1) What can Firewalls help guard against? a) Password cracking b) Preventing computers on your network from accessing undesirable content on the internet c) Unauthorized network access from a hacker d) b & c 2) What is NOT in the four categories of multifactor authentication a) something you know b) something you have c) something you are d) somewhere you are  e) someone you know 3) What is a battery backup that a server plugs into a) USPS b) SSO c) UPS d) MITM 4) Which of the following is NOT Device Hardening Technique a) Enable a system password through the BIOS. b) Enable a screen saver password. c) “Ctrl+Shf+Del when you leave you seat” d) Keep software up to date. 5) What is a trademark? a) A symbol used for tradesmen b) A word, words or a symbol legally registered as representing a company or product c) A catchy phrase d) A mark used in the stock market 6) Where are Services found in Windows to manage Disabling Unused Services a) Task Manager. b) Computer Management. c) System Configuration. d) Control Panel. 7) What is the method of tracking what users did with their access? a) Authorization b) Biometrics c) Accounting d) GPS 8) Malware infections are one of the most common security risks that you will encounter. Which one is NOT one of the Four main classes of applications a) Antivirus software defends against viruses, worms, and Trojan horses. b) Hardware Firewalls block potentially dangerous network traffic. c) Antispyware software defends against adware and spyware. d) Antispam software reduces the amount of junk email you receive. 9) When someone flood a server with a multitude of illegitimate connections requests so its unable to respond to legitimate requests. a) Service Outage b) DOS c) DDOS d) Power Outage 10) What is copyright? a) Someone who writes copy b) The ability to copy things correctly c) Protects original works of authorship such as songs, plays, movies, and computer applications d) Your right to copy anything you want 11) What makes it so a person can't deny that an event took place? a) Integrity b) Receipt c) Denial of Service d) Non-Repudiation 12) Method of circumventing the normal security system on a computer? a) rootkit b) exploit c) backdoor d) keylogger 13) What is a patent? a) Signifies ownership of an invention for a limited time, such as a machine, process, or formula b) Cutting edge technology c) A toy d) Proof you are a genius 14) What does it mean for a hacker to have a backdoor? a) They have a guaranteed escape route b) They have a way into your system without using a password c) They can just walk in the backdoor of your company d) They can open the back of your computer case 15) What algorithm or element uniquely identifies malware? a) Its activity b) Its level of invasiveness c) Its color d) Its signature 16) What is a common info security framework that focus on integrity, availability, confidentiality, known as? a) FDA b) CIA triad c) FBI Triad d) Chinese Triad 17) File encryption in Windows is considered an attribute of the file system. Which versions of Windows does NOT support NTFS a) Windows 7 Ultimate. b) Windows 11 Professional. c) Windows 10 Home. d) Windows 8 Enterprise.

Security

על ידי

לוח תוצאות מובילות

סגנון חזותי

אפשרויות

החלף תבנית

האם לשחזר את הנתונים שנשמרו באופן אוטומטי: ?