Security & Authentication in ITGS

Security & Authentication in ITGS

10th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

Domains 1-2 Sec+

Domains 1-2 Sec+

12th Grade

25 Qs

Cybersecurity Legislation and Standards Quiz

Cybersecurity Legislation and Standards Quiz

12th Grade

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

10th Grade

20 Qs

Cybersecurity Essentials

Cybersecurity Essentials

9th Grade - University

20 Qs

CSEC ICT June 2020 Paper 1 Part 2

CSEC ICT June 2020 Paper 1 Part 2

9th - 10th Grade

16 Qs

Final cybersecurity exam (A)

Final cybersecurity exam (A)

9th - 12th Grade

21 Qs

Data Security

Data Security

10th Grade

19 Qs

Yr 11 ICT quiz 1 Networks & Security

Yr 11 ICT quiz 1 Networks & Security

10th - 11th Grade

20 Qs

Security & Authentication in ITGS

Security & Authentication in ITGS

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Reshigesh G

Used 15+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Give one example for biometric authentication method

Pattern lock

Iris scan

Double entry verification

OTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attempt to break a password by trying all possible words.

Packet Sniffer

Key Loggers

Dictionary Attack

Password Cracker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software or hardware which records all key strokes on a computer system.

Packet Sniffer

Key Loggers

Dictionary Attack

Password Cracker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computer programs which damage files and data spreads when infected programs are copied.

Viruses

Macro Virus

Worms

Trojan Horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software which replicates itself and spreads between computer systems and over networks.

Viruses

Macro Virus

Worms

Trojan Horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware which pretends to be a genuinely useful program to trick the user into using it

Viruses

Macro Virus

Worms

Trojan Horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique used to authenticate remote users, such as online shopping businesses

Digital Signiture

Authentication

Public key encryption

Key Pair

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?