ITF+ Ch10, Security Best Practices

ITF+ Ch10, Security Best Practices

Professional Development

20 Qs

quiz-placeholder

Similar activities

Office 365 & Services

Office 365 & Services

Professional Development

20 Qs

JAVA - Arrays

JAVA - Arrays

University - Professional Development

15 Qs

Javascript basics

Javascript basics

Professional Development

15 Qs

Keyboard Types

Keyboard Types

Professional Development

16 Qs

Assignment 2 - Introduction to Nursing Informatics and History

Assignment 2 - Introduction to Nursing Informatics and History

Professional Development

20 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Investigasi Forensics Siber

Investigasi Forensics Siber

Professional Development

20 Qs

ITF+ Ch10, Security Best Practices

ITF+ Ch10, Security Best Practices

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Jon Casteel

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Because of a recent string of thefts in your office, you need to harden your local system. What two actions are most appropriate for your situation? (Choose two.)

Install a hardware lock.

Disable unused services.

Install anti-malware.

Enable encryption.

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What option can you configure on your workstation to increase security when you leave your desk?

File encryption

Multifactor authentication

Single sign-on

Screensaver password

3.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

You have just landed at an airport and have an unexpected six-hour layover. You want to use your smartphone to get some work done. What should you disable as a precautionary device-hardening measure to help prevent potential attacks? (Choose two.)

Autofill

Bluetooth

NFC

FFC

4.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Claire, a co-worker, is browsing the Internet and wants to know whether it's safe to enter her credit card information into a website. What do you tell her to look for?

HTTPS://

HTTP://

SSL://

TLS://

5.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

You enabled file encryption on your local computer. While you were on vacation, one of

your co-workers managed to get onto your computer and share your important files with

other users. How did they do this?

They logged on and disabled encryption.

They used the Disk Recovery tool to access the encrypted files.

All users logging into the system have access to encrypted files.

They logged on with your username and password.

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which of the following types of data should be considered confidential and handled appropriately? (Choose two.)

Financial information

Social networking site

Customer information

Contact information

7.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Which type of software will help protect your computer from malicious network traffic?

Software firewall

Password complexity tool

Antispyware

Antivirus

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?