
Ch 13 Security
Authored by Verne Farley
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
43 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
Which two items are used in asymmetric encryption? (Choose two.)
a token
a DES key
a private key
a public key
a TPM
Answer explanation
A token is something that is used to provide two-factor authentication. DES is using an identical key to encrypt and decrypt. Asymmetric encryption uses a private key associated with a public key.
2.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)
MD5
chap checksum
SHA
VPN
SSL
Answer explanation
3.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)
biometrics
employee smart ID
mantrap
multifactor authentication
security guard that checks IDs
Answer explanation
A guard checking IDs or a mantrap can help prevent someone following a legitimate employee into a restricted area. With biometrics, employee smart IDs, or multifactor authentication being used, once the door is accessed by someone having the correct credentials, unauthorized people could still trail the legitimate person into the building or area.
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
DDos
spam
social engineering
anonymous keylogging
Answer explanation
Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, spam, and keylogging are all examples of software based security threats, not social engineering.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
adware
DDoS
phishing
social engineering
spyware
Answer explanation
Phishing, spyware, and social engineering are security attacks that collect network and user information. Adware consists, typically, of annoying popup windows. Unlike a DDoS attack, none of these attacks generate large amounts of data traffic that can restrict access to network services.
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?
Check for the latest OS patches and updates.
Document the problem and the procedures performed to solve it.
Talk with the user to determine the cause of the problem.
Gather information from a number of sources to clearly identify the problem.
Answer explanation
After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process.
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?
BitLocker
EFS
TPM
Windows Update
Answer explanation
Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account. BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume. TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
40 questions
Introduction to Computer
Quiz
•
University
40 questions
ASSESSMENT 2: OVERVIEW OF ICT & REVIEW ON COMPUTER FUNDAMENTALS
Quiz
•
University
40 questions
TIK kelas 7, Penilaian Tengah semester
Quiz
•
7th Grade - University
45 questions
Speech Recognition: Mid Test Preparation
Quiz
•
University
43 questions
Ôn Tập Kiểm Tra KHTN 7
Quiz
•
1st Grade - University
44 questions
Data Structures Quiz
Quiz
•
University
40 questions
Eng-103 Vocab1
Quiz
•
University
39 questions
U5 Vocab
Quiz
•
University
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
Discover more resources for Computers
8 questions
2 Step Word Problems
Quiz
•
KG - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
10 questions
14.2 Independent/Dependent Variables
Quiz
•
KG - University
18 questions
Great Lakes States
Quiz
•
KG - University
7 questions
DNA, Chromosomes, Genes, and Traits: An Intro to Heredity
Interactive video
•
11th Grade - University
7 questions
Reflexive Verbs in Spanish
Lesson
•
9th Grade - University
7 questions
Narrative Writing 1
Interactive video
•
4th Grade - University