
BTEC DIT C3 LAB - User Access Restriction
Authored by Sarah Rodgers
Computers
10th - 11th Grade
Used 227+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Why are access levels useful?
They give everyone access to all parts of the network
They give everyone 'download' access to the network
They control the level of access a user has to the network
They stop everyone in the organisation from accessing the system
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a strong password?
JoeBloggs90
1990Joe
JO3_Blo66s
BloggsJ1990
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
How do you make a login secure? (Choose all that apply)
A combination capital letter, number and symbols/special charatcters
Using a phrase like "iloveManU"
Enabling 2 factor authentication
using password as a password
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these was not one of the most common passwords of 2015
Tqbfj0t1d
1234
Password
qwerty
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Use of fingerprints, retina scans, or other body features as an authentication mechanism is known as.
TFA
Biometrics
Firewalls
2FA
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of authentication method identifies and recognizes people based on physical traits such as fingerprints?
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What security method analyses the characteristics of an individual's face via images captured through a digital video camera?
Facial Recognition
Hand Geometry Scanning
Iris Scanning
Fingerprint Recognition
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?