
ITF - CIA and AAA
Authored by Chase Christensen
Computers
9th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the BEST countermeasure against social engineering?
Access auditing
Strong passwords
Acceptable use policy
User awareness training
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a Man-in-the-Middle attack?
Malicious code is planted on a system where it waits for a triggering event before activating
An attacker intercepts communications between two network hosts by impersonating each host
An IP packet is constructed which is larger than the valid size
A person over the phone convinces an employee to reveal their logon credentials
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician walks into the office with a UPS. What sort of threat will this devices prepare a system for?
Wiretapping
Denial-of-Service
Power outage
Data redundancy
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus?
CHOOSE TWO
Keep the operating system up to date
Keep an up to date remote backup
Turn off location services
Lock the screen with some form of authentication
Keep your device always in your possession
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which of the following situations should you expect total privacy?
Email messages and attachments
Social networking
Instant messaging
Financial transactions
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following security measures is a form of biometrics?
BIOS password
Chassis intrusion detection
TPM
Fingerprint scanner
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used?
DLP
Firewall
Smart card
Multifactor authentication
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Espacio Opcional 3er Año Pío XII
Quiz
•
10th Grade
15 questions
11° Evaluación bimestral de informática
Quiz
•
11th Grade
10 questions
Server Administration- Quiz 1
Quiz
•
12th Grade - University
10 questions
Quiz Informatica Jornadas Orientación Asunción
Quiz
•
12th Grade - University
10 questions
10mo Evaluación
Quiz
•
10th Grade
15 questions
Databases
Quiz
•
11th Grade
15 questions
Начала программирования на языке Паскаль
Quiz
•
8th - 11th Grade
13 questions
RAM&HDD/SSD
Quiz
•
10th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
14 questions
[AP CSP] JavaScript Programming Quiz
Quiz
•
9th - 12th Grade
10 questions
Understanding Computers and Computer Engineering
Interactive video
•
7th - 12th Grade
37 questions
Python - Tuples, Lists, and List Methods
Quiz
•
9th - 12th Grade
60 questions
MOS Word Home, Insert, Reference Ribbon Basics
Quiz
•
9th Grade