Search Header Logo

Chapter 12 & 13 Checkpoint

Authored by Shelby Johnson

Computers

11th - 12th Grade

Used 4+ times

Chapter 12 & 13 Checkpoint
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two safety precautions that will help protect a workplace from social engineering? (Choose two answers.)

perform daily data backups

encrypt all sensitive data stored on servers

register and escort all visitors to the premises

make sure all operating systems and antivirus software are up to date

make sure that each use of an access card allows access to only one user at a time

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Employee computers using removable flash drives have been observed to be infected with viruses and other malware. What two actions can help prevent this problem in the future? (Choose two answers.)

Set up virus protection software to scan removable media when accessing data.

Configure the Windows firewall to block ports used by viruses.

Disable the autorun feature in the operating system.

Repair, delete or quarantine infected files.

Enable the TPM in the CMOS settings.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two answers.)

The user interface can be extensively customized.

The operating system can be adjusted in order to improve the speed of the device.

The root directory of the device is locked.

The operation of the cellular network of the telephone company may be affected.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the most effective way of securing wireless traffic?

WPA2

Hidden SSID

WEP

wireless MAC filtering

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What action could help a technician determine if a denial of service attack is caused by malware on a host?

Disconnect the host from the network.

Log in to the host as a different user.

Disable ActiveX and Silverlight on the host.

Install bogus antivirus software on the host.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Corporate security policy dictates that all remote connections use only secure tunnels to exchange data. What encryption technique makes data traveling across the Internet as secure as if it were traveling across the corporate LAN?

MD5

VPN

WEP

WPA

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user has repeatedly reported SMART messages displayed on their computer screen in the past few weeks. What should the technician check first?

CPU

Hard drive

Motherboard

Diet

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?