Search Header Logo

ITF+ 6.5 to 6.7 Security Concerns

Authored by Rose Matias

Computers

12th Grade

Used 2+ times

ITF+ 6.5 to 6.7 Security Concerns
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method that a malicious person can use to masquerade as someone else when using email or Instant Messaging?

Overwhelm the server with a Denial of Service (DoS)
Stealing a user's login information
Using an unattended computer that is still logged in
Using malware such as a Trojan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of access mechanism is MOST vulnerable to a replay attack?

Use of multi-factor authentication

Use of a complex password

Use of a token generated by software

Use of biometrics

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In considering availability concerns, what use might a lockable faceplate on a server-class computer be?

It may prevent a natural disaster from damaging the hardware and corrupting the data.

It may prevent the computer or server from overheating and shutting down.

It may prevent a hacker from obtaining remote unauthorized network access.

It may prevent the user from switching the machine on/off or accessing removable drives and ports.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security concern is snooping most affected by?

Confidentiality

Integrity

Availability

Authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What impact is presented when users reveal their passwords to technical support staff?

It exposes the passwords to brute-force attacks from malicious hackers.

It provides technical support staff with access to the user's personal files stored on the network.

It exposes users to social engineering attacks that try to gather login credentials for malicious use.

It prevents the user from needing to change a password following the password history component of the policy.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which specific attack uses a botnet to threaten availability?

Replay

Power outage

Man-in-the-Middle (MitM)

Distributed Denial of Service (DDoS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between virus and worm malware?

A virus has to infect a file whereas a worm propagates in memory and over computer networks.

A virus propagates in memory and over computer networks whereas a worm has to infect a file

A virus uses sequences of code that insert themselves into an executable whereas a worm uses document macros.

A virus uses a macro programming language to automate tasks where as a worm executes when the application is executed.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?