Search Header Logo

Security A+ Test Review

Authored by Fatma Orsun

Computers

9th - 12th Grade

CCSS covered

Used 2+ times

Security A+ Test Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

 What is a policy that requires users to change passwords periodically?

password expiration
password encryption
password complexity

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?

Converting
Hacking
Phishing

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems is known as?

Malware
Operating System
Device Driver

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are access rights assigned to specific users and groups of users to control the ability of the users to view or make changes to system objects?

Phishing
Permissions
Encryption

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or firmware is known as?

Malware
Virus
Spoofing

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A non-self-replicating type of malware program containing malicious code that, when executed typically causes loss or theft of data, and possible system harm is a _______

Trojan 
Virus
Malware

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge?

Spyware
Spoofing
Trojan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?