Copyright

Types of Computer Security Video

Instructions:

Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which one of the following refers to the use of guarding actual computing hardware from unauthorized access?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Which one of the following is an example of physical security? Choose the best answer.

2. Which one of the following can remotely wipe lost or stolen laptops and computers?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

Test your knowledge of the different kinds of computer security with these study resources. Topics on the interactive quiz will include unauthorized access and an example of computer security.

Quiz & Worksheet Goals

Worksheet and quiz goals will cover the following:

  • Lost/stolen mobile devices
  • An example of security that is role-based
  • Focus of computer security

Skills Practiced

  • Reading comprehension - ensure that you draw the most important information from the related lesson on kinds of security
  • Information recall - access the knowledge you've gained regarding how to protect computing hardware from those who are not authorized to gain access to it
  • Knowledge application - use your knowledge to answer questions about why computer security is necessary and how it is used

Additional Learning

Learn more about this area of study with the lesson named Types of Computer Security. You'll be covering the following study points:

  • Types of computer security
  • Defense software
  • Security for specific operating systems
Support