IT Chapter 13

IT Chapter 13

9th - 12th Grade

24 Qs

quiz-placeholder

Similar activities

Django-quiz

Django-quiz

5th Grade - University

20 Qs

Uji Pengetahuan Jaringan Komputer

Uji Pengetahuan Jaringan Komputer

9th Grade - University

20 Qs

Robotik-PH2

Robotik-PH2

9th Grade

20 Qs

QUIZ 3 SAM

QUIZ 3 SAM

12th Grade

20 Qs

Arduino_Quiz

Arduino_Quiz

12th Grade

20 Qs

Remedial Informatika

Remedial Informatika

9th - 12th Grade

20 Qs

History of the computer

History of the computer

12th Grade

20 Qs

แบบทดสอบหลังเรียน หน่วยที่ 1 ความรู้เบื้องต้นเกี่ยวกับการจัดการฐานข้อมูล

แบบทดสอบหลังเรียน หน่วยที่ 1 ความรู้เบื้องต้นเกี่ยวกับการจัดการฐานข้อมูล

10th Grade

20 Qs

IT Chapter 13

IT Chapter 13

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Timothy Smith

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two items are used in asymmetric encryption?

token + DES key

DES key + public key

private key + public key

TPM + DES

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two algorithms are used for hash encoding to guarantee the integrity of data?

MD5 + SHA

chap checksum + SHA

VPN + SSL

SSL + MD5

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach?

biometrics + employee smart ID

mantrap + security guard that checks IDs

multifactor authentication + biometrics

security guard that checks IDs + mantrap

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

DDoS

spam

social engineering

anonymous keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

adware

DDoS

phishing

spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

check for the latest OS patches and updates

document the problem and the procedures performed to solve it

talk with the user to determine the cause of the problem

gather information from a number of sources to clearly identify the problem

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When would a PC repair person want to deploy the idle timeout feature?

when users are inserting media and running applications not sanctioned by the company

when users are leaving their desk but remained logged on

when users are surfing the internet and not doing their job

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?