67 Question Sec+ Quiz

67 Question Sec+ Quiz

12th Grade

58 Qs

quiz-placeholder

Similar activities

Test Review - Ch 25,26,27 - Insurance

Test Review - Ch 25,26,27 - Insurance

9th - 12th Grade

53 Qs

ICS - Hamsters in Hawaii

ICS - Hamsters in Hawaii

9th - 12th Grade

56 Qs

Core 01 Health & Safety

Core 01 Health & Safety

KG - University

58 Qs

Personal Finance Final

Personal Finance Final

9th - 12th Grade

63 Qs

Economics Final Exam

Economics Final Exam

12th Grade

63 Qs

Economics Chapter 6 Quiz V2

Economics Chapter 6 Quiz V2

11th - 12th Grade

60 Qs

ECON : 2nd 9-Weeks

ECON : 2nd 9-Weeks

12th Grade

60 Qs

PERSONAL FINANCE FINAL REVIEW

PERSONAL FINANCE FINAL REVIEW

9th - 12th Grade

54 Qs

67 Question Sec+ Quiz

67 Question Sec+ Quiz

Assessment

Quiz

Other

12th Grade

Easy

Created by

steven bair

Used 2+ times

FREE Resource

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes the CIA Triad?

Confidentiality, Integrity, Authentication

Confidentiality, Integrity, Availability

Control, Integrity, Availability

Compliance, Integrity, Authentication

Answer explanation

The CIA Triad stands for Confidentiality, Integrity, and Availability. These three principles are essential for ensuring the security and reliability of information systems, making this the correct choice.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary function of a firewall?

Encrypting sensitive data

Blocking unauthorized access while permitting legitimate communication

Detecting and removing malware

Managing user authentication

Answer explanation

The primary function of a firewall is to block unauthorized access while permitting legitimate communication, ensuring network security by controlling incoming and outgoing traffic.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack involves an attacker intercepting and modifying communications between two parties?

Man-in-the-Middle (MitM)

Phishing

Denial-of-Service (DoS)

SQL Injection

Answer explanation

The Man-in-the-Middle (MitM) attack occurs when an attacker secretly intercepts and alters the communication between two parties, making it the correct choice. Other options like phishing, DoS, and SQL injection do not involve this type of interception.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of multi-factor authentication (MFA)?

To require users to answer multiple security questions

To ensure users reset their passwords regularly

To provide an additional layer of security by requiring two or more authentication factors

To replace password-based authentication

Answer explanation

The correct choice highlights that multi-factor authentication (MFA) adds an extra layer of security by requiring two or more authentication factors, making it harder for unauthorized users to gain access.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a physical security control?

Antivirus software

Firewall

Security badge access

Password policy

Answer explanation

Security badge access is a physical security control that restricts access to facilities. In contrast, antivirus software, firewalls, and password policies are examples of logical security controls.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware disguises itself as legitimate software to trick users into installing it?

Worm

Trojan Horse

Rootkit

Ransomware

Answer explanation

A Trojan Horse is a type of malware that pretends to be legitimate software, tricking users into installing it. Unlike worms or ransomware, it relies on user action to spread and execute.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security measure is commonly used to prevent brute-force attacks?

Account lockout policy

Antivirus software

Content filtering

Network segmentation

Answer explanation

An account lockout policy is designed to prevent brute-force attacks by temporarily locking accounts after a certain number of failed login attempts, thereby thwarting unauthorized access attempts.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?