ITF+ Module 5 Security Concepts

ITF+ Module 5 Security Concepts

9th - 12th Grade

35 Qs

quiz-placeholder

Similar activities

Soal Latihan

Soal Latihan

11th Grade

30 Qs

Y9 Computing Test - Phase 1

Y9 Computing Test - Phase 1

8th - 11th Grade

40 Qs

Sistemas de Archivos: operaciones

Sistemas de Archivos: operaciones

11th Grade

40 Qs

98-368 Mobility and Devices Fundamentals Study Guide

98-368 Mobility and Devices Fundamentals Study Guide

9th - 12th Grade

40 Qs

SOAL PAS 2018 - Teknik Mikroprosessor & Mikrokontroller XD TEI

SOAL PAS 2018 - Teknik Mikroprosessor & Mikrokontroller XD TEI

10th Grade

40 Qs

SOAL PERBAIKAN PAS TLJ 2023

SOAL PERBAIKAN PAS TLJ 2023

11th Grade

30 Qs

GIỮA KỲ 2 -  TIN 8

GIỮA KỲ 2 - TIN 8

8th Grade - University

36 Qs

PowerPoint  2016

PowerPoint 2016

7th Grade - University

40 Qs

ITF+ Module 5 Security Concepts

ITF+ Module 5 Security Concepts

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Qiyu Luo

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What security concern is snooping most affected by?

Confidentiality
Integrity
Availability
Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

An attacker has used a rogue access point to intercept traffic passing between wireless clients and the wired network segment. What type of attack is this?

A Denial of Service (DoS) attack
A replay attack
An impersonation attack
A Man-in-the-Middle (MitM) attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What type of access mechanism is MOST vulnerable to a replay attack?

Use of multi-factor authentication
Use of a complex password
Use of a token generated by software
Use of biometrics

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which specific attack uses a botnet to threaten availability?

Replay
Power outage
Man-in-the-Middle (MitM)
Distributed Denial of Service (DDoS)

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

In considering availability concerns, what use might a lockable faceplate on a server-class computer be?

It may prevent a natural disaster from damaging the hardware and corrupting the data.
It may prevent the computer or server from overheating and shutting down.
It may prevent a hacker from obtaining remote unauthorized network access.
It may prevent the user from switching the machine on/off or accessing removable drives and ports.

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What impact is presented when users reveal their passwords to technical support staff?

It exposes the passwords to brute-force attacks from malicious hackers.
It provides technical support staff with access to the user's personal files stored on the network.
It exposes users to social engineering attacks that try to gather login credentials for malicious use.
It prevents the user from needing to change a password following the password history component of the policy.

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is NOT a method that a malicious person can use to masquerade as someone else when using email or Instant Messaging?

Overwhelm the server with a Denial of Service (DoS)
Stealing a user's login information
Using an unattended computer that is still logged in
Using malware such as a Trojan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?