Super ITF+

Super ITF+

University

55 Qs

quiz-placeholder

Similar activities

PHP PGM

PHP PGM

University

55 Qs

CSIRT_2022

CSIRT_2022

University

50 Qs

S04L UTS K34M4N4N J4RING4N

S04L UTS K34M4N4N J4RING4N

University

50 Qs

504L UT5 K34M4N4N J4R1N64N 2021-1

504L UT5 K34M4N4N J4R1N64N 2021-1

University

50 Qs

Quiz Pra UTS Keamanan Jaringan 2021-1

Quiz Pra UTS Keamanan Jaringan 2021-1

University

50 Qs

Information and communications technology

Information and communications technology

University

50 Qs

Susulan U4S K34M4N4N J4R1N6AN

Susulan U4S K34M4N4N J4R1N6AN

University

50 Qs

IT 310 - MIDTERM EXAMINATION

IT 310 - MIDTERM EXAMINATION

University

50 Qs

Super ITF+

Super ITF+

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Paul Pesce

Used 5+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a threat to personal information being revealed?

Dumpster Diving

Shoulder Surfing

Water Damage

Password Crackers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of form/input validation would a developer choose, if he wants to prioritize security and reliability?

Voluntary

Client-side

Server-side

n-tier

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is proving who a person is?

Authorization

Authentication

Confidentiality

Prioritization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spying on a coworker to watch them enter their pin on the phone is an examples of what?

Password Cracking

Dumpster Diving

Shoulder Surfing

Unauthorized WiFi Access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is used to give permission to a user of a computer to access certain files?

Authorization

Authentication

Confidentiality

Prioritization

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to prevent someone from accessing the files on a stolen laptop?

Windows Defender

Strong Password

Make your password, "password". They'll never guess it.

Full Disk Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT an example of 2-Factor Authentication?

Using your debit card and pin at an ATM.

Using your credit card with a chip in it to purchase groceries.

Using a combination and key to open a safe.

Using a key card and finger print to enter a building.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?