
Policies and Procedures in IT Infrastructure
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
My Account
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a clear desk policy?
Improve employee productivity
Reduce the risk of unauthorized access or visual hacking
Organize workstations
Allow quick access to files
Answer explanation
The purpose of a clear desk policy is primarily to reduce the risk of unauthorized access or visual hacking. By keeping workspaces tidy, sensitive information is less likely to be seen or accessed by unauthorized individuals.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does data encryption at rest mean?
Encrypting data only during network transfer
Protecting stored data by converting it into unreadable formats
Deleting old data from the system
Encrypting data only when files are accessed
Answer explanation
Data encryption at rest refers to protecting stored data by converting it into unreadable formats. This ensures that even if unauthorized access occurs, the data remains secure and inaccessible without the proper decryption key.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of authentication?
Backing up a file
Scanning a fingerprint to unlock a device
Encrypting a hard drive
Monitoring network traffic
Answer explanation
Scanning a fingerprint to unlock a device is an example of authentication, as it verifies the identity of a user. The other options involve data management or security but do not confirm user identity.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What protocol ensures secure data transmission over the internet?
HTTP
FTP
HTTPS
SMTP
Answer explanation
HTTPS (HyperText Transfer Protocol Secure) ensures secure data transmission over the internet by encrypting the data exchanged between the user and the server, unlike HTTP, FTP, and SMTP which do not provide this level of security.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool can be used to enforce multi-factor authentication (MFA)?
Password manager
Authenticator app
Antivirus software
Network proxy
Answer explanation
An authenticator app generates time-based one-time passwords (TOTPs) for multi-factor authentication (MFA), enhancing security by requiring a second form of verification beyond just a password.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of confidentiality in the CIA Triad?
Ensuring data is available 24/7
Restricting access to authorized users
Answer explanation
The primary goal of confidentiality in the CIA Triad is to restrict access to authorized users, ensuring that sensitive information is protected from unauthorized access.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool can help maintain the integrity of data?
Firewall
Hashing algorithms
VPN
RAID
Answer explanation
Hashing algorithms help maintain data integrity by generating a unique hash value for data. If the data changes, the hash value will also change, indicating potential tampering. This makes hashing essential for verifying data integrity.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
MTA - Microsoft Operating Systems Review 1
Quiz
•
10th Grade - Professi...
20 questions
Salesforce Developer
Quiz
•
Professional Development
20 questions
แบบทดสอบการออกแบบสื่อสิ่งพิมพ์ ม.5
Quiz
•
Professional Development
20 questions
Introduction to Machine Learning
Quiz
•
University - Professi...
20 questions
Microsoft Excel
Quiz
•
KG - Professional Dev...
20 questions
Amoled Quiz for IoT Course
Quiz
•
Professional Development
20 questions
SH 3 Informatika 8
Quiz
•
Professional Development
20 questions
UH INFORMATIKA BAB BERFIKIR KOMPUTASIONAL
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
