6.0 Security - CompTIA IT Fundamentals (ITF+) Security Flashcard #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Flashcard #1

Assessment

Flashcard

Computers

Professional Development

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

25 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which of the following practices aims to prevent unauthorized access to information?
Data replication,
Encryption,
Load balancing,
Traffic filtering

Back

Encryption

Answer explanation

Encryption is a practice that secures data by converting it into a coded format, preventing unauthorized access. Unlike data replication, load balancing, and traffic filtering, encryption specifically protects the confidentiality of information.

2.

FLASHCARD QUESTION

Front

Which term describes intercepting private communication without consent? Options: Snooping, Eavesdropping, Wiretapping, Social engineering

Back

Snooping

Answer explanation

Snooping refers to the act of intercepting private communication without consent. While eavesdropping and wiretapping are similar, snooping is the broader term that encompasses various methods of unauthorized access to information.

3.

FLASHCARD QUESTION

Front

What is the primary goal of integrity in the CIA model?

Back

Ensuring data is accurate and unaltered

Answer explanation

The primary goal of integrity in the CIA model is to ensure data is accurate and unaltered. This means protecting data from being modified or corrupted, which is crucial for maintaining trust and reliability.

4.

FLASHCARD QUESTION

Front

Which of the following can compromise data integrity by altering communication between two parties?
Man-in-the-Middle attack, Phishing attack, Replay attack, Social engineering attack

Back

Man-in-the-Middle attack

Answer explanation

A Man-in-the-Middle attack compromises data integrity by intercepting and altering communication between two parties, allowing the attacker to manipulate the data being exchanged.

5.

FLASHCARD QUESTION

Front

What technique ensures information and systems are accessible to authorized users when needed?

Back

Encryption

Answer explanation

Encryption ensures that information is protected and only accessible to authorized users, allowing them to access systems and data securely when needed.

6.

FLASHCARD QUESTION

Front

Which software is essential for detecting and removing malicious threats from a device? Options: Firewall, Antivirus/Anti-malware, Load balancer, Password manager

Back

Antivirus/Anti-malware

Answer explanation

Antivirus/Anti-malware software is essential for detecting and removing malicious threats from a device, as it specifically targets viruses, malware, and other harmful software, unlike firewalls or password managers.

7.

FLASHCARD QUESTION

Front

Why should default passwords on devices be changed immediately?

Back

To prevent unauthorized access

Answer explanation

Default passwords are often widely known, making devices vulnerable to unauthorized access. Changing them immediately helps secure the device and protect sensitive information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?