CompTIA ITF+ Security Quiz

CompTIA ITF+ Security Quiz

University

24 Qs

quiz-placeholder

Similar activities

Machine Learning

Machine Learning

University

20 Qs

Algoritma Pemrograman

Algoritma Pemrograman

University

20 Qs

3D Objects - Terms & Transfomations

3D Objects - Terms & Transfomations

6th Grade - Professional Development

20 Qs

4-2 final QUIZ in ELEC4

4-2 final QUIZ in ELEC4

University

20 Qs

Digital and Analog transmission

Digital and Analog transmission

University

20 Qs

Soal AIJ bulan Agustus 2019 kls xii

Soal AIJ bulan Agustus 2019 kls xii

University

20 Qs

ICT Unit-2

ICT Unit-2

University

20 Qs

Kuis Pemrograman Dasar

Kuis Pemrograman Dasar

University

20 Qs

CompTIA ITF+ Security Quiz

CompTIA ITF+ Security Quiz

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Carl Joseph David

Used 19+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT part of the CIA Triad?

Confidentiality

Availability

Encryption

Integrity

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of confidentiality in information security?

Ensuring data is accessible to authorized users only

Protecting data from corruption

Ensuring systems are available at all times

Preventing power outages

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of an integrity attack?

Snooping

Denial of Service

Man-in-the-Middle

Dumpster Diving

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a common attack that affects system availability?

Wiretapping

Replay Attack

Denial of Service (DoS)

Social Engineering

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of authentication in access control?

Defining user permissions

Verifying user identity

Blocking unauthorized access

Encrypting data

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which social engineering technique involves tricking someone into revealing sensitive information?

Phishing

RAID

Replication

Firewall

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a disaster recovery plan?

To ensure uninterrupted power supply

To recover data and restore operations after a disaster

To prevent malware infections

To secure physical access to systems

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?