IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

9th Grade - University

18 Qs

quiz-placeholder

Similar activities

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

Unit 11: Cybersecurity

Unit 11: Cybersecurity

10th - 12th Grade

22 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

Security & Authentication in ITGS

Security & Authentication in ITGS

10th - 12th Grade

21 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

Assessment

Quiz

Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 17+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Refer to the image. What type of an attack has occurred?

Ransomware

Worm

Trojan horse

Adware

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Even with all of today's technology the most common security problem is people tricking people to get information. This type of attack is referred to as:

Social Engineering

Key Logging

Adware

Malware

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

An attack that tries to get people to give up sensitive information via email is referred to as:

Phishing

Key Logging

Pharming

Pretexting

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Which of the following would NOT be a typical category of a security policy?

ID and Authentication

Remote Access

Acceptable Use

Incident Handling

Device Preference

Answer explanation

Even though an organization may have a preference for a certain brand or type of device that gets used on their network, it is not a typical category for a security policy.

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Some versions of Windows offer this application to encrypt removeable media.

EFS (Encrypting File System)

NTFS

BitLocker To Go

FAT 32

6.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Identify the places that should be password protected at a minimum to secure a work station.

BIOS or UEFI

User Account

Network Connections

Folders

Individual Files

Answer explanation

While it is possible and might be advised to password protect files and folders in certain situations, it is not necessary to do this to secure the workstation.

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This can be used to encrypt files or folders in the Windows OS.

EFS (Encrypting File System)

NTFS

BitLocker To Go

FAT 32

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?