Search Header Logo

ITF+ Review 8

Authored by Alan Rasmussen

Computers

7th Grade

Used 31+ times

ITF+ Review 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when antivirus software remediates a system by blocking access to an infected file but not actually deleting it?

Quarantining the file

Cleaning the infection

Erasing the file

Updating the signatures

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique makes password cracking fairly easy?

Choosing a passphrase instead of a password

Including numbers, special characters, and letters

Using simple words or names as a password

Reusing the password across many sites

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user sends an email to another user. The email sender receives a delivery receipt from the receiving server. Which security-related concept validates that the email was successfully delivered?

Authentication

Accounting

Authorization

Non-repudiation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What sort of account allows someone to access a computer without providing a user name or password?

User account

Administrator account

Guest account

Microsoft Account

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the four processes of an access control system?

Identification, authentication, authorization, and accounting

Subjects, objects, Access Control Lists (ACLs), and permissions

DAC, RBAC, MAC, and rule-based

User, default, administrator, and guest

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which non-discretionary access control type is based on the idea of security clearance levels?

Role-based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Rule-based access control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which non-discretionary access control type is based on the idea of security clearance levels?

Role-based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Rule-based access control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?