
Security Vulnerabilities and Protections of Nontraditional Hosts Review
Quiz
•
Life Skills
•
10th - 12th Grade
•
Hard
Quintasia Hurt
Used 2+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What describes computing technology incorporated into nontraditional devices?
BYOD
point of sale
Internet of Things
Wearable technology
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the best way to protect data on a stolen laptop?
Ensure a TPM chip is included with the motherboard.
A strong password be placed on the BIOS
GPS tracking should be enabled.
Full drive encryption should be in place on the laptop.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user has used BitLocker to Go on a flash drive. On attempting to use the system, the incorrect password is used. What can this user do?
Temporarily suspend the encryption.
Click the Forgot my password link, and check his or her e-mail for the password.
Use the recovery key to change the password.
The user will have to format the drive to use it again.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can a security administrator find who created a file?
Check the file properties and view the owner
Review the metadata of the file
Verify the logged-in user information.
Process the file through BitLocker.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a concern regarding a smartphone used as BYOD?
The user engaged in jailbreaking or rooting the device.
The user accessing confidential information on the device.
Sideloaded apps have been installed.
A skimmer has been installed.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following will help with security issues regarding IoT devices?
Ensure device firmware is regularly updated.
Only purchase devices from reputable vendors.
Do not allow the devices access to the Internet.
Only allow administrators to use IoT devices.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A retail flower shop is updating its cash register to a PoS system. What is the most likely threat to this system?
Customers using EMV cards only.
Inventory management.
Malware.
Internal storage failure.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
CÓMO ME SIENTO HOY
Quiz
•
10th Grade
10 questions
Curiosidades de República Dominicana
Quiz
•
1st - 12th Grade
14 questions
Apple quiz
Quiz
•
5th Grade - University
15 questions
WRS 15
Quiz
•
11th Grade
10 questions
V.emprendedora
Quiz
•
12th Grade
10 questions
El contrato
Quiz
•
10th Grade
15 questions
Quizpicable you 1
Quiz
•
5th Grade - Professio...
10 questions
El texto argumentativo
Quiz
•
12th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Life Skills
20 questions
Investing
Quiz
•
9th - 12th Grade
20 questions
Career
Quiz
•
9th - 12th Grade
20 questions
Paying for College
Quiz
•
9th - 12th Grade
10 questions
The Grinch Trivia
Quiz
•
12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
20 questions
Budgeting
Quiz
•
9th - 12th Grade
20 questions
Insurance
Quiz
•
9th - 12th Grade
20 questions
Managing Credit
Quiz
•
9th - 12th Grade
