Logical Security

Logical Security

10th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

Q1-Network Security

Q1-Network Security

10th Grade

12 Qs

virus informaticos

virus informaticos

10th Grade

10 Qs

Antivirus

Antivirus

1st - 10th Grade

10 Qs

Virus y otras amenzas

Virus y otras amenzas

12th Grade

14 Qs

Understanding Malware and Social Engineering

Understanding Malware and Social Engineering

10th Grade - University

10 Qs

N5 CS - Security

N5 CS - Security

12th Grade

10 Qs

Nice Computer Quiz

Nice Computer Quiz

7th - 12th Grade

10 Qs

How Anti-Malware Software Works

How Anti-Malware Software Works

12th Grade

11 Qs

Logical Security

Logical Security

Assessment

Quiz

Computers

10th - 12th Grade

Hard

Created by

Kevin Davis

Used 18+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

What is Logical Security?

The Steps taken to setup a username and password.

The specific controls put into place to manage access to computer systems and physical spaces

Restricting access to a building or campus

Creating Security questions for your account.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Antivirus/ Anti-Malware Software

to keep bad people out of your system

to scan your music, pictures, and videos for quality

For photo and video editing

To protect you while playing games online.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the 3 Firewall Functions? (check all that apply).

Packet Filter

Search Engine

Stateful Inspection

Spam Filter

Proxy Filter

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Firewall acts as what in your Network Security

A way to track what websites you are visiting

A way to scan and filter content on social media

The first line of defense

A protection against ALL human errors

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Mac Address filtering is normally performed on _______

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the simplest Email Filters

Phishing

Antivirus

Spam

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that attempts to avoid detection by masking itself from applications is what kind of virus?

Phage

Armored

Stealth

Rootkit

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Rootkit can be described as_______

viruses can directly attack your antivirus software and potentially destroy the virus definition database file.

A virus that exploits the enhancements made to many application programs.

programs that enter a system or network under the guise of another program.

software programs that have the ability to hide certain things from the operating system. They do so by obtaining (and retaining) administrative-level access.

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the Following Best describes Ransomeware.

an attack that uses a dictionary of common words to attempt to find the user’s password.

software that is often delivered through an unsuspecting random download. It takes control of a system and demands that a third party be paid.

A virus that attacks multiple sectors of the computer.

A virus that pretends to be a legitimate program but is actually attacking the system, leaving a backdoor for access into the computer, file shares, or servers.