Search Header Logo

Risk, Security, and Compliance

Authored by Kathleen Dooley

Computers

9th - 12th Grade

Used 2+ times

Risk, Security, and Compliance
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of attack targets a server's OS?

Keylogger

Phishing

Social engineering

Rootkit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a DDoS attack, the flood of messages to the target website come from ___________ servers.

infected

unifnecte

spoofed

the hacker's

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following does NOT provide physical security?

Access badge

Firewall

Video camera

Tamper detection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these devices does NOT prevent access to a protected area?

IPS

Firewall

Keypad

IDS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most secure password?

p@$$w0rd

$t@rw@r$

07041776

yellowMonthMagneficant

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these encryption techniques does NOT rely on a key?

Polyalphabetic substitution-based cipher

Data Encryption Standard

Monoalphabetic substitution-based cipher

Transposition-based cipher

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle, if adequately followed, ensures a person cannot write their own employee evalution report?

Shared responsibility model

Separation of duties

Defense in depth

Principle of least priviledge

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?