W.T.F Chapter 9 Quiz IT Essentials

20 Questions | Attempts: 94
Please wait...
Question 1 / 21
🏆 Rank #--
Score 0/100

1. A worm is a self-replicating program that is harmful to (1 word)

Submit
Please wait...
About This Quiz
IT Essentials Quizzes & Trivia

This is a quiz for all the computer lovers out there. If you want to test your knowledge on this particular bunch of random IT facts take this quiz and find out how vast your knowledge is.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. A Trojan is technically a worm. The Trojan does not need to be attached to other ___ Instead, a Trojan threat is hidden in ____ that appears to do one thing, and yet behind the scenes it does another.

Submit

3. Attacks that stop a user using programs are called ___ (3 word's  or abreviacion)

Submit

4. DDoS – Uses "(one word)" to make tracing the origin of the DoS attack difficult to locate

Submit

5. A smart card is a small plastic card, about the size of a credit card, with a small __ embedded in it. 

Submit

6. (WEP) stand's for 

Submit

7.  
Computer technicians must be able to analyze a security threat and determine the appropriate method to protect assets and repair damage. This process is called

Submit

8. Viruses and worms are common threats that attack 

Submit

9. Security threats can come from___ or ____of an organization.

Submit

10. Passwords should contain 

Submit

11. Computer and network security help to keep data and equipment

Submit

12. Theft, loss, network intrusion, and physical damage are some of the ways a network or computer can be harmed.

Submit

13. A virus is a self ___program (1 word)

Submit

14. Spoofing – Gains access to resources on devices by pretending to be a trusted computer

Submit

15. There are several methods of physically protecting computer equipment,(pick 3)

Submit

16. To successfully protect computers and the network, a technician must understand both types of threats to computer security: Data  – Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring

Explanation

This is Physical – Events or attacks that remove, corrupt, deny access, allow access, or steal information

Submit

17.
Hardware destruction is the process of removing sensitive data from hardware and software before recycling or discarding. Hard drives should be fully erased to prevent the possibility of recovery using specialized software. Three methods are commonly used to either destroy or recycle data and hard drives:

Submit

18. DNS poisoning – Changes the DNS records on a system to point to True servers where the data is protected

Explanation

DNS poisoning – Changes the DNS records on a system to point to "false" servers where the data is "recorded"

Submit

19. Frequency of backups – Backups can take a long time. Sometimes it is easier to make a full backup yearly  or and then do frequent partial backups of any data that has changed since the last yearly full backup

Explanation

Frequency of backups – Backups can take a long time. Sometimes it is easier to make a full backup monthly or weekly, and then do frequent partial backups of any data that has changed since the last full backup

Submit

20. To successfully protect computers and the network, a technician must understand both types of threats to computer security: Physical  – Events or attacks that remove, corrupt, deny access, allow access, or steal information

Explanation

This is Data – Events or attacks that remove, corrupt, deny access, allow access, or steal information

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A worm is a self-replicating program that is harmful to (1 word)
A Trojan is technically a worm. The Trojan does not need to be...
Attacks that stop a user using programs are called ___ (3 word's...
DDoS – Uses "(one word)" to make tracing the...
A smart card is a small plastic card, about the size of a credit card,...
(WEP) stand's for 
 ...
Viruses and worms are common threats that attack 
Security threats can come from___ or ____of an organization.
Passwords should contain 
Computer and network security help to keep data and equipment
Theft, loss, network intrusion, and physical damage are some of the...
A virus is a self ___program (1 word)
Spoofing – Gains access to resources on devices by...
There are several methods of physically protecting computer...
To successfully protect computers and the network, a technician must...
Hardware destruction is the process of removing sensitive data from...
DNS poisoning – Changes the DNS records on a system to...
Frequency of backups – Backups can take a long time....
To successfully protect computers and the network, a technician must...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!