OSE Chapter 13 Exam Revision Questions

OSE Chapter 13 Exam Revision Questions

11th Grade

35 Qs

quiz-placeholder

Similar activities

MOTHERBOARD

MOTHERBOARD

11th - 12th Grade

40 Qs

Python Basics-01

Python Basics-01

9th - 12th Grade

32 Qs

Adobe Premiere Pre-Test

Adobe Premiere Pre-Test

9th - 12th Grade

31 Qs

ICT 10 - JAVA

ICT 10 - JAVA

9th - 12th Grade

30 Qs

Business Letters and MS Word

Business Letters and MS Word

6th - 12th Grade

30 Qs

Битва умов

Битва умов

7th - 11th Grade

30 Qs

Principles of Computer Programming

Principles of Computer Programming

9th - 12th Grade

30 Qs

Administras Infrastrktur Jaringan - Kelas XII TKJ - SMK Peristek

Administras Infrastrktur Jaringan - Kelas XII TKJ - SMK Peristek

9th - 12th Grade

40 Qs

OSE Chapter 13 Exam Revision Questions

OSE Chapter 13 Exam Revision Questions

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Daniel undefined

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which two items are used in asymmetric encryption? (Choose two.)

a token

a DES key

a private key

a public key

a TPM

Answer explanation

A token is something that is used to provide two-factor authentication. DES is using an identical key to encrypt and decrypt. Asymmetric encryption uses a private key associated with a public key.

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)

MD5

chap checksum

SHA

  • VPN

SSL

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

  • biometrics

  • employee smart ID

  • mantrap

multifactor

  • security guard that checks IDs

Answer explanation

A guard checking IDs or a mantrap can help prevent someone following a legitimate employee into a restricted area. With biometrics, employee smart IDs, or multifactor authentication being used, once the door is accessed by someone having the correct credentials, unauthorized people could still trail the legitimate person into the building or area.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

  • DDoS

spam

social engineering

anonymous keylogging

Answer explanation

Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, spam, and keylogging are all examples of software based security threats, not social engineering.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

adware

DDoS

phishing

social engineering

Answer explanation

Phishing, spyware, and social engineering are security attacks that collect network and user information. Adware consists, typically, of annoying popup windows. Unlike a DDoS attack, none of these attacks generate large amounts of data traffic that can restrict access to network services.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system?

Check for the latest OS patches and updates.

  • Document the problem and the procedures performed to solve it.

Talk with the user to determine the cause of the problem.

  • Gather information from a number of sources to clearly identify the problem.

Answer explanation

After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A system administrator has been asked to protect the sensitive data on the Windows 7 computers of all management employees. Which Windows feature can be used to selectively encrypt individual files within the user accounts of each manager?​

  • BitLocker

  • EFS

TPM

Windows Update

Answer explanation

Encrypting File System (EFS) is a Windows feature that can be used to encrypt files and folders linked to a specific user account. BitLocker is a Windows feature that can be used to encrypt the entire hard drive volume. TPM is a specialized chip on the motherboard that stores information specific to the computer system such as encryption keys, digital certificates, and passwords. Windows Update is used to update the operating system, not to encrypt data.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?