ITF+ Module 5 Security Concepts

ITF+ Module 5 Security Concepts

9th - 12th Grade

35 Qs

quiz-placeholder

Similar activities

Q1M2 Test

Q1M2 Test

10th Grade

30 Qs

Ch. 10.2 - 10.4

Ch. 10.2 - 10.4

9th - 12th Grade

30 Qs

MTA - Windows Operating System

MTA - Windows Operating System

9th - 12th Grade

37 Qs

Year 7 Computer Science Baseline

Year 7 Computer Science Baseline

KG - Professional Development

31 Qs

OXFORD - A LEVEL - NETWORKS

OXFORD - A LEVEL - NETWORKS

12th Grade

30 Qs

Summative Test - Network Security

Summative Test - Network Security

10th Grade

40 Qs

Chapter 16 Practice Test

Chapter 16 Practice Test

7th Grade - University

30 Qs

IGCSE ICT Chapter 8 - Safety & Security

IGCSE ICT Chapter 8 - Safety & Security

9th - 10th Grade

35 Qs

ITF+ Module 5 Security Concepts

ITF+ Module 5 Security Concepts

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Qiyu Luo

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What security concern is snooping most affected by?
Confidentiality
Integrity
Availability
Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

An attacker has used a rogue access point to intercept traffic passing between wireless clients and the wired network segment. What type of attack is this?
A Denial of Service (DoS) attack
A replay attack
An impersonation attack
A Man-in-the-Middle (MitM) attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What type of access mechanism is MOST vulnerable to a replay attack?
Use of multi-factor authentication
Use of a complex password
Use of a token generated by software
Use of biometrics

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which specific attack uses a botnet to threaten availability?
Replay
Power outage
Man-in-the-Middle (MitM)
Distributed Denial of Service (DDoS)

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

In considering availability concerns, what use might a lockable faceplate on a server-class computer be?
It may prevent a natural disaster from damaging the hardware and corrupting the data.
It may prevent the computer or server from overheating and shutting down.
It may prevent a hacker from obtaining remote unauthorized network access.
It may prevent the user from switching the machine on/off or accessing removable drives and ports.

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What impact is presented when users reveal their passwords to technical support staff?
It exposes the passwords to brute-force attacks from malicious hackers.
It provides technical support staff with access to the user's personal files stored on the network.
It exposes users to social engineering attacks that try to gather login credentials for malicious use.
It prevents the user from needing to change a password following the password history component of the policy.

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is NOT a method that a malicious person can use to masquerade as someone else when using email or Instant Messaging?
Overwhelm the server with a Denial of Service (DoS)
Stealing a user's login information
Using an unattended computer that is still logged in
Using malware such as a Trojan

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?