Cybersecurity Quiz

Quiz
•
Computers
•
12th Grade
•
Medium
Tarase Mcgee
Used 17+ times
FREE Resource
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following security measures is a form of biometrics?
Fingerprint scanner
Chassis intrusion detection
TPM
BIOS password
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?
Include the original operating system discs and product keys with the computers
Use data wiping software to clear the hard drives
Reformat the hard drives
Delete user data and applications from the hard drives
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following protocols can be enabled so email is encrypted on a mobile device?
SSL
IMAP
POP3
SMTP
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which Internet protocol is used to transmit encrypted data?
FTP
HTTP
HTTPS
DNS
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?
Configure your device to remotely backup important data to the Cloud.
Configure your device to backup important data to your personal computer.
Don't put important information on your mobile device.
Only use apps, such as email apps, that store data on the app provider's servers.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?
Integrity
Authentication
Authorization
Non-repudiation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?
Authentication
Access control
Accounting
Access control
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
G12-CSS-Q1-M1-M4

Quiz
•
12th Grade
45 questions
9618 AS Comp Sci Full Revision Set 1

Quiz
•
9th - 12th Grade
42 questions
IT Fun 1.0 Concepts and Terms

Quiz
•
11th - 12th Grade
50 questions
PHOTOSHOP INTRO

Quiz
•
9th - 12th Grade
45 questions
Skills for Real World Survival

Quiz
•
9th - 12th Grade
50 questions
Computer Components

Quiz
•
9th - 12th Grade
50 questions
Digital Media II Final Study Guide

Quiz
•
9th - 12th Grade
50 questions
Computer Science Multiple Choice Review

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade