CompTIA A+ Objectives 2.1-2.4

CompTIA A+ Objectives 2.1-2.4

University

10 Qs

quiz-placeholder

Similar activities

Object Oriented Programming Quiz

Object Oriented Programming Quiz

University

15 Qs

E-commerce

E-commerce

University

10 Qs

Access

Access

10th Grade - University

11 Qs

Revision - Communications & Networks

Revision - Communications & Networks

10th Grade - University

14 Qs

Firewall & IDS

Firewall & IDS

University

10 Qs

INFT124 Week 6 Quiz review

INFT124 Week 6 Quiz review

University

12 Qs

Computer Science

Computer Science

University

15 Qs

TPG Basics of web3 and programming

TPG Basics of web3 and programming

University

10 Qs

CompTIA A+ Objectives 2.1-2.4

CompTIA A+ Objectives 2.1-2.4

Assessment

Quiz

Life Skills, Computers

University

Practice Problem

Medium

Created by

Michael Lutz

Used 71+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of theses are physical security measures?

Mantrap

Computer login

Door lock

VPN

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are an entry to an ACL?

ACL

ACE

ACA

WOL

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Active Directory, what is the name of a folder?

Domain Controller

Canonical Name

Organizational Unit

Distinguished Name

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Biometric locks are generally more secure than passwords.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WEP is the most recent and secure wireless authentication method.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following uses multifactor authentication?

Password + Fingerprint

Password + Passcode

Face scan + Fingerprint

Software Token + Hardware Token

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The difference between a virus and a worm is...

a worm asks for a ransom.

a worm has many computers under its control.

a virus asks for a ransom

a virus is triggered through user interaction.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?