IT Essentials ver 7.0 Chapter 13 Security

IT Essentials ver 7.0 Chapter 13 Security

11th Grade - University

28 Qs

quiz-placeholder

Similar activities

Chapter 13 Study Guide

Chapter 13 Study Guide

11th Grade

27 Qs

Cybersecurity Foundations Introduction

Cybersecurity Foundations Introduction

12th Grade

25 Qs

Networking v6 Ch 13 Quiz Review

Networking v6 Ch 13 Quiz Review

9th - 12th Grade

25 Qs

Профессиональная иностранная терминология_6

Профессиональная иностранная терминология_6

University

25 Qs

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

9th - 12th Grade

23 Qs

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

007_Zero Trust - CompTIA Security+ SY0-701 - 1.2

12th Grade - University

27 Qs

037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

9th Grade - University

25 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

25 Qs

IT Essentials ver 7.0 Chapter 13 Security

IT Essentials ver 7.0 Chapter 13 Security

Assessment

Quiz

Computers

11th Grade - University

Hard

Created by

Simone Lawrence

Used 11+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Required in asymmetric encryption

private key only

smart id

private and public key

private key and smart id

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Two popular hashing algorithms

SHA and MD5

AES and 3DES

AES and MD5

RSA and 3DES

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Two examples of symmetric encryption

SHA and MD5

RSA and AES

3DES and AES

SHA and 3DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Type of security threat presented when someone pretends to be company personnel

malware

incognito

phishing

social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Type of security threat when an abnormally high amount of web traffic requests from different locations

DOS

DDOS

Worm

ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After Virus removal what should be done to ensure and verify full functionality of the system?

check for latest OS patches and updates

check for the latest security threats

backup all data

demonstrate preventive measures to the user

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

2 methods to ensure that unauthorized people do not gain access through a secure entrance

mantrap

Bio-metrics

multi-factor authentication

Security guard to check IDs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?