Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

4th Grade

20 Qs

quiz-placeholder

Similar activities

Computing CPD

Computing CPD

4th Grade

17 Qs

Grade-4  [OpenOffice interface]

Grade-4 [OpenOffice interface]

4th Grade

17 Qs

Computer Lab Level 1

Computer Lab Level 1

3rd - 7th Grade

17 Qs

Database Basics v2 N5

Database Basics v2 N5

1st - 12th Grade

20 Qs

Word Processing Lessons 3 and 4 Review

Word Processing Lessons 3 and 4 Review

KG - University

20 Qs

ULANGAN 1 TLJ KELAS XII

ULANGAN 1 TLJ KELAS XII

KG - Professional Development

20 Qs

Quiz time 2nd revision

Quiz time 2nd revision

4th - 5th Grade

20 Qs

3 4. Secret Messages and Code (Data)

3 4. Secret Messages and Code (Data)

1st - 5th Grade

16 Qs

Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

Assessment

Quiz

Computers

4th Grade

Medium

Created by

NURRUL ISMAIL

Used 18+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is NOT the need for Physical Security? To prevent ...

any unauthorized access to computer systems

tampering/stealing of data from computer systems

the loss of data/damage to systems against any natural calamities

any viruses or malicious code from computer systems.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select a few steps can be done to avoid data breaches caused by physical security threats:

Train staff on social engineering

Secure workstations

Protect the portables (laptop)

•Disable the drives

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Choose the natural physical security treats?

Floods

Earthquakes

Bombings

War

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

These following techniques are used for authentication:

•Smart cards

•Proximity cards

•Biometrics

•Attendance List

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user must move his/her head very close to the scanner and has to focus on the green light in the scanner. Choose the correct authentication method describe above.

Voice Recognition

Facial Recognition

Iris recognition

Retina recognition

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select the appropriate security measures to protect the workplace.

•Keep a fix distance between terminal

•Locked unattended terminal screens

•Use CCTV cameras for monitoring

•Never assign a guest account for other users.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"When the computer is locked by _______, none can access your documents, browse your computer, or use programs on your computer." Which tools describe the function as above?

PC Lock Up

Desktop Lock

Access Lock

1st Security Agent

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?