Security Best Practices

Security Best Practices

11th Grade

40 Qs

quiz-placeholder

Similar activities

APCSP - Unit 6

APCSP - Unit 6

9th - 12th Grade

38 Qs

Y10 Network issues Part 2

Y10 Network issues Part 2

9th - 12th Grade

44 Qs

CyberSecurity 101-2

CyberSecurity 101-2

9th - 12th Grade

37 Qs

OCR MCQ's Data Validation and Authentication Quiz

OCR MCQ's Data Validation and Authentication Quiz

9th - 12th Grade

36 Qs

Creating a Secure System (5.8 - 5.11)

Creating a Secure System (5.8 - 5.11)

9th - 12th Grade

40 Qs

Chapter 2 Basic Switch/Router Configuration

Chapter 2 Basic Switch/Router Configuration

11th Grade

40 Qs

Internet Protocol Quiz

Internet Protocol Quiz

10th Grade - University

44 Qs

AP CSP Quiz #1

AP CSP Quiz #1

11th Grade

42 Qs

Security Best Practices

Security Best Practices

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Lawrence Cook

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What term refers to the security measure that protects data in its static state, typically stored on a physical device?

Data in motion

Data at rest

Data in use

Data in transit

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which term describes a security concept that involves giving users the minimum levels of access – or permissions – they need to perform their job functions?

Principle of least interest

Principle of least privilege

Principle of least concern

Principle of least authority

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What is the process of converting plaintext into a coded form to prevent unauthorized access called?

Decryption

Authentication

Encryption

Authorization

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which term is used to describe the process of verifying the identity of a person or device before allowing access to a system?

Authorization

Validation

Encryption

Authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What is encryption?

The process of proving a user's identity.

The practice of giving users only the resources needed to perform their job.

Any data that is not currently being accessed.

The process of converting cleartext, or unencrypted, data into an unreadable format by using a special key and mathematical algorithm.

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What does 'data at rest' refer to?

The process of converting data into an unreadable format.

Any data that is not currently being accessed.

The practice of giving users only the resources needed to perform their job.

The process of proving a user's identity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What is authentication?

The practice of giving users only the resources needed to perform their job.

Any data that is not currently being accessed.

The process of converting data into an unreadable format.

The process of proving a user's identity.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?