Creating a Secure System (5.1 - 5.3)

Creating a Secure System (5.1 - 5.3)

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

Module 10 Post - Assessment

Module 10 Post - Assessment

11th Grade

25 Qs

Mod 8 Managing User Security Review

Mod 8 Managing User Security Review

9th - 12th Grade

25 Qs

037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

9th Grade - University

25 Qs

Threats To Data V2

Threats To Data V2

10th - 12th Grade

25 Qs

COMP9 - Database Security and DDL

COMP9 - Database Security and DDL

9th Grade

25 Qs

GCSE Unit 2.3 - Producing Robust Programs

GCSE Unit 2.3 - Producing Robust Programs

9th Grade

34 Qs

Networks Issues and Communication

Networks Issues and Communication

10th Grade

25 Qs

Digital Threats and how to solve them

Digital Threats and how to solve them

11th Grade

25 Qs

Creating a Secure System (5.1 - 5.3)

Creating a Secure System (5.1 - 5.3)

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Teagan Graves

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What is the primary goal of information security?

Confidentiality

 Availability

Integrity

All of the above

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a strong password?

"password123"

 "123456"

"letmein"

 "P@BwOrd1"

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What does the acronym "VPN" stand for in the context of computer security?

Virtual Personal Network

Very Private Network

Virtual Private Network

Validated Personal Network

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which type of malware is designed to self-replicate and spread across networks?

Trojan Horse

Spyware

Worm

Ransomware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What is the process of converting data into a secret code to prevent unauthorized access called?

Decryption

Encryption

 Authentication

Firewall

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which security principle involves limiting access to only those who need it to perform their job functions?

Least Privilege

Defense in Depth

Social Engineering

Phishing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What type of attack involves an attacker intercepting and altering communication between two parties without their knowledge?

Phishing

Man-in-the-Middle (MitM)

DDoS

SQL Injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?