Security & Privacy
Critical IT Thinking
100

This security measure requires a second form of verification, like a text message or authentication app, in addition to your password.

What is two-factor authentication (2FA)?

100

This is a decision making framework often used in IT to evaluate potential solutions by considering criteria such as feasibility, cost, and risk.

What is Cost-Benefit Analysis?
200

This type of software is used to block unauthorized access to a network or computer system.

What is a firewall?

200

This process is essential for identifying vulnerabilities in IT systems and addressing potential security threats.

What is Risk Assessment?

300

This type of attack is when a malicious actor intercepts communication between two parties without their knowledge.

What is a Man-in-the-Middle (MITM) attack?

300

This type of thinking helps IT professionals avoid biased judgments by considering multiple perspectives and solutions.

What is Critical Thinking?

400

This term describes software that secretly collects and transmits data from a device without the user’s consent.

What is spyware?

400

The principle involves breaking down complex problems into smaller, manageable parts to better understand and solve them in IT projects.

What is Decomposition?

500

A software vulnerability that hackers can exploit to gain unauthorized access or cause harm is commonly known as this.

What is a zero-day exploit?

500

A user calls in and says their computer is running extremely slow. They mention it’s been happening for a few days. They’ve already restarted it and closed all open applications. What would be your next steps to troubleshoot?

What is to check Task Manager for high CPU or memory usage, check for disk space issues, run a malware scan, and look for unnecessary startup programs?