Lesson 18 Vocabuary

Lesson 18 Vocabuary

12th Grade

15 Qs

quiz-placeholder

Similar activities

Comptia ITF Practice Quiz

Comptia ITF Practice Quiz

8th - 12th Grade

10 Qs

Impact of Emerging Technologies Part 1

Impact of Emerging Technologies Part 1

9th - 12th Grade

20 Qs

8.4 Protection of data

8.4 Protection of data

9th - 12th Grade

20 Qs

BTEC Level 2 Networking and Cybersecurity Revision

BTEC Level 2 Networking and Cybersecurity Revision

9th - 12th Grade

13 Qs

Technical Terms - Internet (A-Z) - SSO

Technical Terms - Internet (A-Z) - SSO

12th Grade

10 Qs

Input and Output

Input and Output

9th - 12th Grade

15 Qs

Testout Security 4.1-4.2

Testout Security 4.1-4.2

11th Grade - University

20 Qs

Linux-2 Quiz 2 -- LAMP

Linux-2 Quiz 2 -- LAMP

1st - 12th Grade

15 Qs

Lesson 18 Vocabuary

Lesson 18 Vocabuary

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Caden Burney

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is a Personal Identification Number (PIN)?

A number used in conjunction with authentication devices such as smart cards

A biometric authentication device that can produce a template signature of a user's fingerprint

A biometric authentication mechanism that uses an infrared camera to verify the user's face

A mobile-device authentication mechanism that requires network passphrase to derive an encryption key

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is a Fingerprint?

A number used in conjunction with authentication devices such as smart cards

A biometric authentication device that can produce a template signature of a user's fingerprint

A biometric authentication mechanism that uses an infrared camera to verify the user's face

A mobile-device authentication mechanism that requires network passphrase to derive an encryption key

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is Facial Recognition?

A number used in conjunction with authentication devices such as smart cards

A biometric authentication device that can produce a template signature of a user's fingerprint

A biometric authentication mechanism that uses an infrared camera to verify the user's face

A mobile-device authentication mechanism that requires network passphrase to derive an encryption key

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is Pattern?

A number used in conjunction with authentication devices such as smart cards

A biometric authentication device that can produce a template signature of a user's fingerprint

A biometric authentication mechanism that uses an infrared camera to verify the user's face

A mobile-device authentication mechanism that requires network passphrase to derive an encryption key

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What are Failed login attempts?

A number used in conjunction with authentication devices such as smart cards

A biometric authentication device that can produce a template signature of a user's fingerprint

A biometric authentication mechanism that uses an infrared camera to verify the user's face

A mobile-device authentication mechanism that progressively delays or blocks unlock attempts after multiple failures

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What are Heuristics?

A problem-solving strategy or method that is not guaranteed to find the optimal solution

A biometric authentication device that can produce a template signature of a user's fingerprint

A biometric authentication mechanism that uses an infrared camera to verify the user's face

A mobile-device authentication mechanism that requires network passphrase to derive an encryption key

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is Bring your own Device (BYOD)?

A security framework and tools to facilitate use of personally owned devices to access corporate networks and data

A biometric authentication device that can produce a template signature of a user's fingerprint

A biometric authentication mechanism that uses an infrared camera to verify the user's face

A mobile-device authentication mechanism that requires network passphrase to derive an encryption key

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?