Cyber & Risk Management

Cyber & Risk Management

10th Grade

10 Qs

quiz-placeholder

Similar activities

Protocols and Layers

Protocols and Layers

10th - 11th Grade

10 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

1.3.1 - Encryption & Hashing

1.3.1 - Encryption & Hashing

8th - 12th Grade

13 Qs

Securing Windows

Securing Windows

9th Grade - University

10 Qs

Year 8 Keep it safe 2

Year 8 Keep it safe 2

6th - 10th Grade

10 Qs

Online Shopping Risks

Online Shopping Risks

7th - 11th Grade

7 Qs

Computer Misuse Act

Computer Misuse Act

10th - 12th Grade

12 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Cyber & Risk Management

Cyber & Risk Management

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Robert Parslow

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following are classed as Biometric security

Finger Print scanners

Optical scanners

Facial recognition

All of the above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following should be installed and configured to protect a Technology System?

Time out/auto log off

Anti-virus software

Screen Saver and password

Regedit

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a way of keeping data secure?

Save it to multiple locations

Carry out regular back ups

Give it to a third party to look after

None of the above

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a secure ways of transferring data between computer systems

Instant messaging

Drop box

Vis email

Encrypted VPN

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What can Bluetooth be used for?

Sending data

Connecting devices

Hands Free phone calls

All of the above

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the most secure protocol to enable of a WiFi router?

WEP

WPA3

WPA2

WPA

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a type of two factor authentication ?

App-Generated Codes

Physical Authentication Keys

Email-Based Systems

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?