Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

45 Qs

quiz-placeholder

Similar activities

PowerPoint 1

PowerPoint 1

6th - 12th Grade

40 Qs

ULANGAN INFORMATIKA

ULANGAN INFORMATIKA

12th Grade

40 Qs

EVALUACIÓN PARCIAL DE INFORMÁTICA

EVALUACIÓN PARCIAL DE INFORMÁTICA

9th - 12th Grade

50 Qs

UH App inventor Kelas XI

UH App inventor Kelas XI

12th Grade

50 Qs

PRESAF MATPIL XI TKJ

PRESAF MATPIL XI TKJ

9th - 12th Grade

40 Qs

Penilain Harian 2

Penilain Harian 2

9th Grade - University

50 Qs

Keamanan Digital

Keamanan Digital

12th Grade

40 Qs

TIN HỌC KHỐI 5 HK1

TIN HỌC KHỐI 5 HK1

1st Grade - University

42 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Tarase Mcgee

Used 26+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following security measures is a form of biometrics?

Fingerprint scanner

Chassis intrusion detection

TPM

BIOS password

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Include the original operating system discs and product keys with the computers

Use data wiping software to clear the hard drives

Reformat the hard drives

Delete user data and applications from the hard drives

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL

IMAP

POP3

SMTP

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which Internet protocol is used to transmit encrypted data?

FTP

HTTP

HTTPS

DNS

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

Configure your device to backup important data to your personal computer.

Don't put important information on your mobile device.

Only use apps, such as email apps, that store data on the app provider's servers.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Integrity

Authentication

Authorization

Non-repudiation

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

Authentication

Access control

Accounting

Access control

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?