CSC-3350 Review Part 3

CSC-3350 Review Part 3

University

30 Qs

quiz-placeholder

Similar activities

week 6 workshop quiz for sec+

week 6 workshop quiz for sec+

University - Professional Development

25 Qs

Chapter	9.	Physical	Security	and	Authentication Models

Chapter 9. Physical Security and Authentication Models

University

35 Qs

Authentication and Security Protocols

Authentication and Security Protocols

University

35 Qs

IT301 Final Ex 2022

IT301 Final Ex 2022

University

25 Qs

Networking and IT

Networking and IT

10th Grade - Professional Development

28 Qs

week 7 sec+ quiz

week 7 sec+ quiz

12th Grade - Professional Development

27 Qs

Quiz kotajako1

Quiz kotajako1

University

25 Qs

Security Part 2( Technical Diploma)

Security Part 2( Technical Diploma)

University

35 Qs

CSC-3350 Review Part 3

CSC-3350 Review Part 3

Assessment

Quiz

Computers

University

Easy

Created by

Yahir S

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves a disgruntled/rogue employee?

Insider Attack

Lunchtime Attack

Focused Attack

Phishing Atack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack takes place during a small window of opportunity such as during lunch/coffee break?

Insider Attack

Lunchtime Attack

Focused Attack

Phishing Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of physical risk?

The likelihood of financial loss due to market fluctuations
The emotional distress caused by a stressful situation
The probability of winning a game of chance

The likelihood that a computer/network can be exploited

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of physical security?

Physical security is only concerned with securing data
Physical security involves securing virtual locations
Physical security is not necessary for protecting equipment

Physical security is a system of obstacles, safeguards, and procedures o protect people and network data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an RFID tag?

An Radio Frequency Identification tag is a tag that uses electromagnetic and electrostatic coupling to transmit signals.

An Radio Frequency Identification tag is a type of dessert made with chocolate and caramel.

An Radio Frequency Identification tag is a new social media platform for sharing photos and videos.

An Radio Frequency Identification tag is a type of bird species known for its colorful feathers.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of wireless protection?

Methods to secure landline telephones.
Measures to protect against physical damage.

Protection of Wi-Fi signal by keeping it private and unusable to unauthorized individuals such as using by security tokens

Security measures for wired networks and devices.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an NFC tag?

An Near Fields Communication tag is a type of social media platform

An Near Fields Communication tag is a type of fruit

An Near Fields Communication tag is a type of computer software

An Near Fields Communication tag is a tag that uses wireless technology similar to RFID to send and receive data transmissions wirelessly

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?