
Unit 1 - Foundations and Threats
Authored by Seleana Cooke
Information Technology (IT)
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do you stop a Rootkit?
Use antivirus software
Reinstall the operating system
Update all drivers
Ignore it
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following CANNOT be used for biometric authentication?
All of the answer choices can be used.
Heart Rate
Retina Scan
Typing speed
Fingerprint
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A one-way algorithm used to encrypt a password for secure storage or transfer.
SAM registry
Single Sign-On
Encoding
Hash
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Linux, which of the following commands will take you up one level in the path to your parent directory?
cd ..
cd /parent
cd ~
cd parent
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a breach of integrity in the CIA Triad?
Your co-worker reading your emails without your permission
A student getting a teacher password and changing the grades for the last quiz
A DDoS Attack that shuts down a website
A hacker convincing an elderly person to send money to get a friend out of jail.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A virtual machine allows the computer to have...
better 3D graphics
additional hard drive space
additional RAM
more than one operating system
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software program that automates the process of trying all possible combinations of characters to determine a password.
Guess and Check
Stealing
Brute Force
Hackathon
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?