questions
CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

Quiz
•
12th Grade
43 questions
ITF + Chapter 2

Quiz
•
12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade