Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

4th Grade

20 Qs

quiz-placeholder

Similar activities

Computer - Review Quiz

Computer - Review Quiz

1st - 5th Grade

15 Qs

PIK Kg Kadazan ICT & KDB Quiz - March 2021

PIK Kg Kadazan ICT & KDB Quiz - March 2021

1st Grade - Professional Development

20 Qs

Wireless Networks

Wireless Networks

KG - University

20 Qs

QUIZ_2022_04_13

QUIZ_2022_04_13

KG - Professional Development

20 Qs

Computer Application TQ1

Computer Application TQ1

1st Grade - University

25 Qs

SLR11 - Protocol Layers

SLR11 - Protocol Layers

4th - 12th Grade

15 Qs

Network and Topology Quiz

Network and Topology Quiz

3rd Grade - University

21 Qs

Computers and the Internet!

Computers and the Internet!

3rd - 5th Grade

15 Qs

Network Security Chapter 5 KUIZ 3

Network Security Chapter 5 KUIZ 3

Assessment

Quiz

Computers

4th Grade

Medium

Created by

NURRUL ISMAIL

Used 18+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is NOT the need for Physical Security? To prevent ...

any unauthorized access to computer systems

tampering/stealing of data from computer systems

the loss of data/damage to systems against any natural calamities

any viruses or malicious code from computer systems.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select a few steps can be done to avoid data breaches caused by physical security threats:

Train staff on social engineering

Secure workstations

Protect the portables (laptop)

•Disable the drives

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Choose the natural physical security treats?

Floods

Earthquakes

Bombings

War

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

These following techniques are used for authentication:

•Smart cards

•Proximity cards

•Biometrics

•Attendance List

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user must move his/her head very close to the scanner and has to focus on the green light in the scanner. Choose the correct authentication method describe above.

Voice Recognition

Facial Recognition

Iris recognition

Retina recognition

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select the appropriate security measures to protect the workplace.

•Keep a fix distance between terminal

•Locked unattended terminal screens

•Use CCTV cameras for monitoring

•Never assign a guest account for other users.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"When the computer is locked by _______, none can access your documents, browse your computer, or use programs on your computer." Which tools describe the function as above?

PC Lock Up

Desktop Lock

Access Lock

1st Security Agent

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?