Policies and Procedures in IT Infrastructure

Policies and Procedures in IT Infrastructure

Professional Development

25 Qs

quiz-placeholder

Similar activities

Introduction to Machine Learning

Introduction to Machine Learning

University - Professional Development

20 Qs

Microsoft Excel

Microsoft Excel

KG - Professional Development

20 Qs

Soal Posttest TKP (TIK)

Soal Posttest TKP (TIK)

KG - Professional Development

20 Qs

UH INFORMATIKA BAB BERFIKIR KOMPUTASIONAL

UH INFORMATIKA BAB BERFIKIR KOMPUTASIONAL

Professional Development

20 Qs

Salesforce Developer

Salesforce Developer

Professional Development

20 Qs

แบบทดสอบการออกแบบสื่อสิ่งพิมพ์ ม.5

แบบทดสอบการออกแบบสื่อสิ่งพิมพ์ ม.5

Professional Development

20 Qs

MT - Basic FTTH

MT - Basic FTTH

1st Grade - Professional Development

20 Qs

Nintendo Wii

Nintendo Wii

3rd Grade - Professional Development

20 Qs

Policies and Procedures in IT Infrastructure

Policies and Procedures in IT Infrastructure

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

My Account

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a clear desk policy?

Improve employee productivity

Reduce the risk of unauthorized access or visual hacking

Organize workstations

Allow quick access to files

Answer explanation

The purpose of a clear desk policy is primarily to reduce the risk of unauthorized access or visual hacking. By keeping workspaces tidy, sensitive information is less likely to be seen or accessed by unauthorized individuals.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does data encryption at rest mean?

Encrypting data only during network transfer

Protecting stored data by converting it into unreadable formats

Deleting old data from the system

Encrypting data only when files are accessed

Answer explanation

Data encryption at rest refers to protecting stored data by converting it into unreadable formats. This ensures that even if unauthorized access occurs, the data remains secure and inaccessible without the proper decryption key.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of authentication?

Backing up a file

Scanning a fingerprint to unlock a device

Encrypting a hard drive

Monitoring network traffic

Answer explanation

Scanning a fingerprint to unlock a device is an example of authentication, as it verifies the identity of a user. The other options involve data management or security but do not confirm user identity.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol ensures secure data transmission over the internet?

HTTP

FTP

HTTPS

SMTP

Answer explanation

HTTPS (HyperText Transfer Protocol Secure) ensures secure data transmission over the internet by encrypting the data exchanged between the user and the server, unlike HTTP, FTP, and SMTP which do not provide this level of security.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool can be used to enforce multi-factor authentication (MFA)?

Password manager

Authenticator app

Antivirus software

Network proxy

Answer explanation

An authenticator app generates time-based one-time passwords (TOTPs) for multi-factor authentication (MFA), enhancing security by requiring a second form of verification beyond just a password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of confidentiality in the CIA Triad?

Ensuring data is available 24/7

Restricting access to authorized users

Answer explanation

The primary goal of confidentiality in the CIA Triad is to restrict access to authorized users, ensuring that sensitive information is protected from unauthorized access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool can help maintain the integrity of data?

Firewall

Hashing algorithms

VPN

RAID

Answer explanation

Hashing algorithms help maintain data integrity by generating a unique hash value for data. If the data changes, the hash value will also change, indicating potential tampering. This makes hashing essential for verifying data integrity.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?