Search Header Logo

ITF - CIA and AAA

Authored by Chase Christensen

Computers

9th - 12th Grade

Used 2+ times

ITF - CIA and AAA
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the BEST countermeasure against social engineering?

Access auditing

Strong passwords

Acceptable use policy

User awareness training

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a Man-in-the-Middle attack?

Malicious code is planted on a system where it waits for a triggering event before activating

An attacker intercepts communications between two network hosts by impersonating each host

An IP packet is constructed which is larger than the valid size

A person over the phone convinces an employee to reveal their logon credentials

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician walks into the office with a UPS. What sort of threat will this devices prepare a system for?

Wiretapping

Denial-of-Service

Power outage

Data redundancy

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus?

CHOOSE TWO

Keep the operating system up to date

Keep an up to date remote backup

Turn off location services

Lock the screen with some form of authentication

Keep your device always in your possession

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following situations should you expect total privacy?

Email messages and attachments

Social networking

Instant messaging

Financial transactions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures is a form of biometrics?

BIOS password

Chassis intrusion detection

TPM

Fingerprint scanner

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used?

DLP

Firewall

Smart card

Multifactor authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?