Cyber Security Solutions

Cyber Security Solutions

9th - 12th Grade

11 Qs

quiz-placeholder

Similar activities

Konfigurasi ekstensi dan dial-plan Server softswitch

Konfigurasi ekstensi dan dial-plan Server softswitch

12th Grade

10 Qs

Network Equipment

Network Equipment

9th - 12th Grade

10 Qs

QUIZ AIJ KELAS XII

QUIZ AIJ KELAS XII

12th Grade

10 Qs

Security risk (Grade 11 IGCSE)

Security risk (Grade 11 IGCSE)

10th - 11th Grade

14 Qs

BTEC UNIT 1 THE ONLINE WORLD QUIZ 3

BTEC UNIT 1 THE ONLINE WORLD QUIZ 3

12th Grade

12 Qs

Cyber security plan quiz

Cyber security plan quiz

11th Grade

14 Qs

Technical Terms - Internet (A-Z) - Proxy Server

Technical Terms - Internet (A-Z) - Proxy Server

12th Grade

10 Qs

2024_02-Tryout Admin Server PSAJ

2024_02-Tryout Admin Server PSAJ

12th Grade

10 Qs

Cyber Security Solutions

Cyber Security Solutions

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Jared Rigby

Used 17+ times

FREE Resource

11 questions

Show all answers

1.

MATCH QUESTION

1 min • 5 pts

Match the following methods of protecting a computer system with their definition

Uses a database of known harmful software to search for dangerous files on a device

Two-factor authentication

A string of characters used to gain access to a computer system

Passwords

Prevents certain packets of data from entering/leaving a network

Access Levels

Users are required to verify their identify in 2 different ways

Firewalls

Allowing different users different permissions for files and programs

Anti-malware software

2.

DRAG AND DROP QUESTION

1 min • 5 pts

Firewalls are available as a special hardware device or as ​ (a)   . A firewall will block ​ (b)   of information that are from certain malicious IP addresses. It can also block packets that are for ​ (c)   that are not used. When packets are blocked from entering a computer or network they are said to be ​ (d)   . A firewall can look at the data inside each packet of data. This is known as ​ (e)   . Computers that are protected by the firewall are part of the trusted network.

software
packets
ports
dropped
packet inspection

3.

REORDER QUESTION

1 min • 5 pts

Put the stages of initializing a HTTPS connection with SSL/TLS in order.

The server and browser can now communicate using the session key

The browser inspects and verifies the server certificate

Server responds be sending a copy of its security certificate

If the certificate is valid, the browser will send an encrypted session key to the server

Client browser requests a secure connection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these user authentication methods are not bio-metric

Retina scan

Facial recognition

2FA

Fingerprint scanning

5.

REORDER QUESTION

1 min • 5 pts

Put the following passwords in order from weakest to strongest

rigby

RiGbY

password

R1GbY!

MrR1GbY1$tH3Be5t!

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The user who has access to all files, data and programs on a computer system is known as the ______________.

7.

DROPDOWN QUESTION

1 min • 1 pt

A ​ (a)   is a type of malware that is triggered by running an infected file, whereas a ​ (b)   is able to self-replicate and will often spread automatically through a local network.

virus
worm
trojan-horse
hacker

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?