CY1U12.1 Security Test 1

CY1U12.1 Security Test 1

9th - 12th Grade

34 Qs

quiz-placeholder

Similar activities

Chapter 11 Review

Chapter 11 Review

7th - 12th Grade

30 Qs

Chapter 13 Test Review

Chapter 13 Test Review

7th - 12th Grade

30 Qs

Computer Applications Technology

Computer Applications Technology

12th Grade

30 Qs

Computer quiz

Computer quiz

9th - 12th Grade

31 Qs

Grade 6-s2-a2-spreadsheet

Grade 6-s2-a2-spreadsheet

3rd - 12th Grade

33 Qs

html and www

html and www

11th Grade - University

29 Qs

Principles of IT-Chapter 5 Test

Principles of IT-Chapter 5 Test

7th - 12th Grade

30 Qs

LO1 iMedia

LO1 iMedia

7th - 10th Grade

31 Qs

CY1U12.1 Security Test 1

CY1U12.1 Security Test 1

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Qiyu Luo

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ports that are open but unused can allow malware to enter a system.

True
False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In addition to blocking ports, incoming traffic can be blocked by MAC address.

True
False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Blacklists grant access to a short list of devices that have been approved ahead of time.

True
False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The forest, tree, and domain are logical divisions or levels in an active directory network.

True
False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Amanda works at a high-security building. When she enters, she has to park in an assigned parking spot, show her identification badge to a security guard, and use a fingerprint scanner to access her company computer. What type of security measures are being described?

Physical Security
Logical Security
Management Security
Operational Security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following forms of physical security would be the least likely to be compromised?

An identification badge
A door lock
A biometric lock
A privacy screen

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might an adversary manipulate the physical environment of a room?

They could compromise a system through overheating the roo
Poor air quality in a room may short circuit the system
Both A and B
Neither A nor B

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?