
67 Question Sec+ Quiz
Authored by steven bair
Other
12th Grade
Used 13+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
58 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best describes the CIA Triad?
Confidentiality, Integrity, Authentication
Confidentiality, Integrity, Availability
Control, Integrity, Availability
Compliance, Integrity, Authentication
Answer explanation
The CIA Triad stands for Confidentiality, Integrity, and Availability. These three principles are essential for ensuring the security and reliability of information systems, making this the correct choice.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the primary function of a firewall?
Encrypting sensitive data
Blocking unauthorized access while permitting legitimate communication
Detecting and removing malware
Managing user authentication
Answer explanation
The primary function of a firewall is to block unauthorized access while permitting legitimate communication, ensuring network security by controlling incoming and outgoing traffic.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which attack involves an attacker intercepting and modifying communications between two parties?
Man-in-the-Middle (MitM)
Phishing
Denial-of-Service (DoS)
SQL Injection
Answer explanation
The Man-in-the-Middle (MitM) attack occurs when an attacker secretly intercepts and alters the communication between two parties, making it the correct choice. Other options like phishing, DoS, and SQL injection do not involve this type of interception.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the purpose of multi-factor authentication (MFA)?
To require users to answer multiple security questions
To ensure users reset their passwords regularly
To provide an additional layer of security by requiring two or more authentication factors
To replace password-based authentication
Answer explanation
The correct choice highlights that multi-factor authentication (MFA) adds an extra layer of security by requiring two or more authentication factors, making it harder for unauthorized users to gain access.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is an example of a physical security control?
Antivirus software
Firewall
Security badge access
Password policy
Answer explanation
Security badge access is a physical security control that restricts access to facilities. In contrast, antivirus software, firewalls, and password policies are examples of logical security controls.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of malware disguises itself as legitimate software to trick users into installing it?
Worm
Trojan Horse
Rootkit
Ransomware
Answer explanation
A Trojan Horse is a type of malware that pretends to be legitimate software, tricking users into installing it. Unlike worms or ransomware, it relies on user action to spread and execute.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which security measure is commonly used to prevent brute-force attacks?
Account lockout policy
Antivirus software
Content filtering
Network segmentation
Answer explanation
An account lockout policy is designed to prevent brute-force attacks by temporarily locking accounts after a certain number of failed login attempts, thereby thwarting unauthorized access attempts.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?