MTA Security Fund 5

MTA Security Fund 5

10th - 12th Grade

75 Qs

quiz-placeholder

Similar activities

Python 1 Review Game

Python 1 Review Game

9th - 12th Grade

73 Qs

Word Within The Word Lists 1-3

Word Within The Word Lists 1-3

3rd Grade - University

75 Qs

First Quarter Summative Test - October 23, 2023

First Quarter Summative Test - October 23, 2023

11th Grade

80 Qs

TKJ_

TKJ_

1st - 10th Grade

80 Qs

Unit 1 Troubleshooting Methodology and Hardware Basics

Unit 1 Troubleshooting Methodology and Hardware Basics

9th - 12th Grade

80 Qs

Programare și Dezvoltare Web

Programare și Dezvoltare Web

10th - 12th Grade

70 Qs

Computer architectuur

Computer architectuur

5th - 12th Grade

72 Qs

H446 Section 1: Components of a computer

H446 Section 1: Components of a computer

11th Grade - University

71 Qs

MTA Security Fund 5

MTA Security Fund 5

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Windows tool is used to encrypt removable drives?

EFS

TPM

BitLocker

BitLocker To Go

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the I.T. field, impersonation, such as a person impersonating a help desk agent and asking for a password, is a type of what kind of attack?

Threat modeling

Administrative control

Attack service analysis

Social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IEEE 802.11 standard defines the name for a WLAN as the ___________

SSID

WAP

WLAN

WEP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital signature included in an email is used to do what?

Encrypt message

Validate the recipient

Decrypt the message

Validate the sender

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password policy prohibits reusing the same password?

Lockout policy

History policy

Length policy

Complexity policy

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which three characteristics describe Worms?

Uses system resources like bandwidth, memory, and processor time, which makes the computer run slow

Contained in most music and videos

Typically does not corrupt or modify files

A self-replacing program that copies itself to other computers without user intervention

Only passed by email

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A department head wants to control the types of permissions and the recipient of permissions on a set of folders for the department. The department head is not in the Administrator's group. What should the department head do in order to be able to control permissions?

Become an Administrator

Gain Modify permissions on the folder

Gain Full Control permissions on the folder

Take ownership of the folder

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?