Search Header Logo

Data Integrity and Security Measures Quiz

Authored by Anthony DellaRosa

Computers

11th Grade

42 Questions

Used 1+ times

Data Integrity and Security Measures Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)

MD5

chap checksum

SHA

VPN

SSL

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

Implementing a mantrap

Using a token-based authentication system

Installing more surveillance cameras

Increasing the number of security guards

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A guard checking IDs or a mantrap can help prevent someone following a legitimate employee into a restricted area. With biometrics, employee smart IDs, or multifactor authentication being used, once the door is accessed by someone having the correct credentials, unauthorized people could still trail the legitimate person into the building or area.

biometrics

employee smart ID

mantrap

multifactor authentication

security guard that checks IDs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

DDoS

spam

social engineering

anonymous keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

adware

DDoS

phishing

social engineering

spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates.

Document the problem and the procedures performed to solve it.

Talk with the user to determine the cause of the problem.

Gather information from a number of sources to clearly identify the problem.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When would a PC repair person want to deploy the idle timeout feature?

when users are inserting media and running applications not sanctioned by the company

when users are leaving their desk but remaining logged on

when users are playing music CDs and leaving them playing even after the users have left for the day

when users are surfing the Internet and not doing their job

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?