
Kuis Pert-1
Authored by rohadi yusup
Computers
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the following is an example of a "something you know“ authentication factor?
User ID
Password
Fingerprint
Iris scan
2.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Within the organization, who can identify risk?
The security manager
Any security team member
Senior management
Anyone
3.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular threat, and he suggests that the best way to counter this threat would be to purchase and implement a particular security solution. This is an example of ......
Acceptance
Avoidance
Mitigation
Transference
4.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
The Triffid Corporation publishes a policy that states all personnel will act in a manner that protects health and human safety. The security office is tasked with writing a detailed set of processes on how employees should wear protective gear such a hardhat and gloves when in haradous areas. This detailed set of process is a ......
Policy
Procedure
Standard
Law
5.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
The city of Grampon wants to know where all its public vehicles (garbage trucks, police cars, etc.) are at all times, so the city has GPS transmitters installed in all the vehicles. What kind of control is this?
Administrative
Entrenched
Physical
Technical
6.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing ________.
Non-repudiation
Multifactor authentication
Biometrics
Privacy
7.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
In risk management concepts, a(n) _________ is something a security
practitioner might need to protect.
Vulnerability
Asset
Threat
Likelihood
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
Quizz Internet
Quiz
•
KG - Professional Dev...
15 questions
Technical Training
Quiz
•
Professional Development
15 questions
Google Nivel 1 7-9
Quiz
•
Professional Development
13 questions
FH 6.2.1 MME 11.1-Detección de averías
Quiz
•
Professional Development
10 questions
How Well Do You Them?
Quiz
•
Professional Development
12 questions
Python Collections Quiz
Quiz
•
Professional Development
10 questions
Aprendeu ou disfarçou?
Quiz
•
12th Grade - Professi...
10 questions
Tipos de Gráficos
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development