Security Vulnerabilities and Protections of Nontraditional Hosts Review

Security Vulnerabilities and Protections of Nontraditional Hosts Review

10th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

How Well do you Know Harry Potter

How Well do you Know Harry Potter

KG - Professional Development

10 Qs

Prepare seafood dishes

Prepare seafood dishes

11th Grade

10 Qs

HACCP

HACCP

10th Grade - University

13 Qs

Pengertian, Sejarah dan Karakteristik Kewirausahaan

Pengertian, Sejarah dan Karakteristik Kewirausahaan

10th Grade

15 Qs

Comunicación efectiva

Comunicación efectiva

10th Grade

15 Qs

Característica del género dramático

Característica del género dramático

10th Grade

10 Qs

Sobrevivientes - FIng

Sobrevivientes - FIng

KG - Professional Development

11 Qs

Tynker Tynker

Tynker Tynker

3rd Grade - Professional Development

9 Qs

Security Vulnerabilities and Protections of Nontraditional Hosts Review

Security Vulnerabilities and Protections of Nontraditional Hosts Review

Assessment

Quiz

Life Skills

10th - 12th Grade

Hard

Created by

Quintasia Hurt

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What describes computing technology incorporated into nontraditional devices?

BYOD

point of sale

Internet of Things

Wearable technology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best way to protect data on a stolen laptop?

Ensure a TPM chip is included with the motherboard.

A strong password be placed on the BIOS

GPS tracking should be enabled.

Full drive encryption should be in place on the laptop.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user has used BitLocker to Go on a flash drive. On attempting to use the system, the incorrect password is used. What can this user do?

Temporarily suspend the encryption.

Click the Forgot my password link, and check his or her e-mail for the password.

Use the recovery key to change the password.

The user will have to format the drive to use it again.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a security administrator find who created a file?

Check the file properties and view the owner

Review the metadata of the file

Verify the logged-in user information.

Process the file through BitLocker.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a concern regarding a smartphone used as BYOD?

The user engaged in jailbreaking or rooting the device.

The user accessing confidential information on the device.

Sideloaded apps have been installed.

A skimmer has been installed.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following will help with security issues regarding IoT devices?

Ensure device firmware is regularly updated.

Only purchase devices from reputable vendors.

Do not allow the devices access to the Internet.

Only allow administrators to use IoT devices.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A retail flower shop is updating its cash register to a PoS system. What is the most likely threat to this system?

Customers using EMV cards only.

Inventory management.

Malware.

Internal storage failure.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?