MTA: 988-367 Lesson 1 Knowledge Assessment

MTA: 988-367 Lesson 1 Knowledge Assessment

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Getting Started with MS Office

Getting Started with MS Office

7th - 12th Grade

19 Qs

TIN 12_BÀI 11

TIN 12_BÀI 11

12th Grade

20 Qs

ASPEL LEGAL TIK

ASPEL LEGAL TIK

12th Grade

20 Qs

Q1 M 5 POST TEST

Q1 M 5 POST TEST

10th Grade

20 Qs

Python 3

Python 3

9th Grade

17 Qs

F2 First ICT Online Quiz

F2 First ICT Online Quiz

7th Grade - University

17 Qs

kuis informatika perangkat lunak

kuis informatika perangkat lunak

10th - 12th Grade

20 Qs

Text and Image representation

Text and Image representation

11th Grade

22 Qs

MTA: 988-367 Lesson 1 Knowledge Assessment

MTA: 988-367 Lesson 1 Knowledge Assessment

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Quintasia Hurt

Used 28+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are valid risk responses? (Choose all that apply.)

Mitigation

Transfer

Investment

Avoidance

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

1. Which of the following are considered removable devices or drives? (Choose all that apply.)

iPod

Netbook

USB flash drive

Burnable DVD drive

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following would be considered appropriate security measures for a building’s external security perimeter? (Choose all that apply.)

Motion detector

Parking lot lights

Turnstile

Guard patrols

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When traveling on business and headed out to dinner with a client, which of the following should be done to secure a laptop? (Choose the best answer.)

Lock it in the car trunk

Store it out of sight in a dresser drawer

Secure it a piece of furniture with a laptop security cable

Check it at the Front Desk

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to the process of eliminating a risk by choosing to not engage in an action or activity?

mitigation

residual risk

avoidance

acceptance

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

1. Which of the following technologies could be used to help ensure the confidentiality of proprietary manufacturing techniques for an auto parts manufacturing business? (Choose all that apply.)

Strong encryption

guard patrols

a laptop safe

strong authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The information security acronym CIA stands for which of the following?

Confidentiality, Identity, Access Control

Confidentiality, Integrity, Access Control

Confidentiality, Integrity, Availability

Control, Identity, Access Control

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?