Search Header Logo
ITCC102-W17(SY24-25_101I)

ITCC102-W17(SY24-25_101I)

Assessment

Presentation

Computers

University

Practice Problem

Hard

Created by

Don Bonus

Used 2+ times

FREE Resource

57 Slides • 10 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

Multiple Choice

Which among the following is not an element of a security policy?

1

Acceptable Use

2

Antivirus

3

Authentication

4

Password

8

media

9

media

10

media

11

media

12

media

13

media

14

Multiple Choice

An authentication method that requires a user to provide multiple forms of authentication to verify his or her identity.

1

Remote Authentication Dial-in User Service

2

Terminal Access Controller Access Control System

3

Single factor

4

Multifactor

15

media

16

media

17

media

18

media

19

media

20

media

21

media

22

media

23

media

24

media

25

Multiple Choice

Often distributed by its developer or vendor for

   personal use and may have limited features or restrictions.

1

Open source

2

Freeware

3

Shareware

4

Proprietary

26

media

27

media

28

media

29

media

30

media

31

media

32

media

33

media

34

media

35

Multiple Choice

A Windows user type that is disabled by default and no default user rights.

1

Administrator

2

Standard user

3

Power User

4

None of the mentioned

36

media

37

media

38

media

39

media

40

media

41

media

42

media

43

media

44

media

45

media

46

media

47

media

48

media

49

media

50

media

51

media

52

Multiple Choice

This system is responsible for finding the corresponding IP address associated with that domain name and directing the user's request to the appropriate server.

1

Dynamic Host Configuration Protocol

2

Domain Name Server

3

Proxy Server

4

None of the mentioned

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

media

61

media

62

media

63

Multiple Choice

Which among the following is not an example of a biometric device?

1

Facial recognition device

2

Retinal scanner

3

Voice recognition device

4

None of the mentioned

64

Multiple Choice

The most common wireless security setting.

1

WEP

2

WPA

3

TKIP

4

None of the mentioned

65

Multiple Choice

It refers to the minimum time a user must keep a password before

  changing or the maximum time before requiring a change.

1

Reuse

2

Failed attempts

3

Expiration

4

Format

66

Multiple Choice

A type of malware that masquerades as a legitimate program or file, but contains hidden malicious code.

1

Virus

2

Worm

3

Spyware

4

Trojan

67

Multiple Choice

A method of separating a nonsecure area from a secured area. This could be two doors with a guard, keypad, or some other security means on the second door.

1

Entry control roster

2

Mantrap

3

Door lock

4

Tracking module

media

Show answer

Auto Play

Slide 1 / 67

SLIDE