
ITF - CIA and AAA
Authored by Chase Christensen
Computers
9th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the BEST countermeasure against social engineering?
Access auditing
Strong passwords
Acceptable use policy
User awareness training
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a Man-in-the-Middle attack?
Malicious code is planted on a system where it waits for a triggering event before activating
An attacker intercepts communications between two network hosts by impersonating each host
An IP packet is constructed which is larger than the valid size
A person over the phone convinces an employee to reveal their logon credentials
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician walks into the office with a UPS. What sort of threat will this devices prepare a system for?
Wiretapping
Denial-of-Service
Power outage
Data redundancy
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus?
CHOOSE TWO
Keep the operating system up to date
Keep an up to date remote backup
Turn off location services
Lock the screen with some form of authentication
Keep your device always in your possession
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which of the following situations should you expect total privacy?
Email messages and attachments
Social networking
Instant messaging
Financial transactions
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following security measures is a form of biometrics?
BIOS password
Chassis intrusion detection
TPM
Fingerprint scanner
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used?
DLP
Firewall
Smart card
Multifactor authentication
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?