
IT Chapter 13
Quiz
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Hard
Timothy Smith
Used 3+ times
FREE Resource
Enhance your content in a minute
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which two items are used in asymmetric encryption?
token + DES key
DES key + public key
private key + public key
TPM + DES
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which two algorithms are used for hash encoding to guarantee the integrity of data?
MD5 + SHA
chap checksum + SHA
VPN + SSL
SSL + MD5
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach?
biometrics + employee smart ID
mantrap + security guard that checks IDs
multifactor authentication + biometrics
security guard that checks IDs + mantrap
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
DDoS
spam
social engineering
anonymous keylogging
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
adware
DDoS
phishing
spyware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?
check for the latest OS patches and updates
document the problem and the procedures performed to solve it
talk with the user to determine the cause of the problem
gather information from a number of sources to clearly identify the problem
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When would a PC repair person want to deploy the idle timeout feature?
when users are inserting media and running applications not sanctioned by the company
when users are leaving their desk but remained logged on
when users are surfing the internet and not doing their job
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
QUIZ 3 SAM
Quiz
•
12th Grade
20 questions
Fundamentos de Mecatrónica
Quiz
•
9th - 12th Grade
20 questions
2da prueba 6to aplicaciones 2022-2023
Quiz
•
12th Grade
20 questions
2da Prueba 5to App_2022-2023
Quiz
•
11th Grade
20 questions
11-сынып
Quiz
•
11th Grade
20 questions
Uji Pengetahuan Jaringan Komputer
Quiz
•
9th Grade - University
20 questions
แบบทดสอบปลายภาค Photoshop
Quiz
•
9th - 12th Grade
20 questions
TES INSTALASI TENAGA 3 FASA
Quiz
•
11th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
Discover more resources for Computers
15 questions
Internet Vocabulary Notebook Check #2 - CTEA(2024)
Quiz
•
12th Grade
11 questions
Internet Terms Vocabulary- Notebook Check #1- CTEA
Quiz
•
12th Grade
39 questions
UNIT 7 and UNIT 8 — Multiple Choice Question Bank (Extracted)
Quiz
•
9th Grade
50 questions
Money Matters Fall 2025 Final Exam — Worksheet Questions
Quiz
•
12th Grade
47 questions
CSF Final Exam Practice
Quiz
•
9th - 12th Grade
