Information & Computer Security Training Final Exam

Free Practice Test Instructions:

Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!

Question 1 1. Which of the following is an example of a requirement set forth in an acceptable use policy?

Question 2 2. What is criteria commonly defined in a data breach policy?

Question 3 3. A good definition of a worm is?

Question 4 4. What does CIA in the CIA triad stand for in computer and information security?

Question 5 5. Database security management:

Question 6 6. What should users keep in mind about their devices?

Question 7 7. The term 'rooting' applies to which of these?

Question 8 8. Which of the following is true about mobile malware?

Question 9 9. What is the one sure way to eliminate any and all malware from any device?

Question 10 10. How will a consumer notice malware at the end of the billing cycle?

Question 11 11. Your network security key protects your wireless network via the use of what two methods?

Question 12 12. Which of the following is NOT mitigated by Network Security?

Question 13 13. Which of the following is a characteristic of Network Security?

Question 14 14. Which of the following is NOT one of the core elements of network security?

Question 15 15. WPA2 Enterprise uses a _____ server for logins.

Register for a free trial

Are you a student or a teacher?

I am a student I am a teacher

Information & Computer Security Training Final Free Practice Test Instructions

Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!

Information & Computer Security Training  /  Computer Science Courses
Support