IT Ch. 13

IT Ch. 13

9th Grade

28 Qs

quiz-placeholder

Similar activities

Tin 9: Bài 9: Định dạng trang chiếu

Tin 9: Bài 9: Định dạng trang chiếu

9th Grade

23 Qs

sumatif 2 ACCESS moses sem 1

sumatif 2 ACCESS moses sem 1

9th Grade

23 Qs

Internet Searching and Citations

Internet Searching and Citations

9th - 12th Grade

23 Qs

Rate of Reactions

Rate of Reactions

9th Grade

23 Qs

Sonic the Hedgehog Quizizz

Sonic the Hedgehog Quizizz

KG - Professional Development

23 Qs

Q2_SummTest2

Q2_SummTest2

9th Grade

25 Qs

Ficha de Revisões NBSI

Ficha de Revisões NBSI

9th - 10th Grade

24 Qs

Ôn tập kiểm tra giữa kỳ 1 khối 10 2022 - 2023

Ôn tập kiểm tra giữa kỳ 1 khối 10 2022 - 2023

1st - 12th Grade

30 Qs

IT Ch. 13

IT Ch. 13

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Chris Waters

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two items are used in asymmetric encryption? (Choose two.)

a token

a DES key

a private key

a public key

a TPM

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)

MD5

chap checksum

SHA

VPN

SSL

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

biometrics

employee smart ID

mantrap

multifactor authentication

security guard that checks IDs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

DDoS

spam

social engineering

anonymous keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

adware

DDoS

phishing

social engineering

spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates.

Document the problem and the procedures performed to solve it.

Talk with the user to determine the cause of the problem.

Gather information from a number of sources to clearly identify the problem.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?

BitLocker

EFS

TPM

Windows Update

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers