2nd Study flashcard - ITF+

2nd Study flashcard - ITF+

Assessment

Flashcard

Computers

9th Grade

Hard

Created by

Raul Rojas

FREE Resource

Student preview

quiz-placeholder

50 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which of the following multifactor authentication methods is considered something you have? Options: Hardware token, Single sign-on, Geolocation, Password

Back

Hardware token

Answer explanation

A hardware token is a physical device that generates a code, making it a 'something you have' factor in multifactor authentication. In contrast, single sign-on, geolocation, and passwords are not physical items.

2.

FLASHCARD QUESTION

Front

Which of the following database structures is the most granular? Field, Column, Record, Table

Back

Field

Answer explanation

The most granular database structure is a Field, as it represents the smallest unit of data within a database. A Column contains multiple Fields, a Record contains multiple Columns, and a Table contains multiple Records.

3.

FLASHCARD QUESTION

Front

Which internet service type is most susceptible to weather disruptions? Options: Satellite, Cable, DSL, Fiber

Back

Satellite

Answer explanation

Satellite internet is most susceptible to weather disruptions because it relies on signals transmitted to and from satellites in space. Rain, snow, and storms can interfere with these signals, causing outages.

4.

FLASHCARD QUESTION

Front

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions? Cell phone, Workstation, Laptop, Thin client

Back

Cell phone

Answer explanation

A cell phone is portable and allows salespeople to conduct transactions anywhere in the store, making it ideal for point-of-sale transactions compared to bulkier devices like workstations or laptops.

5.

FLASHCARD QUESTION

Front

What action should customers take after checking their personal webmail on a lobby kiosk to prevent others from accessing their email accounts?

Back

Clear the browser cache.

Answer explanation

Clearing the browser cache removes stored data, including login information, preventing others from accessing the email account after use. This is the most effective immediate action to secure personal webmail on a public kiosk.

6.

FLASHCARD QUESTION

Front

What is most likely to happen in 60 days after implementing a 60-day password-warning banner in a corporate network?

Back

Password expiration

Answer explanation

The 60-day password-warning banner indicates that passwords will expire after 60 days. Therefore, users will need to change their passwords, leading to password expiration.

7.

FLASHCARD QUESTION

Front

A small company lacks the resources to properly verify a user's identity when the user calls in for technical support. To which of the following is the company susceptible?

Back

Social engineering

Answer explanation

The company is susceptible to social engineering because without proper identity verification, attackers can manipulate support staff into providing sensitive information or access by pretending to be legitimate users.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?