
6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1
Authored by Lawrence Mitchell _ Staff - ApexHS
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
34 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following practices aims to prevent unauthorized access to information?
Data replication
Encryption
Load balancing
Traffic filtering
Answer explanation
Encryption is a practice that secures data by converting it into a coded format, preventing unauthorized access. Unlike data replication, load balancing, and traffic filtering, encryption specifically protects the confidentiality of information.
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which term describes intercepting private communication without consent?
Snooping
Eavesdropping
Wiretapping
Social engineering
Answer explanation
Snooping refers to the act of intercepting private communication without consent. While eavesdropping and wiretapping are similar, snooping is the broader term that encompasses various methods of unauthorized access to information.
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the primary goal of integrity in the CIA model?
Ensuring data remains accessible
Ensuring data is accurate and unaltered
Protecting data from unauthorized access
Backing up data regularly
Answer explanation
The primary goal of integrity in the CIA model is to ensure data is accurate and unaltered. This means protecting data from being modified or corrupted, which is crucial for maintaining trust and reliability.
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following can compromise data integrity by altering communication between two parties?
Man-in-the-Middle attack
Phishing attack
Replay attack
Social engineering attack
Answer explanation
A Man-in-the-Middle attack compromises data integrity by intercepting and altering communication between two parties, allowing the attacker to manipulate the data being exchanged.
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What technique ensures information and systems are accessible to authorized users when needed?
Encryption
Load balancing
Firewalls
Hash functions
Answer explanation
Encryption ensures that information is protected and only accessible to authorized users, allowing them to access systems and data securely when needed.
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which software is essential for detecting and removing malicious threats from a device?
Firewall
Antivirus/Anti-malware
Load balancer
Password manager
Answer explanation
Antivirus/Anti-malware software is essential for detecting and removing malicious threats from a device, as it specifically targets viruses, malware, and other harmful software, unlike firewalls or password managers.
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Why should default passwords on devices be changed immediately?
To enable encryption
To prevent unauthorized access
To improve connection speed
To enable automatic updates
Answer explanation
Default passwords are often widely known, making devices vulnerable to unauthorized access. Changing them immediately helps secure the device and protect sensitive information.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?