IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

9th Grade - University

18 Qs

quiz-placeholder

Similar activities

SYO 701 INTRO TO SECURITY Module FC-2

SYO 701 INTRO TO SECURITY Module FC-2

University

20 Qs

AP CSP Internet

AP CSP Internet

9th - 12th Grade

20 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

1.3 - Surveying the Cyberspace

1.3 - Surveying the Cyberspace

University

15 Qs

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

7th - 12th Grade

20 Qs

Domain 5 Quiz

Domain 5 Quiz

University

19 Qs

IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

Assessment

Quiz

Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 17+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Refer to the image. What type of an attack has occurred?

Ransomware

Worm

Trojan horse

Adware

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Even with all of today's technology the most common security problem is people tricking people to get information. This type of attack is referred to as:

Social Engineering

Key Logging

Adware

Malware

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

An attack that tries to get people to give up sensitive information via email is referred to as:

Phishing

Key Logging

Pharming

Pretexting

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Which of the following would NOT be a typical category of a security policy?

ID and Authentication

Remote Access

Acceptable Use

Incident Handling

Device Preference

Answer explanation

Even though an organization may have a preference for a certain brand or type of device that gets used on their network, it is not a typical category for a security policy.

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Some versions of Windows offer this application to encrypt removeable media.

EFS (Encrypting File System)

NTFS

BitLocker To Go

FAT 32

6.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Identify the places that should be password protected at a minimum to secure a work station.

BIOS or UEFI

User Account

Network Connections

Folders

Individual Files

Answer explanation

While it is possible and might be advised to password protect files and folders in certain situations, it is not necessary to do this to secure the workstation.

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This can be used to encrypt files or folders in the Windows OS.

EFS (Encrypting File System)

NTFS

BitLocker To Go

FAT 32

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?