Physical and Software - Based Data Security
Quiz by Lisette Ngui
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1Physical data security deals with the protection of only hardware.falsefalsetruesome items30s
- Q2The picture represents what type of protective solution belongs to which class of security?biometric system, physical datahand print, physical databiometric system, physical datamolar scan, software - based data30s
- Q3The picture represents what type of protective solution belongs to which class of security?passwords, software - based datapasswords, software - basedpasswords, physical datalogin credentials, software - based30s
- Q4The picture represents what type of protective solution belongs to which class of security?security guard, physical dataguard, physical datasecurity guard, physical datasentinal, software - based data30s
- Q5The picture represents what type of protective solution belongs to which class of security?swipe cards, physical dataswipe cards, physical datalog, software basedkeypad, physical data30s
- Q6The picture represents what type of protective solution belongs to which class of security?encryption key, physical datascrambling, physical dataencryption, software - based dataencryption, software - based data30s
- Q7The picture represents what type of protective solution belongs to which class of security?firewall, software - based datafirewall, software - based datawall, physical datablocking, physical data30s
- Q8The picture represents what type of protective solution belongs to which class of security?shield, physical datalocked shield, physical dataanti - virus, software based dataanti - virus, software based data30s
- Q9Trojans, virus, worms, spyware and key - loggers are examples of:ransomwareboot sector virusmalwaremalware30s
- Q10Downloading infected programs, opening infected files, using infected storage medium are all ways of :being generousspreading virusessharing filesspreading viruses30s