IT Security Quiz

IT Security Quiz

University

40 Qs

quiz-placeholder

Similar activities

Mid term mock test

Mid term mock test

University

35 Qs

Tematik tema 9 (IPA)

Tematik tema 9 (IPA)

1st Grade - University

40 Qs

2025 CLASS 6 COMPUTER REVISION SESSION

2025 CLASS 6 COMPUTER REVISION SESSION

6th Grade - University

40 Qs

Computer memory

Computer memory

University

45 Qs

Have fun with quiz !

Have fun with quiz !

3rd Grade - University

39 Qs

Ujian IoT PTS 2024 45 Soal

Ujian IoT PTS 2024 45 Soal

11th Grade - University

45 Qs

Midterm Exam - HCI

Midterm Exam - HCI

University

42 Qs

IT Security Quiz

IT Security Quiz

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Shada Momani

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Windows component checks access rights and generates audit logs?

LSA

SAM

SRM

Active Directory

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a chroot jail in Linux?

Encrypt files

Restrict a process’s view of the filesystem

Monitor network traffic

Patch vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which privilege in Linux allows a program to run as root?

sudo

setuid

chmod

rootkit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does OS hardening NOT involve?

Removing unused services

Installing patches

Weakening access controls

Configuring user permissions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which virtualization type runs directly on bare metal?

Type 1 Hypervisor

Type 2 Hypervisor

Container

Sandbox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary defense against SQL injection?

Firewalls

Parametrized queries

Data masking

Regular backups

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which GDPR rule mandates breach notifications within 72 hours?

Data Minimization

Breach Notification Rule

Right to Erasure

Storage Limitation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers