A+ 1002 Quiz U4

A+ 1002 Quiz U4

Professional Development

22 Qs

quiz-placeholder

Similar activities

AZ 104 Practice Test

AZ 104 Practice Test

Professional Development

25 Qs

CompTIA Sec+

CompTIA Sec+

University - Professional Development

20 Qs

ICTPRG431Session 2 Introduction Database Management Systems Quiz

ICTPRG431Session 2 Introduction Database Management Systems Quiz

Professional Development

22 Qs

A+ - 10A - Configure Windows User Settings

A+ - 10A - Configure Windows User Settings

Professional Development

20 Qs

Cisco Unified Communications Quiz

Cisco Unified Communications Quiz

Professional Development

18 Qs

CySA+ Acronyms

CySA+ Acronyms

Professional Development

18 Qs

A+ - 11B - Use Performance and Troubleshooting Tools

A+ - 11B - Use Performance and Troubleshooting Tools

Professional Development

18 Qs

RIP-IRGP-Quiz

RIP-IRGP-Quiz

Professional Development

25 Qs

A+ 1002 Quiz U4

A+ 1002 Quiz U4

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Professor Smith

Used 241+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Edward works for a small medical center. The center's data systems were recently hacked. Once the attack was discovered, security specialists found that the compromised files included patient information including names, addresses, and social security numbers.


This information is sensitive because it is considered to be:

Data owned by the medical center

A violation of patient/physician confidentiality

A violation of information access policies

Personally identifiable information

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The type of security threat that uses computers or other networks to accept and pass on viruses is called:

logic bomb

phishing

botnets

man-in-the-middle

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A user would like secure file encryption on their new Windows Vista Enterprise PC. The user informs the technician that they do not wish to spend extra money on a solution. Which of the following is the BEST recommendation for the technician to make to the user?

Turn on and configure BitLocker

Turn on and configure Offline Files and Folders

Turn on and configure ReadyBoost

Turn on and configure Network Access Protection

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following forms of physical security is most similar to a mantrap?

Cipher lock

Entry control roster

Biometrics

Turnstile

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which versions of Windows provides full support for BitLocker?

Windows 7 Professional

Windows 7 Enterprise

Windows XP

Windows Vista Home

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

You have been asked to set up a wireless network for your boss' home office. He only has two devices on the network and doesn't want to be bothered remembering or managing a complex password. At the same time, your boss does not want the neighbors or other unauthorized users to accidentally connect to his network.


What action could you take to protect the wireless network from unauthorized access while minimizing the need to remember or manage a complex password?

Disable SSID broadcast

Install a fingerprint scanner or similar device to force multifactor authentication on the two network devices

Enable MAC filtering

Install and configure a DHCP server

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You just upgraded five computers with new, larger, hard drives. Now you would like to securely repurpose the hard drives so that they could be reused as needed.


What action should you take to prepare the drives for later use?

Perform a drive wipe on each disk

Degauss the drives

Perform a quick format on each drive

Run chkdsk on each drive

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?