IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

9th Grade - University

18 Qs

quiz-placeholder

Similar activities

Types of Cybersecurity Attacks

Types of Cybersecurity Attacks

IGCSE Security

IGCSE Security

Cybersecurity: Ch 3 + 4

Cybersecurity: Ch 3 + 4

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

Cybersecurity Quiz

Cybersecurity Quiz

Security 5

Security 5

Security A+ Test Review

Security A+ Test Review

IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

Assessment

Quiz

Computers

9th Grade - University

Practice Problem

Medium

Created by

Paul Zettler

Used 17+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Refer to the image. What type of an attack has occurred?

Ransomware

Worm

Trojan horse

Adware

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Even with all of today's technology the most common security problem is people tricking people to get information. This type of attack is referred to as:

Social Engineering

Key Logging

Adware

Malware

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

An attack that tries to get people to give up sensitive information via email is referred to as:

Phishing

Key Logging

Pharming

Pretexting

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Which of the following would NOT be a typical category of a security policy?

ID and Authentication

Remote Access

Acceptable Use

Incident Handling

Device Preference

Answer explanation

Even though an organization may have a preference for a certain brand or type of device that gets used on their network, it is not a typical category for a security policy.

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Some versions of Windows offer this application to encrypt removeable media.

EFS (Encrypting File System)

NTFS

BitLocker To Go

FAT 32

6.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Identify the places that should be password protected at a minimum to secure a work station.

BIOS or UEFI

User Account

Network Connections

Folders

Individual Files

Answer explanation

While it is possible and might be advised to password protect files and folders in certain situations, it is not necessary to do this to secure the workstation.

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This can be used to encrypt files or folders in the Windows OS.

EFS (Encrypting File System)

NTFS

BitLocker To Go

FAT 32

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?