Search Header Logo

Cybersecurity Quiz

Authored by Tarase Mcgee

Computers

12th Grade

Used 33+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following security measures is a form of biometrics?

Fingerprint scanner

Chassis intrusion detection

TPM

BIOS password

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Include the original operating system discs and product keys with the computers

Use data wiping software to clear the hard drives

Reformat the hard drives

Delete user data and applications from the hard drives

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL

IMAP

POP3

SMTP

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which Internet protocol is used to transmit encrypted data?

FTP

HTTP

HTTPS

DNS

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

Configure your device to backup important data to your personal computer.

Don't put important information on your mobile device.

Only use apps, such as email apps, that store data on the app provider's servers.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Integrity

Authentication

Authorization

Non-repudiation

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

Authentication

Access control

Accounting

Access control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?