
IT Chapter 13
Authored by Timothy Smith
Computers
9th - 12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which two items are used in asymmetric encryption?
token + DES key
DES key + public key
private key + public key
TPM + DES
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which two algorithms are used for hash encoding to guarantee the integrity of data?
MD5 + SHA
chap checksum + SHA
VPN + SSL
SSL + MD5
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach?
biometrics + employee smart ID
mantrap + security guard that checks IDs
multifactor authentication + biometrics
security guard that checks IDs + mantrap
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
DDoS
spam
social engineering
anonymous keylogging
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
adware
DDoS
phishing
spyware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?
check for the latest OS patches and updates
document the problem and the procedures performed to solve it
talk with the user to determine the cause of the problem
gather information from a number of sources to clearly identify the problem
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When would a PC repair person want to deploy the idle timeout feature?
when users are inserting media and running applications not sanctioned by the company
when users are leaving their desk but remained logged on
when users are surfing the internet and not doing their job
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
22 questions
HTML Quiz
Quiz
•
9th Grade
20 questions
Evaluare sumativă C++ clasa a 9 - a
Quiz
•
9th Grade
21 questions
Google : ¡A trabajar!
Quiz
•
10th - 11th Grade
20 questions
2324tx6
Quiz
•
9th - 12th Grade
20 questions
Network topologies
Quiz
•
8th Grade - University
20 questions
Introducción a las bases de datos
Quiz
•
12th Grade
20 questions
Sains Komputer Tingkatan 5 - 1.3.1 Menerangkan get logik
Quiz
•
1st Grade - Professio...
20 questions
Quiz 4
Quiz
•
1st - 10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade