ITF+ Ch9, Security Concepts & Threats

ITF+ Ch9, Security Concepts & Threats

Professional Development

20 Qs

quiz-placeholder

Similar activities

Computer and Internet vocabulary (definitions)

Computer and Internet vocabulary (definitions)

Professional Development

20 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

ITF+ Ch10, Security Best Practices

ITF+ Ch10, Security Best Practices

Professional Development

20 Qs

Digital Literacy - Pre Assesment

Digital Literacy - Pre Assesment

Professional Development

15 Qs

Security+ Study Guide-04 Securing Your Network

Security+ Study Guide-04 Securing Your Network

Professional Development

15 Qs

CYBER SECURITY

CYBER SECURITY

Professional Development

20 Qs

Cyber Security

Cyber Security

Professional Development

20 Qs

Chapter 1 and 2 Quiz

Chapter 1 and 2 Quiz

Professional Development

20 Qs

ITF+ Ch9, Security Concepts & Threats

ITF+ Ch9, Security Concepts & Threats

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Jon Casteel

Used 11+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Which of the following are activities that a hacker might attempt?

Stealing usernames and passwords

Modifying website content

Disrupting network communications

Analyzing network traffic

All of the above

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

You have invented a new toy that will be the most popular toy for children this year. What type of intellectual property protection should you get?

Trademark

Copyright

Patent

Receipt

3.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which of the following are threats to data availability? (Choose two.)

Service outage

Replay attack

Wiretapping

Destruction

4.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What is the name of an application that appears to look like a helpful application but instead does harm to your computer?

Virus

Worm

Malware

Trojan horse

5.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Someone was recently caught sifting through your company's trash looking for confidential

information. What is this an example of?

Trash snooping

Dumpster diving

Phishing

Social engineering

6.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

You are implementing multifactor security on a computer. Which of the following is not a valid factor?

Receipt

Password

Hardware token

Specific location

7.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

You have been asked to lead a class on preventing social engineering. What two topics should you be sure to cover? (Choose two.)

Viruses and worms

Shoulder surfing

Hardware theft

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?