Search Header Logo
1002 Chap. 06 Securing Devices and Data

1002 Chap. 06 Securing Devices and Data

Assessment

Presentation

Instructional Technology, Computers

Professional Development

Medium

Created by

Brandon Dewater

Used 1+ times

FREE Resource

41 Slides • 16 Questions

1

1002 Chap.06: Securing Devices and Data

By B. Dewater

2

media

3

media

4

media

5

media

6

media

7

media

8

media

9

media

10

media

11

media

12

media

13

media

14

media

15

Multiple Select

BitLocker and EFS are available in what editions of Windows 10? Select all that apply.

1

Home

2

Professional

3

Enterprise

4

Education

16

Multiple Choice

_____ is a functionality of Windows that automatically runs an executable file on a removable media, such as a USB flash drive.

1

FastRun

2

AutoExecute

3

AutoRun

4

FastPlay

17

Multiple Choice

Which Windows feature is used to encrypt an entire physical hard drive?

1

EFS

2

BitLocker

3

NTFS

4

TPM

18

Multiple Choice

Which Windows feature is used to encrypt individual files and folders, NOT the drive?

1

EFS

2

BitLocker

3

NTFS

4

TPM

19

Multiple Choice

Windows uses __________ to store passwords and certificates used to access other Windows computers and their shared resources as well as on websites.

1

Credential Manager

2

Security Manager

3

Password Manager

4

Certificate Manager

20

Multiple Select

BitLocker operates in which modes? Select all that apply.

1

Transparent mode

2

USB key mode

3

User authentication mode

4

Directive mode

21

media

22

media

23

media

24

media

25

media

26

media

27

Multiple Choice

What is name of an encryption tool that can be used for personal files and folders and the files become unreadable to other users?

1

EFS

2

BitLocker

3

BitLocker-To-Go

28

media

29

media

30

media

31

media

32

media

33

media

34

Multiple Choice

To lower hardware costs, a business has issued a policy where employees need to bring their own phone and/or laptop to do their work. What is this policy called?

1

Bring Your Own Device (BYOD)

2

Bring Your Own Mobile (BYOM)

3

Bring Your Own Computer (BYOC)

4

Bring Your Own System (BYOS)

35

Multiple Choice

If setup ahead of time, iOS and Android devices can both be tracked with GPS and other network techniques in case of theft.

1

True

2

False

36

Multiple Choice

Since iOS and Android devices get their apps from a central app store, they are immune from malware infections.

1

True

2

False

37

media

38

media

39

media

40

media

41

media

42

media

43

media

44

media

45

media

46

media

47

media

48

media

49

media

50

media

51

Multiple Choice

The ___________ model refers to having multiple layers of protection and security for your data.

1

Defense in Depth

2

Access Control Lists

3

Onion

4

Castle Walls

52

Multiple Choice

Jane has noticed a few oddities with her desktop computer. Recently she has noticed that the programs seem to take longer to load, her email doesn’t open, and she gets popups saying she needs to scan her computer for viruses. What seems to be the problem with Jane’s computer?

1

She likely has a malware infection

2

Her antivirus is turned off

3

She has too many programs open at the same time

4

Her network speed is too slow

53

Multiple Choice

An office computer connected to a large local network is suspected to be infected with a worm. The computer normally has access to both the Internet and local shares, including shared network drives. How should the computer be handled?

1

Log off the computer to prevent further infections

2

Immediately disconnect it from the network and quarantine

3

Run an anti-malware scan on the local computer

4

Disable Interact access but keep it connected to local shares

54

Multiple Choice

Tom works at the US Department of Defense. He is tasked with removing some out-of-service hard disks to be replaced with newer SSDs. The drives previously held top secret information. What should Tom do with the old drives?

1

Wipe them several times and physically destroy them

2

Toss them in the dumpster

3

Wipe them once or twice and donate them to a computer refurb center

4

Do nothing and put them away in the storage room

55

Multiple Select

Alice is setting up a wireless router at her apartment. She wants to keep it private from other tenants and only give access to her friends when they come by. What could she do to secure her wireless network? Select all that apply.

1

Change the default SSID

2

Disable SSID broadcast

3

Let her friends use the guest network

4

Enable MAC filtering

56

Multiple Choice

Data destruction services can provide a certificate of destruction as proof of state and local regulation compliance.

1

True

2

False

57

media

1002 Chap.06: Securing Devices and Data

By B. Dewater

Show answer

Auto Play

Slide 1 / 57

SLIDE

Discover more resources for Instructional Technology