Common IT Security Questions

Common IT Security Questions

12th Grade

53 Qs

quiz-placeholder

Similar activities

#3 CIW Data Analyst - Certification Prep

#3 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

emerging trends class 11

emerging trends class 11

11th - 12th Grade

48 Qs

Cybersecurity Best Practices Quiz

Cybersecurity Best Practices Quiz

12th Grade

48 Qs

THIRD QUARTER ASSESSMENT IN CSS - GRADE 9

THIRD QUARTER ASSESSMENT IN CSS - GRADE 9

9th Grade - University

50 Qs

CSEC IT - 16 Policies & Practices / Licensing Arrangements

CSEC IT - 16 Policies & Practices / Licensing Arrangements

10th - 12th Grade

50 Qs

AIT Managing Data and Impacts of Tech Quiz

AIT Managing Data and Impacts of Tech Quiz

12th Grade

51 Qs

Chapter 1 _ICT

Chapter 1 _ICT

9th - 12th Grade

50 Qs

Online World Mock Exam

Online World Mock Exam

12th Grade - University

56 Qs

Common IT Security Questions

Common IT Security Questions

Assessment

Quiz

Computers

12th Grade

Medium

Created by

K xa Kta kti ho

Used 3+ times

FREE Resource

53 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are commonly used in VPN tunneling protocols? (Select the two best answers.)

PPP

PPTP

TACACS

L2TP

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

When conducting a risk assessment, which of the following should you do after identifying threats and threat likelihood? (Select the two best answers.)

Identify the organization's assets.

Identify vulnerabilities.

Identify a potential monetary impact.

Identify the impact assessment.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following questions should you take into account when securing log files? (Select the two best answers.)

Were the log files encrypted and hashed?

Are the logs stored in multiple locations?

Were the log files encrypted in a Kerberos system?

How big are the log files?

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

In information security, what are the three main goals? (Select the three best answers.)

Integrity

Nonrepudiation

Confidentiality

Availability

Risk Assessment

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two ways to secure the computer within the BIOS? (Select the two best answers.)

Configure a supervisor password.

Turn on BIOS shadowing.

Flash the BIOS.

Set the hard drive first in the boot order.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following should be implemented to harden an operating system? (Select the two best answers.)

Install the latest service pack.

Install Windows Defender.

Install a virtual operating system.

Execute PHP scripts.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two ways to secure Internet Explorer? (Select the two best answers.)

Set the Internet zone's security level to High.

Disable the pop-up blocker.

Disable ActiveX controls.

Add malicious sites to the Trusted Sites zone.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?