Match the following

Match the following

University

28 Qs

quiz-placeholder

Similar activities

2B. Active Reconnaissance - Enumeration

2B. Active Reconnaissance - Enumeration

University

24 Qs

Review 32 - Will/going to

Review 32 - Will/going to

University

25 Qs

Atividade sobre Modelos de Processo de Software

Atividade sobre Modelos de Processo de Software

University

25 Qs

Modeling & Rendering

Modeling & Rendering

University

24 Qs

P03JARKOM

P03JARKOM

University

25 Qs

Module 3 - Security Architecture

Module 3 - Security Architecture

University

25 Qs

Ulangan Harian Sistem Komputer

Ulangan Harian Sistem Komputer

University

24 Qs

Uji Pengetahuan Teknik Informatika

Uji Pengetahuan Teknik Informatika

10th Grade - University

23 Qs

Match the following

Match the following

Assessment

Quiz

Computers

University

Hard

Created by

BANKS DINA

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Media Image

Match the description with the most accurate attack type. Not all attack types will be used.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Match the description with the most accurate attack type. Not all attack types will be used.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Match the description with the most accurate attack type. Not all attack types will be used.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the BEST security control for the Library Computer Room from the available options.

Locking Cabinets

Environmental Sensors

Video Surveillance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the BEST security control for the Web Server and Database Server described as having high security.

Locking Cabinets

Environmental Sensors

Video Surveillance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select the BEST security control for the Library Employee Laptops used offsite and containing PII.

Full-Disk Encryption

Biometric Reader

7.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Fill in the blank with the BEST secure network protocol for the description: Accept customer purchases from your primary website.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?