Super ITF+

Super ITF+

University

55 Qs

quiz-placeholder

Similar activities

Questionário sobre Metodologias Ágeis

Questionário sobre Metodologias Ágeis

12th Grade - University

60 Qs

Korean and Japanese Literature

Korean and Japanese Literature

University

50 Qs

Fundamento de Banco de Dados

Fundamento de Banco de Dados

10th Grade - University

55 Qs

Excel Charts

Excel Charts

5th Grade - Professional Development

51 Qs

98-349 Microsoft

98-349 Microsoft

9th Grade - University

58 Qs

ATIVIDADE AVALIATIVA DE REVISÃO DE SD - 3ª MENÇÃO

ATIVIDADE AVALIATIVA DE REVISÃO DE SD - 3ª MENÇÃO

University

50 Qs

Quiz sulla Plastica

Quiz sulla Plastica

7th Grade - University

55 Qs

UTS Algoritma, Logika Pemrograman dan Struktur Data

UTS Algoritma, Logika Pemrograman dan Struktur Data

12th Grade - University

54 Qs

Super ITF+

Super ITF+

Assessment

Quiz

Instructional Technology

University

Practice Problem

Medium

Created by

Paul Pesce

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a threat to personal information being revealed?

Dumpster Diving

Shoulder Surfing

Water Damage

Password Crackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of form/input validation would a developer choose, if he wants to prioritize security and reliability?

Voluntary

Client-side

Server-side

n-tier

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is proving who a person is?

Authorization

Authentication

Confidentiality

Prioritization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spying on a coworker to watch them enter their pin on the phone is an examples of what?

Password Cracking

Dumpster Diving

Shoulder Surfing

Unauthorized WiFi Access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is used to give permission to a user of a computer to access certain files?

Authorization

Authentication

Confidentiality

Prioritization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to prevent someone from accessing the files on a stolen laptop?

Windows Defender

Strong Password

Make your password, "password". They'll never guess it.

Full Disk Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT an example of 2-Factor Authentication?

Using your debit card and pin at an ATM.

Using your credit card with a chip in it to purchase groceries.

Using a combination and key to open a safe.

Using a key card and finger print to enter a building.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?