
1002 Chap. 06 Securing Devices and Data
Presentation
•
Instructional Technology, Computers
•
Professional Development
•
Medium
Brandon Dewater
Used 1+ times
FREE Resource
41 Slides • 16 Questions
1
1002 Chap.06: Securing Devices and Data
By B. Dewater
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Multiple Select
BitLocker and EFS are available in what editions of Windows 10? Select all that apply.
Home
Professional
Enterprise
Education
16
Multiple Choice
_____ is a functionality of Windows that automatically runs an executable file on a removable media, such as a USB flash drive.
FastRun
AutoExecute
AutoRun
FastPlay
17
Multiple Choice
Which Windows feature is used to encrypt an entire physical hard drive?
EFS
BitLocker
NTFS
TPM
18
Multiple Choice
Which Windows feature is used to encrypt individual files and folders, NOT the drive?
EFS
BitLocker
NTFS
TPM
19
Multiple Choice
Windows uses __________ to store passwords and certificates used to access other Windows computers and their shared resources as well as on websites.
Credential Manager
Security Manager
Password Manager
Certificate Manager
20
Multiple Select
BitLocker operates in which modes? Select all that apply.
Transparent mode
USB key mode
User authentication mode
Directive mode
21
22
23
24
25
26
27
Multiple Choice
What is name of an encryption tool that can be used for personal files and folders and the files become unreadable to other users?
EFS
BitLocker
BitLocker-To-Go
28
29
30
31
32
33
34
Multiple Choice
To lower hardware costs, a business has issued a policy where employees need to bring their own phone and/or laptop to do their work. What is this policy called?
Bring Your Own Device (BYOD)
Bring Your Own Mobile (BYOM)
Bring Your Own Computer (BYOC)
Bring Your Own System (BYOS)
35
Multiple Choice
If setup ahead of time, iOS and Android devices can both be tracked with GPS and other network techniques in case of theft.
True
False
36
Multiple Choice
Since iOS and Android devices get their apps from a central app store, they are immune from malware infections.
True
False
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
Multiple Choice
The ___________ model refers to having multiple layers of protection and security for your data.
Defense in Depth
Access Control Lists
Onion
Castle Walls
52
Multiple Choice
Jane has noticed a few oddities with her desktop computer. Recently she has noticed that the programs seem to take longer to load, her email doesn’t open, and she gets popups saying she needs to scan her computer for viruses. What seems to be the problem with Jane’s computer?
She likely has a malware infection
Her antivirus is turned off
She has too many programs open at the same time
Her network speed is too slow
53
Multiple Choice
An office computer connected to a large local network is suspected to be infected with a worm. The computer normally has access to both the Internet and local shares, including shared network drives. How should the computer be handled?
Log off the computer to prevent further infections
Immediately disconnect it from the network and quarantine
Run an anti-malware scan on the local computer
Disable Interact access but keep it connected to local shares
54
Multiple Choice
Tom works at the US Department of Defense. He is tasked with removing some out-of-service hard disks to be replaced with newer SSDs. The drives previously held top secret information. What should Tom do with the old drives?
Wipe them several times and physically destroy them
Toss them in the dumpster
Wipe them once or twice and donate them to a computer refurb center
Do nothing and put them away in the storage room
55
Multiple Select
Alice is setting up a wireless router at her apartment. She wants to keep it private from other tenants and only give access to her friends when they come by. What could she do to secure her wireless network? Select all that apply.
Change the default SSID
Disable SSID broadcast
Let her friends use the guest network
Enable MAC filtering
56
Multiple Choice
Data destruction services can provide a certificate of destruction as proof of state and local regulation compliance.
True
False
57
1002 Chap.06: Securing Devices and Data
By B. Dewater
Show answer
Auto Play
Slide 1 / 57
SLIDE
Similar Resources on Wayground
48 questions
POPULAR MEMBER SERVICES DIAGNOSTICS, HOSPITILIZATION AND SURGERY
Presentation
•
KG
53 questions
Topic 4 & 5 Networking Devices
Presentation
•
University
52 questions
Lesson 7. The Internet and Education
Presentation
•
University
51 questions
Copy of G1_K7_L7_22-23
Presentation
•
KG - Professional Dev...
53 questions
DCS2101 - Week 10 (Trees)
Presentation
•
University
51 questions
Info Sec Managment L4-Security Standards, Frameworks & Reg
Presentation
•
University
49 questions
SAMR Model
Presentation
•
Professional Development
51 questions
Percentages for Math - Wayground Conv
Presentation
•
KG - University
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade