Mentoring Security Chapter 4

Mentoring Security Chapter 4

1st - 5th Grade

5 Qs

quiz-placeholder

Similar activities

ELABORAMOS PROTOTIPOS ECOLÓGICOS QUE REEMPLACEN LOS ENVASES

ELABORAMOS PROTOTIPOS ECOLÓGICOS QUE REEMPLACEN LOS ENVASES

2nd Grade

10 Qs

Mitad de programa AIG

Mitad de programa AIG

1st - 3rd Grade

10 Qs

UC9 Auxiliar na conferência de mercadorias aduaneiras

UC9 Auxiliar na conferência de mercadorias aduaneiras

1st Grade

10 Qs

CASOS CONVERSATORIO RELACIONES LABORALES SEGUNDO SEMESTRE 20

CASOS CONVERSATORIO RELACIONES LABORALES SEGUNDO SEMESTRE 20

1st - 12th Grade

10 Qs

la creación de Dios

la creación de Dios

4th Grade

10 Qs

EXAMEN DE SALUD Y ALIMENTACIÓN

EXAMEN DE SALUD Y ALIMENTACIÓN

1st Grade

10 Qs

Comunicacion Asertiva

Comunicacion Asertiva

KG - 3rd Grade

10 Qs

Le réfrigérateur

Le réfrigérateur

2nd Grade

10 Qs

Mentoring Security Chapter 4

Mentoring Security Chapter 4

Assessment

Quiz

Professional Development

1st - 5th Grade

Practice Problem

Hard

Created by

Didik Suryabuana

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

1. An employee calls IT personnel and states that they received an email with a PDF document to review. After the PDF was opened, the system has not been performing correctly. An IT admin conducted a scan and found a virus. Determine the two classes of viruses the computer most likely has. (Select all that apply.)

Macro

Program

Script

Boot sector

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following depict ways a malicious attacker can gain access to a target's network? (Select all that apply.)

Shoulder surfing

Mantrap

Ethical hacking

Phishing

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

3. A tech concludes that a user's PC is infected with a virus that appears to be a memory resident and loads anytime the operating system is restarted. Examine the options and determine which describes the infection type

Monitors local application activity

Uses a local scripting engine

Written to the partition table of a fixed disk

Replicates over network resources

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. Which situation would require keyboard encryption software be installed on a computer?

To protect against spyware

To set up single sign-on privileges

To comply with input validation practices

For the purpose of key management

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A gaming company decides to add software on each title it releases. The company's objective is to require the CD to be inserted during use. This software will gain administrative rights, change system files, and hide from detection without the knowledge or consent of the user. Consider the malware characteristics and determine which is being used.

Rootkit

Trojan

Spyware

Keylogger

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?