IT Security Quiz

IT Security Quiz

University

40 Qs

quiz-placeholder

Similar activities

CLOUD

CLOUD

University

37 Qs

PAS KK TKJ Kelas XII TKJ 2

PAS KK TKJ Kelas XII TKJ 2

12th Grade - University

40 Qs

Quiz Keterampilan Digital

Quiz Keterampilan Digital

12th Grade - University

37 Qs

NET1L - Lesson 1 (Network Trends - Network Security)

NET1L - Lesson 1 (Network Trends - Network Security)

University

41 Qs

ITD11303 DATABASE

ITD11303 DATABASE

University

35 Qs

PAS INFORMATIKA XI - GENAP

PAS INFORMATIKA XI - GENAP

11th Grade - University

40 Qs

Global info revision

Global info revision

11th Grade - University

40 Qs

NETWORK & COMMUNICATION FINAL (Long Quiz)

NETWORK & COMMUNICATION FINAL (Long Quiz)

University

40 Qs

IT Security Quiz

IT Security Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Shada Momani

Used 2+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Windows component checks access rights and generates audit logs?

LSA

SAM

SRM

Active Directory

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a chroot jail in Linux?

Encrypt files

Restrict a process’s view of the filesystem

Monitor network traffic

Patch vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which privilege in Linux allows a program to run as root?

sudo

setuid

chmod

rootkit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does OS hardening NOT involve?

Removing unused services

Installing patches

Weakening access controls

Configuring user permissions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which virtualization type runs directly on bare metal?

Type 1 Hypervisor

Type 2 Hypervisor

Container

Sandbox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary defense against SQL injection?

Firewalls

Parametrized queries

Data masking

Regular backups

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which GDPR rule mandates breach notifications within 72 hours?

Data Minimization

Breach Notification Rule

Right to Erasure

Storage Limitation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?