0% found this document useful (0 votes)
20 views

TLE 10 CSS Q2 Summative Test 2 Performance Task 2

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

TLE 10 CSS Q2 Summative Test 2 Performance Task 2

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

TLE 10 – Computer Systems Servicing

Quarter 2, Summative Test 2

Name: __________________________________________ Grade & Section: __________________

Test I - Multiple Choice


Instruction: Write the letter that corresponds your answer on the space provided before the number.

______ 1. What type of threats attacks that steal, damages, or destroy equipment such as server?
a. Physical b. Chemical c. Mental d. Biological

______ 2. What type of threats removes, corrupts denies access to, allows access to or steals information?
a. Data b. Information c. Software d. Program

______ 3. What potential threat is referred to employees who have access to data, equipment and the
network?
a. External b. Inner c. Internal d. Outer

______ 4. What internal threat is referred when an employee intends to cause damage?
a. Incidentalb. Malicious c. Crucial d. Accidental

______ 5. What internal threat is referred when the user damages data or equipment unintentionally?
a. Incidentalb. Malicious c. Crucial d. Accidental

______ 6. What potential threat is referred to users outside an organization who do not have authorized
access to the network or resources?
a. External b. Inner c. Internal d. Outer

______ 7. What external threat uses available resources such as password or scripts to gain access?
a. Unconstruction b. Unstructured c. Construction d. Structured

______ 8. What external threat uses code to access operating system and software?
a. Unconstruction b. Unstructured c. Construction d. Structured

______ 9. What program is created with malicious intent and send by attackers?
a. Games b. Software c. Virus d. App

______ 10. What self-replicating program that is harmful to computer network?


a. Worm b. Pest c. Insect d. Bugs

______ 11. What is referred to a way of protecting a computer from intrusion through the ports?
a. Network b. Firewall c. Anti-spam d. Antivirus

______ 12. What is referred to a data being transported on a network?


a. Traffic b. Collision c. Circulation d. Transportation

______ 13. What type of wave does the traffic flows through in a wireless network?
a. Light Waves b. S-Waves c. Radio Waves d. Microwaves

______ 14. What was the first generation security standard for wireless?
a. WAP b. WPA c. LEAP d. WEP

______ 15. What type of signal which an attacker can access data travels?
a. Cable Signal b. Wifi Signal c. TV Signal d. Radio Signal

______ 16. What wireless security protocol created by Cisco to address the weakness of WEP and WPA?
a. LEAP b. WAP c. WTLS d. WNIC

______ 17. What wireless security created as a temporary solution until 802.11 was fully implemented?
a. WPA b. LEAP c. WAP d. WEP
______ 18. What wireless security is an enhanced encryption protocol combining a 104 bit key and 24 bit
initialization vector?
a. WEP 128 b. WEP 64 c. WEP 256 d. WEP 512

______ 19. What wireless security could be exploited because of an encryption key that was vulnerable to
decoding?
a. WEP 128 b. WEP 64 c. WEP 256 d. WEP 512

______ 20. What security layer is used in mobile device that employ the wireless application protocol?
a. WPA b. LEAP c. WTLS d. WNIC

Good Luck!!!
Sir Lance…..

TLE 10 – Computer Systems Servicing


Quarter 2, Performance Task 2
Instruction: Do this performance task in a long size bond paper. Do not forget to write you name,
Year and Section, TLE Specialization, Quarter number and Performance Task number.
1. Draw at least 10 Antivirus Logo and give description of each logo.
2. Enumerate the Steps to Enable Firewall for Windows XP.

RUBRICS IN ASSESSING YOUR OUTPUT


Performace Level (Points)
Criteria
5 points 3 points 1 point

Less than10 Less than 5


Drawing of Antivirus Logo 10 Antivirus Logo
Antivirus Logo were Antivirus Logo were
and describing of each were drawn and
drawn and drawn and
logo described.
described. described.

All 6 steps to enable Less than 6 steps to Less than 3 steps to


Enumeration of the Steps
firewall for Windows enable firewall for enable firewall for
to Enable Firewall for
XP were Windows XP were Windows XP were
Window XP
enumerated. enumerated. enumerated.

Readable but
Output is very neat Readable but has
Neatness of work contains some
and readable many erasures
erasures

Output submitted on Output submitted Output submitted


Timeliness or before December after December 16, beyond December
16, 2021 2021 23, 2021

- 2-

You might also like