J836 Recap 5.4.3 Prevention Measures

J836 Recap 5.4.3 Prevention Measures

10th Grade

22 Qs

quiz-placeholder

Similar activities

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

security best practices

security best practices

10th Grade - University

20 Qs

Online Privacy

Online Privacy

University

20 Qs

Types of Database Security Controls

Types of Database Security Controls

11th Grade

20 Qs

Data protection

Data protection

9th - 11th Grade

21 Qs

BTEC IT Revision Quiz 1 (various topics)

BTEC IT Revision Quiz 1 (various topics)

9th - 11th Grade

20 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

Forms of Network Attack

Forms of Network Attack

10th Grade

18 Qs

J836 Recap 5.4.3 Prevention Measures

J836 Recap 5.4.3 Prevention Measures

Assessment

Quiz

Computers

10th Grade

Medium

Created by

David Anderson

Used 6+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data theft can occur when data is in transit. Identify one other state when data theft could occur.

When data is at rest

When data is being processed

When data is deleted

When data is encrypted

Answer explanation

Data theft can also occur when data is at rest, meaning when it is stored on devices or servers. This state is vulnerable to unauthorized access if proper security measures are not in place.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does RFID stand for?

Radio Frequency Identification

Remote Frequency Identification

Radio Frequency Integrated Device

Remote Frequency Integrated Device

Answer explanation

RFID stands for Radio Frequency Identification, which is a technology used to automatically identify and track tags attached to objects using radio waves. The other options are incorrect interpretations of the acronym.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Logical prevention measures will be used to increase the protection of the entrants’ data stored on the USB flash drive. Which of the following methods could be used by the animal charity to keep the data stored on the USB flash drive secure?

Two-factor authentication (2FA) and encryption

Password protection only

Physical lock and key

No security measures

Answer explanation

Two-factor authentication (2FA) and encryption provide robust security for data on a USB flash drive, ensuring that only authorized users can access the data and that it is protected from unauthorized access.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keypads are one physical protection measure. Identify one other physical protection measure.

Security cameras

Firewalls

Antivirus software

Encryption

Answer explanation

Security cameras are another physical protection measure that help monitor and record activities, enhancing security alongside keypads. Other options like firewalls and antivirus software are not physical measures.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Monty Bella restaurant is concerned about the security of the website. When a customer registers for the website, the customer must create a username and password. How do usernames and passwords increase the security of the website?

They provide a unique identity and access control.

They allow multiple users to share the same account.

They make the website load faster.

They are used to store customer preferences.

Answer explanation

Usernames and passwords provide a unique identity for each customer, allowing the restaurant to control access to their website. This ensures that only authorized users can access their accounts and personal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Monty Bella restaurant is concerned about the security of the website. The restaurant has been advised to install a firewall. How will a firewall increase the security of the Monty Bella website?

By blocking unauthorised access to the network

By increasing the website's loading speed

By improving the website's design

By reducing the cost of website maintenance

Answer explanation

A firewall increases the security of the Monty Bella website by blocking unauthorized access to the network, preventing potential attacks and protecting sensitive information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify one logical prevention measure that controls the files allocated to an employee.

Access control lists

Regular audits

Data encryption

Employee training

Answer explanation

Access control lists (ACLs) are essential for managing permissions and ensuring that only authorized employees can access specific files, effectively controlling file allocation.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?