BCS Network Security Test 6

BCS Network Security Test 6

University - Professional Development

24 Qs

quiz-placeholder

Similar activities

Health Insurance Quiz 9

Health Insurance Quiz 9

Professional Development

20 Qs

Marketing Managemetn Minigame 2

Marketing Managemetn Minigame 2

University

20 Qs

LAHTM Tourism and Hospitality as a Trade

LAHTM Tourism and Hospitality as a Trade

University

20 Qs

contract law 3-elements

contract law 3-elements

Professional Development

20 Qs

UNIT 2: MOVIES AND ENTERTAINMENT

UNIT 2: MOVIES AND ENTERTAINMENT

University

20 Qs

Principles of multimedia

Principles of multimedia

University

20 Qs

Module 3 unit 5 Using File System

Module 3 unit 5 Using File System

Professional Development

20 Qs

Data Protection - what do you know?

Data Protection - what do you know?

Professional Development

20 Qs

BCS Network Security Test 6

BCS Network Security Test 6

Assessment

Quiz

Professional Development, Instructional Technology, Education

University - Professional Development

Easy

Created by

Chris Whitehead

Used 195+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Joe, an end user, reports that his computer is displaying numerous pop-up advertisements and is performing very slowly during the workday. Which of the following tools should the technician use FIRST to troubleshoot this issue?

Reinstall the Internet browser software

Run a trusted antivirus scan

Perform a System restore

Enable the local firewall

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

While booting a Linux workstation, a runtime error occurs as the kernel is loading. The error message is written to the screen and then disappears. Which of the following is the system location where this error will be available to reference during troubleshooting?

/var/log/message

/tmp/logs

/var/spool

/etc/sysconfig/kernel

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following are examples of possession authentication? (Select THREE).

Key fob

RFID badge

Passphrase

PIN

Fingerprint reader

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A technician is assisting a user who cannot browse to the company's website. Each time the user types in the URL, a competitor's website loads. The technician verifies the company's website is accessible from other computers. Which of the following should the technician complete NEXT to troubleshoot the user's issues?

Install the company's trusted root certificate

Enable the proxy settings of the browser

Change the default gateway of the network connection

Perform an anti-malware scan on the system

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A technician has upgraded the hard drives on several Windows computers and is ready to reimage them. Which of the following commands would be the FASTEST?

format /c

format /q

format /p

format /d

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following are digital security measures? (Select TWO).

RFID badges

Entry control rosters

Stateful firewalls

VPN tunnels

Mantraps

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following BEST describes an attack where communications between two parties are intercepted and forwarded to each party with neither party being aware of the interception and potential modification to the communications?

Spear phishing

Main-in-the-middle

URL hijacking

Tansitive access

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?