6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Assessment

Quiz

•

Computers

•

Professional Development

•

Medium

Created by

Lawrence Mitchell _ Staff - ApexHS

Used 1+ times

FREE Resource

Student preview

quiz-placeholder

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following practices aims to prevent unauthorized access to information?

Data replication

Encryption

Load balancing

Traffic filtering

Answer explanation

Encryption is a practice that secures data by converting it into a coded format, preventing unauthorized access. Unlike data replication, load balancing, and traffic filtering, encryption specifically protects the confidentiality of information.

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which term describes intercepting private communication without consent?

Snooping

Eavesdropping

Wiretapping

Social engineering

Answer explanation

Snooping refers to the act of intercepting private communication without consent. While eavesdropping and wiretapping are similar, snooping is the broader term that encompasses various methods of unauthorized access to information.

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the primary goal of integrity in the CIA model?

Ensuring data remains accessible

Ensuring data is accurate and unaltered

Protecting data from unauthorized access

Backing up data regularly

Answer explanation

The primary goal of integrity in the CIA model is to ensure data is accurate and unaltered. This means protecting data from being modified or corrupted, which is crucial for maintaining trust and reliability.

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following can compromise data integrity by altering communication between two parties?

Man-in-the-Middle attack

Phishing attack

Replay attack

Social engineering attack

Answer explanation

A Man-in-the-Middle attack compromises data integrity by intercepting and altering communication between two parties, allowing the attacker to manipulate the data being exchanged.

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What technique ensures information and systems are accessible to authorized users when needed?

Encryption

Load balancing

Firewalls

Hash functions

Answer explanation

Encryption ensures that information is protected and only accessible to authorized users, allowing them to access systems and data securely when needed.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which software is essential for detecting and removing malicious threats from a device?

Firewall

Antivirus/Anti-malware

Load balancer

Password manager

Answer explanation

Antivirus/Anti-malware software is essential for detecting and removing malicious threats from a device, as it specifically targets viruses, malware, and other harmful software, unlike firewalls or password managers.

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Why should default passwords on devices be changed immediately?

To enable encryption

To prevent unauthorized access

To improve connection speed

To enable automatic updates

Answer explanation

Default passwords are often widely known, making devices vulnerable to unauthorized access. Changing them immediately helps secure the device and protect sensitive information.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?