Policies and Procedures in IT Infrastructure

Policies and Procedures in IT Infrastructure

Professional Development

25 Qs

quiz-placeholder

Similar activities

Computer Science

Computer Science

Professional Development

20 Qs

PCSSA Review - Mobility, Reporting, Security, Data Modeling

PCSSA Review - Mobility, Reporting, Security, Data Modeling

Professional Development

22 Qs

Part 2.3

Part 2.3

Professional Development

20 Qs

Chapter 1 and 2 Quiz

Chapter 1 and 2 Quiz

Professional Development

20 Qs

1.1 and 1.2 Quiz Cyber

1.1 and 1.2 Quiz Cyber

Professional Development

29 Qs

MTA - Microsoft Operating Systems Review 2

MTA - Microsoft Operating Systems Review 2

10th Grade - Professional Development

20 Qs

Testout ITF Databases

Testout ITF Databases

9th Grade - Professional Development

20 Qs

BDA Unit Test II

BDA Unit Test II

Professional Development

20 Qs

Policies and Procedures in IT Infrastructure

Policies and Procedures in IT Infrastructure

Assessment

Quiz

Computers

Professional Development

Hard

Created by

My Account

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a clear desk policy?

Improve employee productivity

Reduce the risk of unauthorized access or visual hacking

Organize workstations

Allow quick access to files

Answer explanation

The purpose of a clear desk policy is primarily to reduce the risk of unauthorized access or visual hacking. By keeping workspaces tidy, sensitive information is less likely to be seen or accessed by unauthorized individuals.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does data encryption at rest mean?

Encrypting data only during network transfer

Protecting stored data by converting it into unreadable formats

Deleting old data from the system

Encrypting data only when files are accessed

Answer explanation

Data encryption at rest refers to protecting stored data by converting it into unreadable formats. This ensures that even if unauthorized access occurs, the data remains secure and inaccessible without the proper decryption key.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of authentication?

Backing up a file

Scanning a fingerprint to unlock a device

Encrypting a hard drive

Monitoring network traffic

Answer explanation

Scanning a fingerprint to unlock a device is an example of authentication, as it verifies the identity of a user. The other options involve data management or security but do not confirm user identity.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol ensures secure data transmission over the internet?

HTTP

FTP

HTTPS

SMTP

Answer explanation

HTTPS (HyperText Transfer Protocol Secure) ensures secure data transmission over the internet by encrypting the data exchanged between the user and the server, unlike HTTP, FTP, and SMTP which do not provide this level of security.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool can be used to enforce multi-factor authentication (MFA)?

Password manager

Authenticator app

Antivirus software

Network proxy

Answer explanation

An authenticator app generates time-based one-time passwords (TOTPs) for multi-factor authentication (MFA), enhancing security by requiring a second form of verification beyond just a password.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of confidentiality in the CIA Triad?

Ensuring data is available 24/7

Restricting access to authorized users

Answer explanation

The primary goal of confidentiality in the CIA Triad is to restrict access to authorized users, ensuring that sensitive information is protected from unauthorized access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool can help maintain the integrity of data?

Firewall

Hashing algorithms

VPN

RAID

Answer explanation

Hashing algorithms help maintain data integrity by generating a unique hash value for data. If the data changes, the hash value will also change, indicating potential tampering. This makes hashing essential for verifying data integrity.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?