
Chapter 12 & 13 Checkpoint
Authored by Shelby Johnson
Computers
11th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two safety precautions that will help protect a workplace from social engineering? (Choose two answers.)
perform daily data backups
encrypt all sensitive data stored on servers
register and escort all visitors to the premises
make sure all operating systems and antivirus software are up to date
make sure that each use of an access card allows access to only one user at a time
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Employee computers using removable flash drives have been observed to be infected with viruses and other malware. What two actions can help prevent this problem in the future? (Choose two answers.)
Set up virus protection software to scan removable media when accessing data.
Configure the Windows firewall to block ports used by viruses.
Disable the autorun feature in the operating system.
Repair, delete or quarantine infected files.
Enable the TPM in the CMOS settings.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two answers.)
The user interface can be extensively customized.
The operating system can be adjusted in order to improve the speed of the device.
The root directory of the device is locked.
The operation of the cellular network of the telephone company may be affected.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the most effective way of securing wireless traffic?
WPA2
Hidden SSID
WEP
wireless MAC filtering
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What action could help a technician determine if a denial of service attack is caused by malware on a host?
Disconnect the host from the network.
Log in to the host as a different user.
Disable ActiveX and Silverlight on the host.
Install bogus antivirus software on the host.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Corporate security policy dictates that all remote connections use only secure tunnels to exchange data. What encryption technique makes data traveling across the Internet as secure as if it were traveling across the corporate LAN?
MD5
VPN
WEP
WPA
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A user has repeatedly reported SMART messages displayed on their computer screen in the past few weeks. What should the technician check first?
CPU
Hard drive
Motherboard
Diet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
30 questions
Komputer Jaringan Dasar
Quiz
•
1st Grade - Professio...
39 questions
Domain 1.0 (DD1)
Quiz
•
9th - 12th Grade
34 questions
1.1.1. Structure and function of the processor
Quiz
•
12th Grade
38 questions
1.1 Architecture of CPU
Quiz
•
9th - 12th Grade
35 questions
Mid Tes HTML Quiz
Quiz
•
11th Grade
40 questions
แบบทดสอบ Coding : Micro Python 1
Quiz
•
9th - 12th Grade
40 questions
XII MM [DESAIN MULTIMEDIA INTERAKTIF] PAS
Quiz
•
12th Grade
34 questions
Latihan SAT Informatika Kelas XI TA-2324
Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade