6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Professional Development

25 Qs

quiz-placeholder

Similar activities

ITF+ Ch10, Security Best Practices

ITF+ Ch10, Security Best Practices

Professional Development

20 Qs

Part 2.3

Part 2.3

Professional Development

20 Qs

1.1 and 1.2 Quiz Cyber

1.1 and 1.2 Quiz Cyber

Professional Development

29 Qs

Computer Forensics Assessment

Computer Forensics Assessment

Professional Development

20 Qs

E-Commerce Revision 1

E-Commerce Revision 1

Professional Development

30 Qs

Day 4 - Network & Security I - Day 4 - Review

Day 4 - Network & Security I - Day 4 - Review

Professional Development

30 Qs

CompTIA A+ Security

CompTIA A+ Security

Professional Development

30 Qs

CISSP CH1 Risk Management

CISSP CH1 Risk Management

Professional Development

28 Qs

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Assessment

Quiz

Computers

Professional Development

Easy

Created by

The I.T.Factor

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following practices aims to prevent unauthorized access to information?

Data replication

Encryption

Load balancing

Traffic filtering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes intercepting private communication without consent?

Snooping

Eavesdropping

Wiretapping

Social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of integrity in the CIA model?

Ensuring data remains accessible

Ensuring data is accurate and unaltered

Protecting data from unauthorized access

Backing up data regularly

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can compromise data integrity by altering communication between two parties?

Man-in-the-Middle attack

Phishing attack

Replay attack

Social engineering attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique ensures information and systems are accessible to authorized users when needed?

Encryption

Load balancing

Firewalls

Hash functions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which software is essential for detecting and removing malicious threats from a device?

Firewall

Antivirus/Anti-malware

Load balancer

Password manager

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why should default passwords on devices be changed immediately?

To enable encryption

To prevent unauthorized access

To improve connection speed

To enable automatic updates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?