
Domain 6 Security
Authored by Amy Merchant
Computers
9th - 12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do biometrics use to perform authentication of identity?
Biological attributes
Knowledge of passwords
Possession of a device
Ability to perform tasks
Answer explanation
Biometrics is based on biological attributes. Biometrics is a strong form of authentication because each person has unique characteristics. When these unique characteristics are used for authentication, they are more reliable and stronger than the best passwords. For example, no two people have the exact same fingerprint or retina pattern.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which software is Microsoft's anti-malware product that is preinstalled on most new computers?
ESET NOD32
Norton Antivirus
Windows Defender
McAfee VirusScan
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company wants to use multifactor authentication. Which of the following would you most likely suggest?
Fingerprint and retinal scan
Password and passphrase
Token and smartphone
PIN and smart card
Answer explanation
Systems and accounts that need extra security often require multifactor authentication, generally from two or more types. This simply means you have to authenticate yourself two or more times to gain access to a system. Since a PIN is type 1 authentication and a smart card is type 2 authentication, these two would be considered multifactor authentication.
Since passwords and passphrases are both type 1, they would not amount to multifactor authentication.
Since security tokens and smartphones are both type 2, they would not amount to multifactor authentication.
Since fingerprints and retinal scans are both type 3, they would not amount to multifactor authentication.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A systems engineer is part of a company team creating a business continuity plan to recover critical data in case of a natural disaster.
Which of the following fault tolerance methods should the team include in the plan to be able to recover data? (Select two.)
Replication
Data Center
Power redundancy
Redundant Array of Independent Disks (RAID)
Site redundancy
Answer explanation
Site redundancy provides a complete duplicate of another location's computers and data. This is useful in the case of a major catastrophe, such as an earthquake or tornado, away from your main business location.
Replication is a data redundancy strategy where data is copied to a different physical location. This strategy works well in the case of a major catastrophe, such as an earthquake or tornado.
Power redundancy protects against service or data loss due to a power outage. However, if servers are destroyed during a natural disaster, power redundancy does not help to recover critical data.
Redundant Array of Independent Disks (RAID) is designed to store a duplicate of the same data on two or more disks simultaneously. If one disk fails, the data can still be accessed by using one of the other disks. However, this fault tolerance strategy does not address a natural disaster in which the entire RAID array is destroyed.
A data center is an area used to store and share such things as computer systems, applications, and data. However, during a natural disaster, a data center can be completely or partially destroyed.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which of the following situations should you expect total privacy?
Instant messaging
Email messages and attachments
Social networking
Financial transactions
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following authentication types include security questions as a factor for providing security?
Type 1 authentication
Type 2 authentication
Type 3 authentication
Single sign-on authentication
Answer explanation
Type 1 authentication (something you know) is by far the most common authentication type and includes security questions.
Type 2 authentication (something you have) does not include security questions.
Type 3 authentication (something you are) does not include security questions.
Single sign-on authentication is a method for logging into one system to gain access to other related systems. It is not a type of authentication and does not focus on security questions.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?
Multifactor authentication
VPN
Mandatory Access Control (MAC)
Single sign-on
Answer explanation
A VPN establishes a secure communications tunnel over a public network to a secure network. Using a VPN would provide secure transmission of the data.
The following do not secure the transmission of data over a public network:
Single sign-on is a method of authenticating with one system to gain access to other related systems.
Multifactor authentication requires two or more evidences of authentication, usually of different types.
Mandatory Access Control (MAC) is a type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Java: repetition control structure for & while
Quiz
•
10th - 12th Grade
10 questions
Lesson 1 Introduction to Database System
Quiz
•
10th Grade
10 questions
Quiz Komponen Komputer
Quiz
•
1st Grade - University
13 questions
WJEC GCSE ICT Unit 1 E-Mail
Quiz
•
9th - 10th Grade
10 questions
Kuis Pengayaan (Aplikasi Sehari-hari?
Quiz
•
9th Grade
10 questions
Scratch
Quiz
•
KG - Professional Dev...
10 questions
Network Security
Quiz
•
9th - 11th Grade
10 questions
𝐂𝐡𝐚𝐩𝐭𝐞𝐫 𝟐—The Blueprints for Modern Computers
Quiz
•
10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade