6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Professional Development

25 Qs

quiz-placeholder

Similar activities

Part 4.2

Part 4.2

Professional Development

20 Qs

Linux Understanding Basic Security in Linux

Linux Understanding Basic Security in Linux

Professional Development

30 Qs

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

Professional Development

25 Qs

Part 3.2

Part 3.2

Professional Development

20 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

25 Qs

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

Professional Development

29 Qs

CNS_Final Quiz

CNS_Final Quiz

Professional Development

20 Qs

A+ - 18C - Troubleshoot Mobile OS and App Security

A+ - 18C - Troubleshoot Mobile OS and App Security

Professional Development

23 Qs

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Assessment

Quiz

Computers

Professional Development

Easy

Created by

The I.T.Factor

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following practices aims to prevent unauthorized access to information?

Data replication

Encryption

Load balancing

Traffic filtering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes intercepting private communication without consent?

Snooping

Eavesdropping

Wiretapping

Social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of integrity in the CIA model?

Ensuring data remains accessible

Ensuring data is accurate and unaltered

Protecting data from unauthorized access

Backing up data regularly

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can compromise data integrity by altering communication between two parties?

Man-in-the-Middle attack

Phishing attack

Replay attack

Social engineering attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique ensures information and systems are accessible to authorized users when needed?

Encryption

Load balancing

Firewalls

Hash functions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which software is essential for detecting and removing malicious threats from a device?

Firewall

Antivirus/Anti-malware

Load balancer

Password manager

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why should default passwords on devices be changed immediately?

To enable encryption

To prevent unauthorized access

To improve connection speed

To enable automatic updates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?