CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

9th Grade

12 Qs

quiz-placeholder

Similar activities

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

Countermeasures

Countermeasures

9th - 12th Grade

10 Qs

IT Biztonság

IT Biztonság

9th - 12th Grade

9 Qs

SLR 3 - Networking part 2

SLR 3 - Networking part 2

9th - 12th Grade

10 Qs

APCSP 2.1.1 - 2.1.3 Review

APCSP 2.1.1 - 2.1.3 Review

9th - 12th Grade

15 Qs

APCSP Topic 5 Impact of Computing

APCSP Topic 5 Impact of Computing

9th - 12th Grade

13 Qs

ITGS: 1.02 Security and 1.05 Authenticity

ITGS: 1.02 Security and 1.05 Authenticity

9th - 12th Grade

12 Qs

Yr 10 Short Network Quiz

Yr 10 Short Network Quiz

8th - 10th Grade

10 Qs

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

Assessment

Quiz

Computers

9th Grade

Medium

Used 9+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that downloads onto a computer disguised as a legitimate program

Trojan Horse

Virus

Worm

Keylogging

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.

Trojan Horse

Virus

Worm

Keylogging

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer program that can copy itself and infect a computer without permission or knowledge of the user.

Trojan Horse

Virus

Worm

Keylogging

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A process for securing access to a given system that identifies the party requesting access through only one category of credentials.

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The most common example of this authentication is matching a password to a username.

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication method that asks users to provide multiple types of credentials to confirm their identity.

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The disadvantage of this authentication is it makes accessing your data might become more painful and time-consuming

Single Factor Authentication

Two Factor Authentication

Multifactor Authentication

Enryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?