Cybersecurity Quiz
Quiz
•
Computers
•
12th Grade
•
Practice Problem
•
Medium
Tarase Mcgee
Used 26+ times
FREE Resource
Enhance your content in a minute
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following security measures is a form of biometrics?
Fingerprint scanner
Chassis intrusion detection
TPM
BIOS password
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?
Include the original operating system discs and product keys with the computers
Use data wiping software to clear the hard drives
Reformat the hard drives
Delete user data and applications from the hard drives
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following protocols can be enabled so email is encrypted on a mobile device?
SSL
IMAP
POP3
SMTP
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which Internet protocol is used to transmit encrypted data?
FTP
HTTP
HTTPS
DNS
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?
Configure your device to remotely backup important data to the Cloud.
Configure your device to backup important data to your personal computer.
Don't put important information on your mobile device.
Only use apps, such as email apps, that store data on the app provider's servers.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?
Integrity
Authentication
Authorization
Non-repudiation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?
Authentication
Access control
Accounting
Access control
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
40 questions
Computer Science Pre-Assessment Quiz
Quiz
•
9th - 12th Grade
45 questions
Comptia Network+ chapter 1-3 exam
Quiz
•
11th Grade - University
50 questions
TIN HỌC 6 - ÔN TẬP GK1 2425
Quiz
•
6th Grade - University
44 questions
Electricidad y electrónica
Quiz
•
6th - 12th Grade
40 questions
CodeHS Web Design - HTML - Mid-Unit Test
Quiz
•
9th - 12th Grade
46 questions
Adobe Animate 2015
Quiz
•
9th - 12th Grade
40 questions
ĐỀ CƯƠNG ÔN TẬP CUỐI KÌ 1_TIN HỌC 10_KNTT
Quiz
•
12th Grade
40 questions
Կիսամյակային 12-րդ դասարան
Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
