Security Mechanisms & Technologies Quiz (C)

Security Mechanisms & Technologies Quiz (C)

Date First Published: 23rd May 2024

This is the third quiz about the security mechanisms & technologies subtopic. All 15 questions in this quiz are covered in the articles.

Quiz Instructions

Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.

Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.

Warning: Warning Icon

Do not reload the page whilst you are in the process of answering the questions as you will lose your selected answers and will have to start the quiz all over again.

Quiz Tips

  • There is no time limit on this quiz. You can take as long as you want to on each question, so don't rush.
  • This quiz should be completed from memory. Avoid looking back at the articles, clicking on 'Reveal answers' before you have completed the quiz, or looking up the answers on search engines.
  • Answer all the questions. Avoid leaving questions blank as that will guarantee that you get that question wrong.

Question 1

Which of the following is an example of a hardware token?





Question 2

A disadvantage of hardware tokens is that:





Question 3

Which of the following is a disadvantage of biometric access control?





Question 4

Why is two-factor authentication important?





Question 5

What would usually happen when an antivirus detects a virus on a computer?





Question 6

What can CAPTCHAs not protect against?





Question 7

Which type of security system protects an organisation's network from malicious activity?





Question 8

Which of the following is NOT an example of a guideline for making passwords stronger?





Question 9

True or false? To prevent passcodes from being guessed, devices that provide passcode authentication temporarily block access after a certain number of failed attempts.



Question 10

The padlock sign in the address bar of a web browser means that:





Question 11

A hardware token is a portable security device used to authenticate a user in a:





Question 12

True or false? Forgetting your password will usually permanently lock you out of your account.



Question 13

Which of the following is a limitation of passwords?





Question 14

True or false? Blacklists are more suitable when most items need to be denied access and whitelists are more suitable when a limited number of items need to be denied access.



Question 15

How often are most SSL certificates updated?





Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.


Comments

Log in to post a comment.

1 comment(s) Write a comment
11 months ago
Great quiz!
  0        Reply