Information security test?

To help readers update more about this topic, the quiz below is a summary of some information security questions for you to learn.

Information security is a necessary job for anyone in the current technological age. Information security helps you to keep personal information safe and avoid the possibility of abuse of resources and assets. To help readers update more about this topic, the quiz below is a summary of some information security questions for you to learn.

  1. Are you confident with your Network Administration knowledge?
  2. Multiple choice questions about computer knowledge

Question 1 . The initials of the ACL tip are short for:

A. Arbitrary Code Language
B. Access Control Library
C. Access Control List
D. Allowed Computer List

Question 2 . Which of the following access levels should be set?

A. Full access
B. No access
C. Read access
D. Write access

Question 3 . After performing a user identified and authenticating the system, to allow users to use resources, what do you need to do?

A. Must be authorized
B. Passed back
C. Encoded
D. Enabled

Question 4 . Which access rights allow us to store a file?

A. Read
B. Copy
C. Calibration
D. Remember

Question 5 . What permissions do we allow to edit the properties of a file?

A. Edit (Modiffy)
B. Copy
C. Change (Change)
D. Editing (Edit)

Question 6 . What should the maximum access rights be for users?

A. At least read and write rights
B. No access
C. Enough to do the job according to the authority
D. All rights reserved

Question 7 . Which account policy should be set up to prevent malicious attacks on user accounts?

A. Disable unused account
B. Limited time
C. Account expiration date
D. Limit logon times

Question 8 . After an indentifed user, what needs to be done before they log on to a computer network?

A. Verify password
B. They must log the encrypted user ID
C. Access is allowed with priority set
D. The administrator must enable to type

Question 9 . The minimum length of the password should be:

A. 12 to 15 characters
B. 3 to 5 characters
C. 8 characters
D. 1 to 3 characters

Question 10 . What should be done for password files to prevent an unauthorized user from breaking into the content?

A. Remove all access rights
B. Encrypt password file
C. Move offline to a floppy disk
D. Copy to a scarecrow file with a different name

Answer:

1 C

2. B

3. A

4. D

5. A

6. C

7. D

8. A

9C

10. B

See more:

  1. Want to secure your Google account? Do not ignore the following!
  2. How to cover personal information of photos on the phone
  3. Things you need to pay attention to computers at the office
5 ★ | 1 Vote