cybersecurity quiz

cybersecurity quiz

University

20 Qs

quiz-placeholder

Similar activities

Final Practice

Final Practice

University

18 Qs

Kuis IP Address Fase F

Kuis IP Address Fase F

9th Grade - University

15 Qs

YEAR 7 MID-TERM  ASSESSMENT

YEAR 7 MID-TERM ASSESSMENT

7th Grade - University

20 Qs

IP - Clase - binarios - Conceptos

IP - Clase - binarios - Conceptos

University

17 Qs

Test

Test

University

15 Qs

Windows Server Installation with DHCP, DNS, and AD

Windows Server Installation with DHCP, DNS, and AD

University

18 Qs

IPv4 Addressing and Subnetting Quiz

IPv4 Addressing and Subnetting Quiz

University

15 Qs

RM_6. nedelja

RM_6. nedelja

University

15 Qs

cybersecurity quiz

cybersecurity quiz

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Yemisi Yemisi

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of Least Privilege?


Individuals or systems are granted only those access rights or permissions essential to perform their intended functions.


Individuals should have access only to the information and resources absolutely necessary for their specific tasks or roles.

Dividing responsibilities and privileges among multiple people or systems to prevent fraud and errors.


A layered approach to security that relies on multiple barriers across different layers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Defense-in-Depth?


Individuals or systems are granted only those access rights or permissions essential to perform their intended functions


Individuals should have access only to the information and resources absolutely necessary for their specific tasks or roles

Dividing responsibilities and privileges among multiple people or systems to prevent fraud and errors.

A layered approach to security that relies on multiple barriers across different layers.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some security challenges of biometrics?

Privacy concerns, vulnerability to attacks, accuracy issues.

Password complexity, periodic changes, multi-factor authentication

Unique traits, reliability, convenience

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common form of network addressing?

IP Address

MAC Address

Network ID

Host ID

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Challenge-Handshake Authentication Protocol (CHAP) improve security over PAP?


It transmits passwords in plaintext


It uses a cryptographic mechanism


It is simpler to implement


It does not require a server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the total number of unique addresses allowed by IPv4

Approximately 4.3 billion

Approximately 340 undecillion

Approximately 16 million


Approximately 1 billion

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of the Authentication Server (AS) in Kerberos?


To issue a Ticket Granting Ticket (TGT)

To encrypt all communication

To manage user accounts

To provide access to services

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?