
Risk, Security, and Compliance
Authored by Kathleen Dooley
Computers
9th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of attack targets a server's OS?
Keylogger
Phishing
Social engineering
Rootkit
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a DDoS attack, the flood of messages to the target website come from ___________ servers.
infected
unifnecte
spoofed
the hacker's
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following does NOT provide physical security?
Access badge
Firewall
Video camera
Tamper detection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these devices does NOT prevent access to a protected area?
IPS
Firewall
Keypad
IDS
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the most secure password?
p@$$w0rd
$t@rw@r$
07041776
yellowMonthMagneficant
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these encryption techniques does NOT rely on a key?
Polyalphabetic substitution-based cipher
Data Encryption Standard
Monoalphabetic substitution-based cipher
Transposition-based cipher
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle, if adequately followed, ensures a person cannot write their own employee evalution report?
Shared responsibility model
Separation of duties
Defense in depth
Principle of least priviledge
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?