IT Ch. 13

IT Ch. 13

9th Grade

28 Qs

quiz-placeholder

Similar activities

Computer Science IT quiz WIP - IT Level 3 by MZH

Computer Science IT quiz WIP - IT Level 3 by MZH

9th - 12th Grade

23 Qs

ÔN TẬP CUỐI HKII

ÔN TẬP CUỐI HKII

4th Grade - University

23 Qs

CORREO Y REDES SOCIALES

CORREO Y REDES SOCIALES

3rd Grade - University

24 Qs

Scratch Quiz

Scratch Quiz

5th - 10th Grade

24 Qs

Java Review

Java Review

9th Grade - University

25 Qs

CS-9 Chapter-4 Computer Hardware Part 1: Rabin Ghimire

CS-9 Chapter-4 Computer Hardware Part 1: Rabin Ghimire

8th - 9th Grade

24 Qs

Ôn tập kiểm tra học kỳ 1 môn Tin học 7

Ôn tập kiểm tra học kỳ 1 môn Tin học 7

1st Grade - Professional Development

24 Qs

Introducción a Microsoft OneDrive

Introducción a Microsoft OneDrive

1st - 11th Grade

25 Qs

IT Ch. 13

IT Ch. 13

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Chris Waters

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two items are used in asymmetric encryption? (Choose two.)

a token

a DES key

a private key

a public key

a TPM

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)

MD5

chap checksum

SHA

VPN

SSL

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

biometrics

employee smart ID

mantrap

multifactor authentication

security guard that checks IDs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

DDoS

spam

social engineering

anonymous keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

adware

DDoS

phishing

social engineering

spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates.

Document the problem and the procedures performed to solve it.

Talk with the user to determine the cause of the problem.

Gather information from a number of sources to clearly identify the problem.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?

BitLocker

EFS

TPM

Windows Update

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers