
MTA 98-367 and Port Numbers
Professional Development
Used 60+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
150 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What type of malware can copy itself and infect a computer without the user's consent or knowledge?
Virus
Rootkit
Trojan Horse
Backdoor
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following terms indicates that information is to be read only by those people for whom it is intended?
confidentiality
integrity
availability
accounting
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What technology is not used to implement confidentiality?
encryption
access control
auditing
authentication
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following makes sure that data is not changed when it not supposed to be?
confidentiality
integrity
availability
accounting
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following is not a response when dealing with a risk?
avoidance
mitigation
transfer
patching
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What do you call the security discipline that requires that a user is given no more privilege necessary to perform his or her job?
defense in depth
reduction of attack surface
risk transfer
principle of least privilege
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What do you call the scope that hacker can use to break into a system?
defense in depth
attack surface
principle of least privilege
risk mitigation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?