placeholder image to represent content

OSE Theory Revision 17 - Corporate IT Security

Quiz by Christian Mo Zelin

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1

    A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?

    acceptable use policy

    incident handling policy

    remote access policy

    identification and authentication policy

    60s
  • Q2

    Which action could be used to determine if a host is compromised and flooding traffic onto the network?

    Unseat and then reconnect the hard drive connectors on the host.

    Examine the Device Manager on the host for device conflicts.

    Disconnect the host from the network.

    Check the host hard drive for errors and file system issues.

    60s
  • Q3

    A corporate employee has recently taken the mandated security awareness training and is wanting to use the correct security term. Which issue can occur when browsing the internet and is often initiated by the destination website?

    pop-up

    autorun

    phishing

    privacy screen

    60s
  • Q4

    When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?

    Trojan

    spyware

    adware

    ransomware

    60s
  • Q5

    A technician in a small business is configuring the local security policy for a computer. Which configuration setting would the technician use to require the user to change the password after 90 days?

    Enforce password history

    Password must meet complexity requirements

    Minimum password length

    Maximum password age

    60s
  • Q6

    Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

    stealth virus

    worm

    phishing

    adware

    60s
  • Q7

    A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)

    Users sort answers between categories
    Sorting
    60s
  • Q8

    Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)

    Users sort answers between categories
    Sorting
    60s
  • Q9

    When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

    Ensure that all applications are working.

    Ask what the problem is that the customer is experiencing.

    Disconnect the system from the network.

    Boot the system in Safe Mode.

    60s
  • Q10

    A corporate executive has asked the IT department to provide a solution to ensure data security of removable drives that are being taken off the premises. Which security solution should be recommended?

    VPN

    BitLocker

    TPM

    BitLocker To Go

    60s

Teachers give this quiz to your class