Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
1.Which of the following are activities that a hacker might attempt?
CorrectIncorrect -
Question 2 of 20
2. Question
2.You have invented a new toy that will be the most popular toy for children this year. What type of intellectual property protection should you get?
CorrectIncorrect -
Question 3 of 20
3. Question
3.Which of the following are threats to data availability? (Choose two.)
CorrectIncorrect -
Question 4 of 20
4. Question
4.What is the name of an application that appears to look like a helpful application but instead does harm to your computer?
CorrectIncorrect -
Question 5 of 20
5. Question
5.Someone was recently caught sifting through your company’s trash looking for confidential
information. What is this an example of?
CorrectIncorrect -
Question 6 of 20
6. Question
6.You are implementing multifactor security on a computer. Which of the following is not a valid factor?
CorrectIncorrect -
Question 7 of 20
7. Question
7.You have been asked to lead a class on preventing social engineering. What two topics should you be sure to cover? (Choose two.)
CorrectIncorrect -
Question 8 of 20
8. Question
8.On a network, a user needs to access three different types of systems. However, they are required to enter their username and password only when they initially log in. Which term best explains this?
CorrectIncorrect -
Question 9 of 20
9. Question
9.You receive an email from your bank telling you that your account has been compromised
and you need to validate your account details or else your account will be closed. You are
supposed to click a link to validate your information. What is this an example of?
CorrectIncorrect -
Question 10 of 20
10. Question
10.If you are concerned about confidentiality of client records, which of the following should
you be on the lookout for? (Choose two.)
CorrectIncorrect -
Question 11 of 20
11. Question
11.What is it called when a co-worker sitting next to you always seems to look your way when you try to enter your user ID and password to log onto the network?
CorrectIncorrect -
Question 12 of 20
12. Question
12.Which of the following security terms best describes the process of determining what a user can do with a resource?
CorrectIncorrect -
Question 13 of 20
13. Question
13.Which of the following operating systems are susceptible to viruses?
CorrectIncorrect -
Question 14 of 20
14. Question
14.A network administrator wants to enable accounting on her network. Which options should she use? (Choose two.)
CorrectIncorrect -
Question 15 of 20
15. Question
15.Which of the following can be used as an authentication factor and for nonrepudiation?
CorrectIncorrect -
Question 16 of 20
16. Question
16.Your manager is concerned about potential wiretapping on the wireless network. What type of concern is this?
CorrectIncorrect -
Question 17 of 20
17. Question
17.To log into a network, you must use a password and answer a security question. What is this an example of?
CorrectIncorrect -
Question 18 of 20
18. Question
18.Which of the following threats can directly impact data integrity on a network? (Choose two.)
CorrectIncorrect -
Question 19 of 20
19. Question
19.Your network’s security model requires that the administrator configure permissions based on a user’s job within the company. What does this describe?
CorrectIncorrect -
Question 20 of 20
20. Question
20.Esther has just written a new book, and she wants to ensure that she owns the intellectual
property. Which type of protection should she get?
CorrectIncorrect