67 Question Sec+ Quiz

67 Question Sec+ Quiz

12th Grade

58 Qs

quiz-placeholder

Similar activities

HERO TEAM VÀ PLAY TOGETHER

HERO TEAM VÀ PLAY TOGETHER

1st - 12th Grade

53 Qs

ConQUIZ Brăila - C

ConQUIZ Brăila - C

9th - 12th Grade

59 Qs

Skeletal System Quiz

Skeletal System Quiz

11th - 12th Grade

60 Qs

general knowledge

general knowledge

9th - 12th Grade

60 Qs

Нийгэм улс төр

Нийгэм улс төр

12th Grade

59 Qs

Clases de sujeto

Clases de sujeto

12th Grade

60 Qs

Concurso Navideño I.E.S Los Batanes 2021

Concurso Navideño I.E.S Los Batanes 2021

1st - 12th Grade

55 Qs

Cuestionario sobre Gestión, literatura comparada, y critica

Cuestionario sobre Gestión, literatura comparada, y critica

5th Grade - University

55 Qs

67 Question Sec+ Quiz

67 Question Sec+ Quiz

Assessment

Quiz

Other

12th Grade

Practice Problem

Easy

Created by

steven bair

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes the CIA Triad?

Confidentiality, Integrity, Authentication

Confidentiality, Integrity, Availability

Control, Integrity, Availability

Compliance, Integrity, Authentication

Answer explanation

The CIA Triad stands for Confidentiality, Integrity, and Availability. These three principles are essential for ensuring the security and reliability of information systems, making this the correct choice.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary function of a firewall?

Encrypting sensitive data

Blocking unauthorized access while permitting legitimate communication

Detecting and removing malware

Managing user authentication

Answer explanation

The primary function of a firewall is to block unauthorized access while permitting legitimate communication, ensuring network security by controlling incoming and outgoing traffic.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack involves an attacker intercepting and modifying communications between two parties?

Man-in-the-Middle (MitM)

Phishing

Denial-of-Service (DoS)

SQL Injection

Answer explanation

The Man-in-the-Middle (MitM) attack occurs when an attacker secretly intercepts and alters the communication between two parties, making it the correct choice. Other options like phishing, DoS, and SQL injection do not involve this type of interception.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of multi-factor authentication (MFA)?

To require users to answer multiple security questions

To ensure users reset their passwords regularly

To provide an additional layer of security by requiring two or more authentication factors

To replace password-based authentication

Answer explanation

The correct choice highlights that multi-factor authentication (MFA) adds an extra layer of security by requiring two or more authentication factors, making it harder for unauthorized users to gain access.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a physical security control?

Antivirus software

Firewall

Security badge access

Password policy

Answer explanation

Security badge access is a physical security control that restricts access to facilities. In contrast, antivirus software, firewalls, and password policies are examples of logical security controls.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of malware disguises itself as legitimate software to trick users into installing it?

Worm

Trojan Horse

Rootkit

Ransomware

Answer explanation

A Trojan Horse is a type of malware that pretends to be legitimate software, tricking users into installing it. Unlike worms or ransomware, it relies on user action to spread and execute.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security measure is commonly used to prevent brute-force attacks?

Account lockout policy

Antivirus software

Content filtering

Network segmentation

Answer explanation

An account lockout policy is designed to prevent brute-force attacks by temporarily locking accounts after a certain number of failed login attempts, thereby thwarting unauthorized access attempts.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?