MTA Security Fund 5

MTA Security Fund 5

10th - 12th Grade

•

75 Qs

quiz-placeholder

Similar activities

Algoritma Pemrograman

Algoritma Pemrograman

10th Grade

•

72 Qs

Kelas Maya dan  Praproduksi Sinopsis, Naskah,

Kelas Maya dan Praproduksi Sinopsis, Naskah,

10th Grade

•

77 Qs

KOMPUTER AKUNTANSI MYOB KELAS XII AKL2

KOMPUTER AKUNTANSI MYOB KELAS XII AKL2

12th Grade

•

75 Qs

Python Turtle Quiz

Python Turtle Quiz

5th - 12th Grade

•

75 Qs

CS- Q1 Revision

CS- Q1 Revision

12th Grade

•

71 Qs

Diagnostico de  aprendizaje 11F-ITEY

Diagnostico de aprendizaje 11F-ITEY

11th Grade

•

78 Qs

SMK Alqi XI TKJ AdmSisJar

SMK Alqi XI TKJ AdmSisJar

11th Grade

•

70 Qs

Computer Science - End of Year Quiz

Computer Science - End of Year Quiz

10th Grade

•

75 Qs

MTA Security Fund 5

MTA Security Fund 5

Assessment

Quiz

•

Computers

•

10th - 12th Grade

•

Medium

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Windows tool is used to encrypt removable drives?

EFS

TPM

BitLocker

BitLocker To Go

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the I.T. field, impersonation, such as a person impersonating a help desk agent and asking for a password, is a type of what kind of attack?

Threat modeling

Administrative control

Attack service analysis

Social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IEEE 802.11 standard defines the name for a WLAN as the ___________

SSID

WAP

WLAN

WEP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital signature included in an email is used to do what?

Encrypt message

Validate the recipient

Decrypt the message

Validate the sender

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password policy prohibits reusing the same password?

Lockout policy

History policy

Length policy

Complexity policy

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which three characteristics describe Worms?

Uses system resources like bandwidth, memory, and processor time, which makes the computer run slow

Contained in most music and videos

Typically does not corrupt or modify files

A self-replacing program that copies itself to other computers without user intervention

Only passed by email

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A department head wants to control the types of permissions and the recipient of permissions on a set of folders for the department. The department head is not in the Administrator's group. What should the department head do in order to be able to control permissions?

Become an Administrator

Gain Modify permissions on the folder

Gain Full Control permissions on the folder

Take ownership of the folder

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?