Search Header Logo

Information Security and IT Concepts

Authored by Wayground Content

Computers

9th - 12th Grade

Used 5+ times

Information Security and IT Concepts
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Application Programming Interface (API)

A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool.

A programming language used for developing mobile applications.

A database management system for storing and retrieving data.

A user interface design pattern for web applications.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Broadcast

Broadcast transmission is a one-to-many (one-to-everyone) form of sending internet traffic.

Broadcast transmission is a one-to-one form of sending internet traffic.

Broadcast transmission is a type of data compression technique.

Broadcast transmission is a method of storing data on a server.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bit

The most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model.

A unit of measurement for data transfer speed.

A type of network protocol used in Layer 2 of the OSI model.

A method for encrypting data at Layer 3 of the OSI model.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Classified or Sensitive Information

Information that is publicly available and does not require protection.

Information that has been determined to require protection against unauthorized disclosure and is marked to indicate its classified status and classification level when in documentary form.

Information that is only accessible to government officials.

Information that can be shared freely without any restrictions.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

De-encapsulation

The process of combining data into a single unit.

The opposite process of encapsulation, in which bundles of data are unpacked or revealed.

A method of encrypting data for security purposes.

A technique used to compress data for faster transmission.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Adverse Events

Events with a positive outcome, such as successful system updates and user satisfaction.

Events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page or execution of malicious code that destroys data.

Events that have no impact on system performance or user experience.

Events that are planned and executed without any issues.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Application Server

A computer responsible for hosting applications to user workstations.

A device that connects multiple computers in a network.

A software that manages database operations.

A hardware component that stores data permanently.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?