Security & Authentication in ITGS

Security & Authentication in ITGS

10th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

computer security measures

computer security measures

11th Grade

20 Qs

WJEC ICT - Chapter 3 - Data Protection Methods

WJEC ICT - Chapter 3 - Data Protection Methods

10th Grade

20 Qs

Network Issues and Communication

Network Issues and Communication

10th Grade

20 Qs

Yr 11 ICT quiz 1 Networks & Security

Yr 11 ICT quiz 1 Networks & Security

10th - 11th Grade

20 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

Device Config and Mgmt, Module 3 quiz

Device Config and Mgmt, Module 3 quiz

9th - 12th Grade

16 Qs

Final cybersecurity exam (A)

Final cybersecurity exam (A)

9th - 12th Grade

21 Qs

8.4 Protection of data

8.4 Protection of data

9th - 12th Grade

20 Qs

Security & Authentication in ITGS

Security & Authentication in ITGS

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Reshigesh G

Used 15+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Give one example for biometric authentication method

Pattern lock

Iris scan

Double entry verification

OTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attempt to break a password by trying all possible words.

Packet Sniffer

Key Loggers

Dictionary Attack

Password Cracker

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software or hardware which records all key strokes on a computer system.

Packet Sniffer

Key Loggers

Dictionary Attack

Password Cracker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computer programs which damage files and data spreads when infected programs are copied.

Viruses

Macro Virus

Worms

Trojan Horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software which replicates itself and spreads between computer systems and over networks.

Viruses

Macro Virus

Worms

Trojan Horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware which pretends to be a genuinely useful program to trick the user into using it

Viruses

Macro Virus

Worms

Trojan Horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique used to authenticate remote users, such as online shopping businesses

Digital Signiture

Authentication

Public key encryption

Key Pair

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?