Search Header Logo

Common IT Security Questions

Authored by K xa Kta kti ho

Computers

12th Grade

Used 3+ times

Common IT Security Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

53 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are commonly used in VPN tunneling protocols? (Select the two best answers.)

PPP

PPTP

TACACS

L2TP

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

When conducting a risk assessment, which of the following should you do after identifying threats and threat likelihood? (Select the two best answers.)

Identify the organization's assets.

Identify vulnerabilities.

Identify a potential monetary impact.

Identify the impact assessment.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following questions should you take into account when securing log files? (Select the two best answers.)

Were the log files encrypted and hashed?

Are the logs stored in multiple locations?

Were the log files encrypted in a Kerberos system?

How big are the log files?

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

In information security, what are the three main goals? (Select the three best answers.)

Integrity

Nonrepudiation

Confidentiality

Availability

Risk Assessment

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two ways to secure the computer within the BIOS? (Select the two best answers.)

Configure a supervisor password.

Turn on BIOS shadowing.

Flash the BIOS.

Set the hard drive first in the boot order.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following should be implemented to harden an operating system? (Select the two best answers.)

Install the latest service pack.

Install Windows Defender.

Install a virtual operating system.

Execute PHP scripts.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two ways to secure Internet Explorer? (Select the two best answers.)

Set the Internet zone's security level to High.

Disable the pop-up blocker.

Disable ActiveX controls.

Add malicious sites to the Trusted Sites zone.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?