ITF - CIA and AAA

ITF - CIA and AAA

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

CIA Triad & Digital Security

CIA Triad & Digital Security

11th Grade

13 Qs

Securing Windows

Securing Windows

9th Grade - University

10 Qs

Device Configuration and Management Glossary P#1

Device Configuration and Management Glossary P#1

9th Grade

10 Qs

Computer Problem Solving

Computer Problem Solving

9th Grade - Professional Development

10 Qs

Types of Software

Types of Software

4th - 12th Grade

15 Qs

network security

network security

9th Grade

15 Qs

OS types Grade 12 NIS

OS types Grade 12 NIS

9th - 12th Grade

10 Qs

CSP I - Unit 8 Vocabulary

CSP I - Unit 8 Vocabulary

9th Grade

13 Qs

ITF - CIA and AAA

ITF - CIA and AAA

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Chase Christensen

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the BEST countermeasure against social engineering?

Access auditing

Strong passwords

Acceptable use policy

User awareness training

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a Man-in-the-Middle attack?

Malicious code is planted on a system where it waits for a triggering event before activating

An attacker intercepts communications between two network hosts by impersonating each host

An IP packet is constructed which is larger than the valid size

A person over the phone convinces an employee to reveal their logon credentials

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician walks into the office with a UPS. What sort of threat will this devices prepare a system for?

Wiretapping

Denial-of-Service

Power outage

Data redundancy

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus?

CHOOSE TWO

Keep the operating system up to date

Keep an up to date remote backup

Turn off location services

Lock the screen with some form of authentication

Keep your device always in your possession

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following situations should you expect total privacy?

Email messages and attachments

Social networking

Instant messaging

Financial transactions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures is a form of biometrics?

BIOS password

Chassis intrusion detection

TPM

Fingerprint scanner

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used?

DLP

Firewall

Smart card

Multifactor authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?