IT Final

IT Final

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

arigatou arigatou

Used 4+ times

FREE Resource

Student preview

quiz-placeholder

96 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What characteristic describes antivirus software?

  • applications that protect end devices from becoming infected with malicious software


  • a network device that filters access and traffic coming into a network


  • a tunneling protocol that provides remote users with secure access into the network of an organization


  • software on a router that filters traffic based on IP addresses or applications


2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What two security solutions are most likely to be used only in a corporate environment? (Choose two.)

  • virtual private networks


  • intrusion prevention systems


  • antispyware


  • strong passwords


3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service is provided by POP3?

  • Retrieves email from the server by downloading the email to the local mail application of the client.


  • An application that allows real-time chatting among remote users.


  • Uses encryption to provide secure remote access to network devices and servers.


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

  • 255.255.255.248


  • 255.255.255.0


  • 255.255.255.128


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?

  • User Datagram Protocol field


  • frame check sequence field


  • flow control field


  • error correction process field


6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall?

  • brute-force attack


  • Trojan horse


  • DoS


  • buffer overflow


7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the two most effective ways to defend against malware? (Choose two.)

  • Update the operating system and other application software.


  • Install and update antivirus software.


  • Implement strong passwords.


  • Implement RAID.


Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?