Security Fundamentals Chap 1

Security Fundamentals Chap 1

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

HHB 1.6 Metabolic Pathways

HHB 1.6 Metabolic Pathways

11th Grade

17 Qs

W.32: Geographic Factors in Military Decision-Making

W.32: Geographic Factors in Military Decision-Making

9th Grade

15 Qs

African American Studies Review (Part 2)

African American Studies Review (Part 2)

9th Grade

20 Qs

Unit 2 Test- Banking

Unit 2 Test- Banking

9th - 12th Grade

25 Qs

Vocabulary

Vocabulary

12th Grade

17 Qs

3.2.10 The impact of costs and time on civil justice

3.2.10 The impact of costs and time on civil justice

12th Grade

15 Qs

Device Configuration and Management Assessment

Device Configuration and Management Assessment

9th Grade

20 Qs

Les contributions canadiennes à la Deuxième guerre mondiale

Les contributions canadiennes à la Deuxième guerre mondiale

8th Grade - University

21 Qs

Security Fundamentals Chap 1

Security Fundamentals Chap 1

Assessment

Quiz

others

9th - 12th Grade

Hard

Created by

Alan O'Neill

Used 6+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do you call the scope that hacker can use to break into a system?
attack surface
defence in depth
principle of least privilege
risk mitigation

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a physical or logical device used to capture keystrokes?
USB flash drive
Keylogger
PDA
Smartphone

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is needed to highly secure a system?
lots of time
system update
more money
disabled administrator account

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the best way to protect against social engineering?
stronger encryption
stronger authentication
risk mitigation
employee awareness

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the first line of defence when setting up a network?
physically secure the network
configure authentication
configure encryption
configure an ACL

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is used to provide protection when one line of defence is breached?
attack surface
principle of least privilege
risk mitigation
defence in depth

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What method used by a hacker relies on the trusting nature of the person being attacked?
attack surface
social engineering
risk avoidance
principle of least privilege

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?