Search Header Logo

cybersecurity quiz

Authored by Yemisi Yemisi

Information Technology (IT)

University

Used 2+ times

cybersecurity quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of Least Privilege?


Individuals or systems are granted only those access rights or permissions essential to perform their intended functions.


Individuals should have access only to the information and resources absolutely necessary for their specific tasks or roles.

Dividing responsibilities and privileges among multiple people or systems to prevent fraud and errors.


A layered approach to security that relies on multiple barriers across different layers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Defense-in-Depth?


Individuals or systems are granted only those access rights or permissions essential to perform their intended functions


Individuals should have access only to the information and resources absolutely necessary for their specific tasks or roles

Dividing responsibilities and privileges among multiple people or systems to prevent fraud and errors.

A layered approach to security that relies on multiple barriers across different layers.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some security challenges of biometrics?

Privacy concerns, vulnerability to attacks, accuracy issues.

Password complexity, periodic changes, multi-factor authentication

Unique traits, reliability, convenience

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common form of network addressing?

IP Address

MAC Address

Network ID

Host ID

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Challenge-Handshake Authentication Protocol (CHAP) improve security over PAP?


It transmits passwords in plaintext


It uses a cryptographic mechanism


It is simpler to implement


It does not require a server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the total number of unique addresses allowed by IPv4

Approximately 4.3 billion

Approximately 340 undecillion

Approximately 16 million


Approximately 1 billion

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of the Authentication Server (AS) in Kerberos?


To issue a Ticket Granting Ticket (TGT)

To encrypt all communication

To manage user accounts

To provide access to services

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?