ITF+ Module 5 Security Concepts

ITF+ Module 5 Security Concepts

9th - 12th Grade

35 Qs

quiz-placeholder

Similar activities

Bridge Course - Screening Test

Bridge Course - Screening Test

10th Grade - Professional Development

30 Qs

Excel Básico

Excel Básico

9th Grade

31 Qs

Administrasi Sistem Jaringan

Administrasi Sistem Jaringan

11th Grade

40 Qs

Ôn Tập Học Kì I Lớp 4

Ôn Tập Học Kì I Lớp 4

4th Grade - University

35 Qs

Pengenalan HTML

Pengenalan HTML

10th Grade

30 Qs

ôn tập giữa kì 1. tin 10

ôn tập giữa kì 1. tin 10

10th Grade

40 Qs

Creative iMedia R081 - Client requirements and Research

Creative iMedia R081 - Client requirements and Research

9th - 11th Grade

30 Qs

PTS SEMESTER GENAP

PTS SEMESTER GENAP

10th Grade

40 Qs

ITF+ Module 5 Security Concepts

ITF+ Module 5 Security Concepts

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Qiyu Luo

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What security concern is snooping most affected by?

Confidentiality
Integrity
Availability
Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

An attacker has used a rogue access point to intercept traffic passing between wireless clients and the wired network segment. What type of attack is this?

A Denial of Service (DoS) attack
A replay attack
An impersonation attack
A Man-in-the-Middle (MitM) attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What type of access mechanism is MOST vulnerable to a replay attack?

Use of multi-factor authentication
Use of a complex password
Use of a token generated by software
Use of biometrics

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which specific attack uses a botnet to threaten availability?

Replay
Power outage
Man-in-the-Middle (MitM)
Distributed Denial of Service (DDoS)

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

In considering availability concerns, what use might a lockable faceplate on a server-class computer be?

It may prevent a natural disaster from damaging the hardware and corrupting the data.
It may prevent the computer or server from overheating and shutting down.
It may prevent a hacker from obtaining remote unauthorized network access.
It may prevent the user from switching the machine on/off or accessing removable drives and ports.

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What impact is presented when users reveal their passwords to technical support staff?

It exposes the passwords to brute-force attacks from malicious hackers.
It provides technical support staff with access to the user's personal files stored on the network.
It exposes users to social engineering attacks that try to gather login credentials for malicious use.
It prevents the user from needing to change a password following the password history component of the policy.

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is NOT a method that a malicious person can use to masquerade as someone else when using email or Instant Messaging?

Overwhelm the server with a Denial of Service (DoS)
Stealing a user's login information
Using an unattended computer that is still logged in
Using malware such as a Trojan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?