Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

45 Qs

quiz-placeholder

Similar activities

Customer Service

Customer Service

9th - 12th Grade

40 Qs

HSS Satoora Aripal - Cyber Security

HSS Satoora Aripal - Cyber Security

9th - 12th Grade

40 Qs

CSEC IT - 16 Policies & Practices / Licensing Arrangements

CSEC IT - 16 Policies & Practices / Licensing Arrangements

10th - 12th Grade

50 Qs

Pre-test Pemrograman Web 12 RPL

Pre-test Pemrograman Web 12 RPL

12th Grade

40 Qs

Soal Simdig 1

Soal Simdig 1

10th - 12th Grade

40 Qs

iGCSE ICT Past Paper - Section A Questions (Years 2011, 2012 and 2013)

iGCSE ICT Past Paper - Section A Questions (Years 2011, 2012 and 2013)

10th - 12th Grade

46 Qs

FC0-U61 - ITF (1)

FC0-U61 - ITF (1)

9th - 12th Grade

50 Qs

Unit 2 Global Information Cambridge Technicals IT L3

Unit 2 Global Information Cambridge Technicals IT L3

10th - 12th Grade

42 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Tarase Mcgee

Used 17+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following security measures is a form of biometrics?

Fingerprint scanner

Chassis intrusion detection

TPM

BIOS password

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Include the original operating system discs and product keys with the computers

Use data wiping software to clear the hard drives

Reformat the hard drives

Delete user data and applications from the hard drives

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL

IMAP

POP3

SMTP

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which Internet protocol is used to transmit encrypted data?

FTP

HTTP

HTTPS

DNS

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

Configure your device to backup important data to your personal computer.

Don't put important information on your mobile device.

Only use apps, such as email apps, that store data on the app provider's servers.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Integrity

Authentication

Authorization

Non-repudiation

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

Authentication

Access control

Accounting

Access control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?