
Cyber & Risk Management
Authored by Robert Parslow
Computers
10th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following are classed as Biometric security
Finger Print scanners
Optical scanners
Facial recognition
All of the above
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following should be installed and configured to protect a Technology System?
Time out/auto log off
Anti-virus software
Screen Saver and password
Regedit
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is a way of keeping data secure?
Save it to multiple locations
Carry out regular back ups
Give it to a third party to look after
None of the above
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is a secure ways of transferring data between computer systems
Instant messaging
Drop box
Vis email
Encrypted VPN
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What can Bluetooth be used for?
Sending data
Connecting devices
Hands Free phone calls
All of the above
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the most secure protocol to enable of a WiFi router?
WEP
WPA3
WPA2
WPA
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is a type of two factor authentication ?
App-Generated Codes
Physical Authentication Keys
Email-Based Systems
All of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?