
Security VI

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Sandra Battle
Used 3+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which practice might lead to a user writing down their password, potentially exposing it to others?
Password Expiration
Artificial Complexity
Password Length
Password reuse across sites
Answer explanation
Artificial complexity can make a password hard to remember, leading users to write them down or have to reset them often. While reusing passwords across sites can lead to other security vulnerabilities, it typically does not lead to users writing down their passwords. Password expiration, or changing the password periodically, does not inherently lead to users writing down their password. While long passwords can be more difficult to remember, the term artificial complexity refers specifically to adding a variety of character types (such as symbols, numbers, uppercase and lowercase letters) to a password.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a recommended approach to creating strong and memorable passwords?
combining random words with numbers and special characters
repeating the same password for different accounts
Choosing common dictionary words or passwords
Using personal information such as birthdates or names
Answer explanation
Combining random words with numbers and special characters is a recommended approach to creating strong and memorable passwords. This technique, known as passphrase or password phrase, creates longer passwords that are more resistant to brute-force attacks. Using a combination of unrelated words along with numbers and special characters adds complexity to the password and makes it harder to guess. Using personal information such as birthdates or names as passwords is not recommended as they are easily guessable or can be obtained through social engineering. Personal information should be avoided when creating passwords. Repeating the same password for different accounts is a risky practice as it increases the potential impact if one account is compromised. If an attacker gains access to one account, they can potentially access all other accounts using the same password. It is advisable to use unique passwords for each account to enhance security. Choosing common dictionary words as passwords is also not recommended as they are vulnerable to dictionary-based attacks or brute-force cracking. Hackers often use automated tools that can quickly try different combinations of common words.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following security measures is designed to control incoming and outgoing network traffic for a specific device, providing an added layer of protection against unauthorized access?
Host Firewall
Patching Updates
Changing Default Passwords
Antivirus/ Anti-malware
Answer explanation
A host firewall is designed to control incoming and outgoing network traffic for a specific device. It acts as a barrier between the device and the network, regulating communication and providing an added layer of protection against unauthorized access. Host firewalls can be configured to allow or block specific network connections based on predefined rules. Antivirus and anti-malware software are essential for detecting and removing malicious software. However, they focus on identifying and eliminating malware, rather than controlling network traffic for a specific device. Patching updates involve applying software updates and security patches to address known vulnerabilities in software. While important for maintaining overall security, it is not directly related to controlling network traffic or providing an added layer of protection against unauthorized access. Changing default passwords is a good security practice to prevent unauthorized access to devices or systems. However, it does not specifically pertain to controlling network traffic or providing an added layer of protection against unauthorized access.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of backup is performed on critical data that needs to be restored quickly in case of a system failure?
Redundancy backup
OS backup
File Back Up
Database Back Up
Answer explanation
Database backup specifically focuses on creating copies of databases, which often contain critical data. Database backups are designed to capture the entire database or specific components of it, allowing for efficient restoration of critical data. File backup involves creating copies of individual files or folders. While it is a common backup method, it may not be the most suitable for critical data that needs to be restored quickly in case of a system failure. "Redundancy backup" is not a recognized term in the context of data backup. Redundancy typically refers to the practice of having duplicate resources or systems in place to ensure fault tolerance, rather than a specific backup method. OS backup involves creating copies of the operating system (OS) files and configurations. While OS backups are essential for system recovery, they do not necessarily target critical data restoration.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to a system's ability to operate continuously without failure, even if a component breaks down?
Replication
Fault Tolerance
Contingency Planning
Redundancy
Answer explanation
Fault tolerance is a system’s ability to continue functioning even if a component fails. This is often achieved through redundancy or backup components. Redundancy is a part of fault tolerance. It refers to the practice of duplicating components or systems to prevent failure but is not equivalent to the broader concept of fault tolerance. While contingency planning is an important part of maintaining operations during disruptions, it is a broader concept that includes strategies like alternate work procedures or backup resources, not just system component reliability. Replication is a process often used in fault tolerance and involves synchronizing data between servers or sites. However, it is a specific process within fault tolerance, not the overall concept.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which cryptographic method is used to confirm that a digital message or document has not been altered, providing proof of data integrity?
Symmetric Encryption
Asymmetric Encryption
Public Key Infrastructure (PKI)
Cryptographic Hashes
Answer explanation
Cryptographic hashes are used to verify the integrity of data or a document. By comparing the hash of the received data with the hash of the original data, it can be confirmed whether the data was altered during transmission. Symmetric encryption is primarily used to protect confidentiality of the data, not to confirm that the data has not been altered. Asymmetric encryption is mainly used to secure data in transit and for digital signatures, it's not specifically used to confirm that a digital message or document has not been altered. PKI is a method of securely exchanging data over networks, it doesn't directly confirm that a digital message or document has not been altered.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of data encryption is applied to protect data stored on a mobile device?
Disk level Encryption
Mobile Device Encryption
Network level Encryption
File Level Encyption
Answer explanation
Mobile device encryption refers to the encryption of data stored on a mobile device such as a smartphone or tablet. It provides protection for the entire device's storage, including the operating system, applications, and user data. Network level encryption refers to the encryption of data transmitted over a network, such as through secure protocols like HTTPS or VPN. It does not specifically apply to protecting data stored on a mobile device. Disk level encryption refers to the encryption of an entire disk or storage device, including the operating system and all data stored on it. While it can be applied to mobile devices, it is not the specific type of encryption commonly used for protecting data on mobile devices. File level encryption refers to the encryption of individual files and folders, typically on a computer or storage device. It does not specifically apply to the protection of data stored on a mobile device.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
DETECTING AND PREVENTING CYBER SECURITY THREATS

Quiz
•
9th - 12th Grade
11 questions
CC 6:19 - 6:24 Terms

Quiz
•
9th Grade
10 questions
Technical Terms - Internet (A-Z) - LDAP

Quiz
•
12th Grade
20 questions
Unit 2.3 Robust Programs MCQs L1

Quiz
•
10th - 11th Grade
20 questions
OCR GCSE CS MCQs 2.3 Defensive Design

Quiz
•
10th - 11th Grade
20 questions
G10 IGCSE ICT Security of Data

Quiz
•
9th - 10th Grade
10 questions
J277 Network Threats

Quiz
•
7th - 11th Grade
20 questions
Cybersecurity2

Quiz
•
12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
Discover more resources for Computers
50 questions
Trivia 7/25

Quiz
•
12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
6 questions
RL.10.1 Cite Evidence

Quiz
•
10th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
14 questions
Algebra 1 SOL Review #1

Quiz
•
9th Grade