ITF+ 6.5 to 6.7 Security Concerns

ITF+ 6.5 to 6.7 Security Concerns

12th Grade

31 Qs

quiz-placeholder

Similar activities

Bài tập 5,6_Tin 12

Bài tập 5,6_Tin 12

12th Grade

34 Qs

Computer Science 3R program 2019 SET 1

Computer Science 3R program 2019 SET 1

12th Grade

30 Qs

Test Out; How Computers Work

Test Out; How Computers Work

7th Grade - Professional Development

27 Qs

BANCO DE DADOS

BANCO DE DADOS

10th - 12th Grade

26 Qs

GAD Review - History

GAD Review - History

9th - 12th Grade

26 Qs

cs:go

cs:go

KG - Professional Development

27 Qs

COMANDI MS-WORD

COMANDI MS-WORD

10th Grade - University

27 Qs

Ulangan TIK Kelas 5

Ulangan TIK Kelas 5

10th - 12th Grade

27 Qs

ITF+ 6.5 to 6.7 Security Concerns

ITF+ 6.5 to 6.7 Security Concerns

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Rose Matias

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method that a malicious person can use to masquerade as someone else when using email or Instant Messaging?
Overwhelm the server with a Denial of Service (DoS)
Stealing a user's login information
Using an unattended computer that is still logged in
Using malware such as a Trojan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of access mechanism is MOST vulnerable to a replay attack?

Use of multi-factor authentication

Use of a complex password

Use of a token generated by software

Use of biometrics

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In considering availability concerns, what use might a lockable faceplate on a server-class computer be?

It may prevent a natural disaster from damaging the hardware and corrupting the data.

It may prevent the computer or server from overheating and shutting down.

It may prevent a hacker from obtaining remote unauthorized network access.

It may prevent the user from switching the machine on/off or accessing removable drives and ports.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security concern is snooping most affected by?

Confidentiality

Integrity

Availability

Authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What impact is presented when users reveal their passwords to technical support staff?

It exposes the passwords to brute-force attacks from malicious hackers.

It provides technical support staff with access to the user's personal files stored on the network.

It exposes users to social engineering attacks that try to gather login credentials for malicious use.

It prevents the user from needing to change a password following the password history component of the policy.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which specific attack uses a botnet to threaten availability?

Replay

Power outage

Man-in-the-Middle (MitM)

Distributed Denial of Service (DDoS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between virus and worm malware?

A virus has to infect a file whereas a worm propagates in memory and over computer networks.

A virus propagates in memory and over computer networks whereas a worm has to infect a file

A virus uses sequences of code that insert themselves into an executable whereas a worm uses document macros.

A virus uses a macro programming language to automate tasks where as a worm executes when the application is executed.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?