
Policies and Procedures in IT Infrastructure
Authored by My Account
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a clear desk policy?
Improve employee productivity
Reduce the risk of unauthorized access or visual hacking
Organize workstations
Allow quick access to files
Answer explanation
The purpose of a clear desk policy is primarily to reduce the risk of unauthorized access or visual hacking. By keeping workspaces tidy, sensitive information is less likely to be seen or accessed by unauthorized individuals.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does data encryption at rest mean?
Encrypting data only during network transfer
Protecting stored data by converting it into unreadable formats
Deleting old data from the system
Encrypting data only when files are accessed
Answer explanation
Data encryption at rest refers to protecting stored data by converting it into unreadable formats. This ensures that even if unauthorized access occurs, the data remains secure and inaccessible without the proper decryption key.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of authentication?
Backing up a file
Scanning a fingerprint to unlock a device
Encrypting a hard drive
Monitoring network traffic
Answer explanation
Scanning a fingerprint to unlock a device is an example of authentication, as it verifies the identity of a user. The other options involve data management or security but do not confirm user identity.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What protocol ensures secure data transmission over the internet?
HTTP
FTP
HTTPS
SMTP
Answer explanation
HTTPS (HyperText Transfer Protocol Secure) ensures secure data transmission over the internet by encrypting the data exchanged between the user and the server, unlike HTTP, FTP, and SMTP which do not provide this level of security.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool can be used to enforce multi-factor authentication (MFA)?
Password manager
Authenticator app
Antivirus software
Network proxy
Answer explanation
An authenticator app generates time-based one-time passwords (TOTPs) for multi-factor authentication (MFA), enhancing security by requiring a second form of verification beyond just a password.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of confidentiality in the CIA Triad?
Ensuring data is available 24/7
Restricting access to authorized users
Answer explanation
The primary goal of confidentiality in the CIA Triad is to restrict access to authorized users, ensuring that sensitive information is protected from unauthorized access.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What tool can help maintain the integrity of data?
Firewall
Hashing algorithms
VPN
RAID
Answer explanation
Hashing algorithms help maintain data integrity by generating a unique hash value for data. If the data changes, the hash value will also change, indicating potential tampering. This makes hashing essential for verifying data integrity.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?