
Chapter 12 & 13 Checkpoint
Quiz
•
Computers
•
11th - 12th Grade
•
Medium
Shelby Johnson
Used 4+ times
FREE Resource
Enhance your content in a minute
35 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two safety precautions that will help protect a workplace from social engineering? (Choose two answers.)
perform daily data backups
encrypt all sensitive data stored on servers
register and escort all visitors to the premises
make sure all operating systems and antivirus software are up to date
make sure that each use of an access card allows access to only one user at a time
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Employee computers using removable flash drives have been observed to be infected with viruses and other malware. What two actions can help prevent this problem in the future? (Choose two answers.)
Set up virus protection software to scan removable media when accessing data.
Configure the Windows firewall to block ports used by viruses.
Disable the autorun feature in the operating system.
Repair, delete or quarantine infected files.
Enable the TPM in the CMOS settings.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two answers.)
The user interface can be extensively customized.
The operating system can be adjusted in order to improve the speed of the device.
The root directory of the device is locked.
The operation of the cellular network of the telephone company may be affected.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the most effective way of securing wireless traffic?
WPA2
Hidden SSID
WEP
wireless MAC filtering
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What action could help a technician determine if a denial of service attack is caused by malware on a host?
Disconnect the host from the network.
Log in to the host as a different user.
Disable ActiveX and Silverlight on the host.
Install bogus antivirus software on the host.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Corporate security policy dictates that all remote connections use only secure tunnels to exchange data. What encryption technique makes data traveling across the Internet as secure as if it were traveling across the corporate LAN?
MD5
VPN
WEP
WPA
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A user has repeatedly reported SMART messages displayed on their computer screen in the past few weeks. What should the technician check first?
CPU
Hard drive
Motherboard
Diet
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
35 questions
Ôn Tập Học Kì I Lớp 4
Quiz
•
4th Grade - University
30 questions
SAINS KOMPUTER
Quiz
•
4th - 12th Grade
30 questions
Pengenalan Informatika
Quiz
•
10th - 12th Grade
35 questions
MIL_1ST_QUIZ
Quiz
•
12th Grade
31 questions
Image Representation
Quiz
•
11th Grade
30 questions
Python Introduction
Quiz
•
9th - 11th Grade
40 questions
Đề cương HKII Tin (tmt:>)
Quiz
•
11th Grade
30 questions
RECUPERAÇÃO 4 PROGRAMAÇÃO E ROBÓTICA DURVAL 2025
Quiz
•
12th Grade - University
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
