Fundamentals of Information Security

Fundamentals of Information Security

9th - 12th Grade

40 Qs

quiz-placeholder

Similar activities

AQA Computer Science GCSE - 3.5 Computer networks

AQA Computer Science GCSE - 3.5 Computer networks

10th - 12th Grade

39 Qs

input devices and output device

input devices and output device

11th Grade

45 Qs

Computer Science Pre-Test

Computer Science Pre-Test

10th - 12th Grade

35 Qs

Input and output device

Input and output device

9th Grade

40 Qs

Year 9 Term 2 Holiday Homework 2024

Year 9 Term 2 Holiday Homework 2024

9th Grade

40 Qs

Grade 9 2nd Term Computer Quiz Review

Grade 9 2nd Term Computer Quiz Review

9th Grade

38 Qs

3rd Quarter quiz bee g10 CSS

3rd Quarter quiz bee g10 CSS

10th Grade

35 Qs

U1: Problem Solving & Computing Review

U1: Problem Solving & Computing Review

9th Grade

40 Qs

Fundamentals of Information Security

Fundamentals of Information Security

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Jana Minor-Oliver

Used 22+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of connector does Thunderbolt 3 use?

HDMI

USB-B

USB-C

DVI-D

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do the CPU (Central Processing Unit) and storage devices in a computer process data?

As zeros and ones

As characters and strings

As bits and bytes

As integers and decimals

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of software is Google Drive?

Business software

Collaboration software

Networking software

Productivity software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data encryption, firewalls, and backups are examples of what?

Intellectual property

Data Breach

Data Capture

Security Controls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of "processing" in a computer system?

Date is written to memory and manipulated by the CPU

Data is entered by the user through a scanner

Date is written to hard disk for later retrieval

Date is displayed on a monitor and printed out on paper

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee makes unauthorized copies of customer Social Security numbers, saves them in an unencrypted spreadsheet, and transfers them to the employee’s personal email account. The employee then opens new credit card accounts with this information and uses the cards to buy personal items. Which of the following did NOT occur?

Mishandling Personally Identifiable Information (PII)

Identity fraud

Identity checks

Identity theft

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two interfaces used for conguring input devices?

File Manager and the Settings app.

Control Panel and File Manager

The Settings app and Control Panel.

The vendor's website and File Manager.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?