Chapter 12 & 13 Checkpoint

Chapter 12 & 13 Checkpoint

11th - 12th Grade

35 Qs

quiz-placeholder

Similar activities

SINAQ (ONLINE)

SINAQ (ONLINE)

11th Grade

30 Qs

TJBL  (JARINGAN BERBASIS LUAS)

TJBL (JARINGAN BERBASIS LUAS)

11th Grade

40 Qs

TIK kelas 7, Penilaian Tengah semester

TIK kelas 7, Penilaian Tengah semester

7th Grade - University

40 Qs

programación orientada a objetos

programación orientada a objetos

11th Grade

40 Qs

Sumatif Tengah Sem2  Informatika 11F

Sumatif Tengah Sem2 Informatika 11F

11th Grade

40 Qs

Chapter 12 Test Review

Chapter 12 Test Review

7th - 12th Grade

30 Qs

All About Computers

All About Computers

9th - 12th Grade

40 Qs

MYOB Asyiik

MYOB Asyiik

11th Grade

40 Qs

Chapter 12 & 13 Checkpoint

Chapter 12 & 13 Checkpoint

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Shelby Johnson

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two safety precautions that will help protect a workplace from social engineering? (Choose two answers.)

perform daily data backups

encrypt all sensitive data stored on servers

register and escort all visitors to the premises

make sure all operating systems and antivirus software are up to date

make sure that each use of an access card allows access to only one user at a time

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Employee computers using removable flash drives have been observed to be infected with viruses and other malware. What two actions can help prevent this problem in the future? (Choose two answers.)

Set up virus protection software to scan removable media when accessing data.

Configure the Windows firewall to block ports used by viruses.

Disable the autorun feature in the operating system.

Repair, delete or quarantine infected files.

Enable the TPM in the CMOS settings.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two answers.)

The user interface can be extensively customized.

The operating system can be adjusted in order to improve the speed of the device.

The root directory of the device is locked.

The operation of the cellular network of the telephone company may be affected.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the most effective way of securing wireless traffic?

WPA2

Hidden SSID

WEP

wireless MAC filtering

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What action could help a technician determine if a denial of service attack is caused by malware on a host?

Disconnect the host from the network.

Log in to the host as a different user.

Disable ActiveX and Silverlight on the host.

Install bogus antivirus software on the host.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Corporate security policy dictates that all remote connections use only secure tunnels to exchange data. What encryption technique makes data traveling across the Internet as secure as if it were traveling across the corporate LAN?

MD5

VPN

WEP

WPA

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user has repeatedly reported SMART messages displayed on their computer screen in the past few weeks. What should the technician check first?

CPU

Hard drive

Motherboard

Diet

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers