Unit 15 Chapter 17 Test: Security Strategies and Docu

Unit 15 Chapter 17 Test: Security Strategies and Docu

10th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

Arduino Loop

Arduino Loop

2nd Grade - University

20 Qs

GAD Review - Game Industry

GAD Review - Game Industry

9th - 12th Grade

22 Qs

Network topologies

Network topologies

8th Grade - University

20 Qs

Remidi UTS AIJ

Remidi UTS AIJ

12th Grade

20 Qs

Microsoft Office Advandces 2016

Microsoft Office Advandces 2016

9th Grade - Professional Development

20 Qs

Programming: Which Loop?

Programming: Which Loop?

9th - 12th Grade

20 Qs

PTS KOMJARDAS SMT GENAP

PTS KOMJARDAS SMT GENAP

10th Grade

20 Qs

Quiz 4

Quiz 4

1st - 10th Grade

20 Qs

Unit 15 Chapter 17 Test: Security Strategies and Docu

Unit 15 Chapter 17 Test: Security Strategies and Docu

Assessment

Quiz

Computers

10th - 12th Grade

Practice Problem

Hard

Created by

Matt Van Delay

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requiring users to press Ctrl+Alt+Delete to get a logon window is more secure than the welcome screen.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using Group Policy, you can set security policies to help secure a workstation.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using Group Policy, you can set security policies to help secure a workstation.

Alt+F1

Ctrl+Ins+Home

Alt+F5+End

Ctrl+Alt+Delete

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CryptoLocker is an example of what type of malware?

zero-day attack

worm

ransomware

man-in-the-middle

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person that secretly peaks at your monitor screen while you work may be doing what?

tailgating

screen capping

shoulder surfing

social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Anti-malware software relies on what sort of update in order to define or detect malware as it gets into the wild?

rootkits

malware signatures

static updates

Windows updates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

Trojan horse

rootkit

adware

worm

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?