A+ 1002 Chapter 6 Review

A+ 1002 Chapter 6 Review

9th - 12th Grade

24 Qs

quiz-placeholder

Similar activities

ITF Exam FC0-U61 - Assessment Two

ITF Exam FC0-U61 - Assessment Two

Chapter 5 (fundamentals of Cybersecurity)

Chapter 5 (fundamentals of Cybersecurity)

Computers 2e

Computers 2e

ITS DCM#2

ITS DCM#2

TestOut CompTIA ITF  Domain 2 Infrastructure

TestOut CompTIA ITF Domain 2 Infrastructure

Computers 2a

Computers 2a

A+ 1002 Chapter 6 Review

A+ 1002 Chapter 6 Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ashley Smith

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is not an example of future proofing.

using a legacy version of a program

installing OS updates

scheduling security software scans

scheduling updates

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A corporate policy standard that details how personal devices can be used on a corporate network? (Abbreviation)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Requiring laptop hard drives to be encrypted would be the FIRST step of implementing a best security policy to prevent an incident where a laptop could be lost with sensitive corporate information that could be released on the internet.

True

False

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The ability to remove any sensitive data from a mobile device and permanently delete it after the device has been lost or stolen is called a _____________________ _______________. ( 2 Words)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security design technique that is implemented when public wifi networks are being setup so as to protect the internal corporate network?

UNC

DMZ

UEFI

COPE

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A number found on the back or bottom of a mobile device that is used to mark the device as invalid if it is stolen is the ____________________.

SIM Serial Number

International Mobile Subscriber Identity

IMEI

10-digit station identification number

Answer explanation

International Mobile Equipment Identity (IMEI)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is a second operating system that controls low-level timing dependent functions of a mobile device.

RTOS

IMEI

IMSI

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?