Security Fundamentals Chap 1

Security Fundamentals Chap 1

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Topic #3 Quiz

Topic #3 Quiz

9th - 12th Grade

17 Qs

AOTA Overview Quiz

AOTA Overview Quiz

9th Grade

15 Qs

Bases de Datos

Bases de Datos

12th Grade

21 Qs

Review Materi Wan

Review Materi Wan

11th Grade

25 Qs

Topic 4 Part 2 Review Game

Topic 4 Part 2 Review Game

10th Grade

17 Qs

CSEC EDPM Revision 2

CSEC EDPM Revision 2

9th - 12th Grade

20 Qs

Understanding Social Stratification

Understanding Social Stratification

12th Grade

16 Qs

4th period NATO

4th period NATO

12th Grade

15 Qs

Security Fundamentals Chap 1

Security Fundamentals Chap 1

Assessment

Quiz

others

9th - 12th Grade

Practice Problem

Hard

Created by

Alan O'Neill

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do you call the scope that hacker can use to break into a system?

attack surface
defence in depth
principle of least privilege
risk mitigation

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a physical or logical device used to capture keystrokes?

USB flash drive
Keylogger
PDA
Smartphone

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is needed to highly secure a system?

lots of time
system update
more money
disabled administrator account

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the best way to protect against social engineering?

stronger encryption
stronger authentication
risk mitigation
employee awareness

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first line of defence when setting up a network?

physically secure the network
configure authentication
configure encryption
configure an ACL

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is used to provide protection when one line of defence is breached?

attack surface
principle of least privilege
risk mitigation
defence in depth

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What method used by a hacker relies on the trusting nature of the person being attacked?

attack surface
social engineering
risk avoidance
principle of least privilege

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?