FOC Digital Security

FOC Digital Security

9th - 10th Grade

20 Qs

quiz-placeholder

Similar activities

Computer Hardware/ Software Review

Computer Hardware/ Software Review

9th - 12th Grade

19 Qs

Network Threats

Network Threats

6th - 9th Grade

19 Qs

Types of Software

Types of Software

4th - 12th Grade

15 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

10th Grade

15 Qs

NETWORK SECURITY

NETWORK SECURITY

8th - 10th Grade

15 Qs

Computer Technology

Computer Technology

9th - 12th Grade

20 Qs

FOC Digital Security

FOC Digital Security

Assessment

Quiz

Computers

9th - 10th Grade

Medium

Created by

Megan DeLena

Used 16+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an audit trail?

A log of financial transactions

A file that records access attempts

A list of passwords and user names on a network

A record of hacking attempts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a single sign on account?

A security measure that allows only on failed login attempt

An individual's unique identity required to access an organization's network

When you enter your name into one account and you are automatically signed into other accounts

An organization's shared login credentials for general network access

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password ______ is a service that stores all of your account information securely.

vault

binder

manager

Collection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A passcode is another name for a(n) ______

user name

encryption algorithm

passphrase

PIN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) screen ______ restricts access to a computer or mobile device until a user performs a certain action.

control

firewall

check

lock

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a back door?

A file recovery method that circumvents the computer or mobile device's network

An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer

A hardware device that reinforces security settings on a computer or network

A program or set of instructions that allows a user to bypass security controls when accessing a computer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should an AUP specify?

the acceptable use of technology by employees for personal reasons

The guidelines for using licensed software

A list of IP addresses know to be safe

A user's personal authentication methods

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?