IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

9th Grade - University

18 Qs

quiz-placeholder

Similar activities

Introducción Redes Tele1 IB

Introducción Redes Tele1 IB

10th Grade - University

15 Qs

Topic 4.1 Introduction to Java

Topic 4.1 Introduction to Java

12th Grade

20 Qs

N+ Chapter 5

N+ Chapter 5

12th Grade

20 Qs

Media and Information Literacy Quiz No. 1

Media and Information Literacy Quiz No. 1

12th Grade

20 Qs

Pengalamatan Jaringan Semester 2 (1) Pengenalan Cisco

Pengalamatan Jaringan Semester 2 (1) Pengenalan Cisco

10th Grade

20 Qs

Coding Karel 2

Coding Karel 2

KG - University

20 Qs

Pengenalan Aplikasi Blender

Pengenalan Aplikasi Blender

11th Grade

13 Qs

Common Protocols

Common Protocols

10th - 12th Grade

15 Qs

IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

Assessment

Quiz

Computers

9th Grade - University

Practice Problem

Medium

Created by

Paul Zettler

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Refer to the image. What type of an attack has occurred?

Ransomware

Worm

Trojan horse

Adware

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Even with all of today's technology the most common security problem is people tricking people to get information. This type of attack is referred to as:

Social Engineering

Key Logging

Adware

Malware

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

An attack that tries to get people to give up sensitive information via email is referred to as:

Phishing

Key Logging

Pharming

Pretexting

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Which of the following would NOT be a typical category of a security policy?

ID and Authentication

Remote Access

Acceptable Use

Incident Handling

Device Preference

Answer explanation

Even though an organization may have a preference for a certain brand or type of device that gets used on their network, it is not a typical category for a security policy.

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Some versions of Windows offer this application to encrypt removeable media.

EFS (Encrypting File System)

NTFS

BitLocker To Go

FAT 32

6.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Identify the places that should be password protected at a minimum to secure a work station.

BIOS or UEFI

User Account

Network Connections

Folders

Individual Files

Answer explanation

While it is possible and might be advised to password protect files and folders in certain situations, it is not necessary to do this to secure the workstation.

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This can be used to encrypt files or folders in the Windows OS.

EFS (Encrypting File System)

NTFS

BitLocker To Go

FAT 32

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?