Cybersecurity Quiz
Quiz
•
Computers
•
12th Grade
•
Practice Problem
•
Medium
Tarase Mcgee
Used 27+ times
FREE Resource
Enhance your content in a minute
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following security measures is a form of biometrics?
Fingerprint scanner
Chassis intrusion detection
TPM
BIOS password
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?
Include the original operating system discs and product keys with the computers
Use data wiping software to clear the hard drives
Reformat the hard drives
Delete user data and applications from the hard drives
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following protocols can be enabled so email is encrypted on a mobile device?
SSL
IMAP
POP3
SMTP
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which Internet protocol is used to transmit encrypted data?
FTP
HTTP
HTTPS
DNS
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?
Configure your device to remotely backup important data to the Cloud.
Configure your device to backup important data to your personal computer.
Don't put important information on your mobile device.
Only use apps, such as email apps, that store data on the app provider's servers.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?
Integrity
Authentication
Authorization
Non-repudiation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?
Authentication
Access control
Accounting
Access control
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
50 questions
kuis Jaringan Internet
Quiz
•
9th Grade - University
40 questions
แบบทดสอบ Coding : Micro Python 1
Quiz
•
9th - 12th Grade
40 questions
XII MM [DESAIN MULTIMEDIA INTERAKTIF] PAS
Quiz
•
12th Grade
50 questions
SUMATIF AKHIR SEMESTER KELAS VII
Quiz
•
7th Grade - University
40 questions
FE-Practice # 1
Quiz
•
12th Grade - University
45 questions
Quiz TIK
Quiz
•
12th Grade
50 questions
Microsoft Word Tekrar
Quiz
•
9th - 12th Grade
41 questions
Test próbny EE.09 (Bazy danych)
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
Discover more resources for Computers
15 questions
Internet Vocabulary Notebook Check #2 - CTEA(2024)
Quiz
•
12th Grade
11 questions
Internet Terms Vocabulary- Notebook Check #1- CTEA
Quiz
•
12th Grade
50 questions
Money Matters Fall 2025 Final Exam — Worksheet Questions
Quiz
•
12th Grade
47 questions
CSF Final Exam Practice
Quiz
•
9th - 12th Grade
