0

IT Essentials Online Quiz

Description: IT Essentials funny Quiz
Number of Questions: 11
Created by:
Tags: information technology
Attempted 0/10 Correct 0 Score 0

What is the primary goal of a DoS attack?

  1. to facilitate access to external networks

  2. to stop the target server from being able to handle requests

  3. to scan the data on the target server

  4. to obtain all addresses in the address book in the server


Correct Option: B

What does a malware detection program look for when running a scan?

  1. a service pack

  2. mirror sites

  3. patches that prevent  new virus or worm from making a attack

  4. patterns in the programing code of the software ona computer


Correct Option: D

Which methods would be acceptable to wipe data from a confidential hard drive?

  1. degaussing 

  2. drilling through the hard drive 

  3. formatting

  4. defragging


Correct Option: A

What is an example of the implementation of physical security?

  1. establishing personal firewalls on each computer 

  2. encrypting all sensitive data that is stored on the servers 

  3.  employees must use a card key when entering a secure area

  4. ensuring that all os and antivirus software is up to date


Correct Option: C

What is the purpose of a personal firewall on a computer?

  1. to protect the hardware against fire hazard 

  2. to filter the traffic that is moving in and out of the PC 

  3.  to protect the computer from viruses and malware

  4.  to increase the speed of the Internet connection


Correct Option: B

Which action could be used to determine ifa host is compromised and flooding traffic the network

  1. Unseat and reconnect the hard drive connectors on the host.

  2. Disconnect the host from the network

  3. Check the host hard drive for errors and file system issues.

  4. Examine the Device Manager on the host for device conflicts.


Correct Option: B

Which type of program causes ads to appear on the desktop without any user intervention?

  1. adware

  2. spyware

  3. stealth virus

  4. Trojan horse


Correct Option: A

What is spoofing?

  1. An attack that uses TCP/IP messages to flood ports

  2. An attack where computers use false IP and MAC addresses

  3. A malicious software to 

  4. The use of personal information to trick users


Correct Option: B

WEP and WPA are examples of what network security component?

  1. Wireless communication protocols

  2. Passwords

  3. Wireless encryption standard

  4. Ethernet network security protocols


Correct Option: C

What is a virus?

  1. A program written with malicious intent

  2. A self replicating software.

  3. A network attack disguised as useful software. 

  4. Software used to make your computer sick


Correct Option: A
- Hide questions