W.T.F Chapter 9 Quiz IT Essentials

20 Questions | Attempts: 94
Share

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

This is a quiz for all the computer lovers out there. If you want to test your knowledge on this particular bunch of random IT facts take this quiz and find out how vast your knowledge is.


Questions and Answers
  • 1. 

    A virus is a self ___program (1 word)

    • A.

      Replicating

    • B.

      System update

    • C.

      Trojan horse

    • D.

      Server PAC

    Correct Answer
    A. Replicating
  • 2. 

    Computer and network security help to keep data and equipment

    • A.

      Functioning and provide access only to appropriate people.

    • B.

      Everyone in an organization

    • C.

      Everyone who want's to take a look

    • D.

      Miss Windows Only

    Correct Answer
    A. Functioning and provide access only to appropriate people.
  • 3. 

    Theft, loss, network intrusion, and physical damage are some of the ways a network or computer can be harmed.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 4. 

    To successfully protect computers and the network, a technician must understand both types of threats to computer security: Physical  – Events or attacks that remove, corrupt, deny access, allow access, or steal information

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This is Data – Events or attacks that remove, corrupt, deny access, allow access, or steal information

    Rate this question:

  • 5. 

    To successfully protect computers and the network, a technician must understand both types of threats to computer security: Data  – Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This is Physical – Events or attacks that remove, corrupt, deny access, allow access, or steal information

    Rate this question:

  • 6. 

    A worm is a self-replicating program that is harmful to (1 word)

    Correct Answer
    networks
    Networks
    Computers
    Computers
    system
    System
  • 7. 

    A Trojan is technically a worm. The Trojan does not need to be attached to other ___ Instead, a Trojan threat is hidden in ____ that appears to do one thing, and yet behind the scenes it does another.

    Correct Answer
    Software
    software
  • 8. 

    Attacks that stop a user using programs are called ___ (3 word's  or abreviacion)

    Correct Answer
    denial of service
    dos
    DOS
    Dos
    Denial of service
  • 9. 

    Spoofing – Gains access to resources on devices by pretending to be a trusted computer

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 10. 

    DNS poisoning – Changes the DNS records on a system to point to True servers where the data is protected

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    DNS poisoning – Changes the DNS records on a system to point to "false" servers where the data is "recorded"

    Rate this question:

  • 11. 

    DDoS – Uses "(one word)" to make tracing the origin of the DoS attack difficult to locate

    Correct Answer
    zombies
    Zombies
  • 12. 

    Hardware destruction is the process of removing sensitive data from hardware and software before recycling or discarding. Hard drives should be fully erased to prevent the possibility of recovery using specialized software. Three methods are commonly used to either destroy or recycle data and hard drives:

    • A.

      Data wiping

    • B.

      Hard drive destruction

    • C.

      Giving it to a friend

    • D.

      Hard drive recycling

    • E.

      Reinstalling the O/S

    Correct Answer(s)
    A. Data wiping
    B. Hard drive destruction
    D. Hard drive recycling
  • 13. 

    There are several methods of physically protecting computer equipment,(pick 3)

    • A.

      Control access to facilities

    • B.

      Fit equipment with security screws.

    • C.

      Install anti-virus

    • D.

      Install physical alarms triggered by motion-detection sensors

    • E.

      Throw it away

    Correct Answer(s)
    A. Control access to facilities
    B. Fit equipment with security screws.
    D. Install physical alarms triggered by motion-detection sensors
  • 14. 

    Passwords should contain 

    • A.

      A mixture of letters and numbers so that they cannot easily be broken.

    • B.

      A mixture of letters so that they cannot easily be broken.

    • C.

      A mixture of numbers so that they cannot easily be broken.

    Correct Answer
    A. A mixture of letters and numbers so that they cannot easily be broken.
  • 15. 

    A smart card is a small plastic card, about the size of a credit card, with a small __ embedded in it. 

    Correct Answer
    chip
    Chip
    salt
    :)
  • 16. 

    Frequency of backups – Backups can take a long time. Sometimes it is easier to make a full backup yearly  or and then do frequent partial backups of any data that has changed since the last yearly full backup

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Frequency of backups – Backups can take a long time. Sometimes it is easier to make a full backup monthly or weekly, and then do frequent partial backups of any data that has changed since the last full backup

    Rate this question:

  • 17. 

    (WEP) stand's for 

    Correct Answer
    Wired Equivalent Privacy
    wired equivalent privacy
  • 18. 

      Computer technicians must be able to analyze a security threat and determine the appropriate method to protect assets and repair damage. This process is called

    Correct Answer
    troubleshooting
  • 19. 

    Viruses and worms are common threats that attack 

    Correct Answer
    data
  • 20. 

    Security threats can come from___ or ____of an organization.

    Correct Answer
    inside outside
    outside inside
    Outside inside
    Inside outside

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 23, 2012
    Quiz Created by
    Quinnymanchester
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.