A+ CORE 2 FINAL REVIEW QUIZ

Quiz
•
Computers
•
University
•
Medium
Candice Kiser
Used 45+ times
FREE Resource
100 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
You're at a favorite coffee shop using their Wi-Fi, when suddenly you notice that your mouse is moving, and you aren't moving it. You knew using this unsecured Wi-Fi was a bad idea, and now you've been hacked and want to stop the attacker as soon as possible, but you need time to save your files. What is the best course of action?
Turn on Airplane mode
Unhook the network cable
Close the lid on the laptop
Turn the laptop's power off
Answer explanation
The quickest way to thwart this would-be attacker is to turn on Airplane mode. This disconnects all of your wireless connections and is usually done by pressing a key or two, such as the Fn key and whichever F key has a picture of an airplane on it. There is no network cable to disconnect if you are on Wi-Fi, and what closing the lid does depends on how the computer is configured. It may do nothing. If you turn the laptop's power off, you will lose whatever you have been working on.
2.
MULTIPLE SELECT QUESTION
1 min • 5 pts
You are on-site fixing a client's laptop that will not load the OS. You are waiting to hear about your friend's awesome party that they are hosting this weekend, and your phone starts to vibrate. And it keeps vibrating. You're sure that all your friends are texting information about the party. What should you do? (Choose two.)
Turn your phone off and apologize to the client. Tell them that the phone was distracting you from your job, but it won't be a problem now.
Ignore your phone.
Text your friends back and tell them that you are working.
Call your friend and tell them to wait until after this job before planning all the details because you want to help.
Answer the texts while you are waiting for the OS to load - this could take a while.
Answer explanation
When working with customers, it's important to avoid distractions such as personal phone calls, texting, or social media sites. Exceptions can be made if it's an emergency situation, but in those cases notify the client that you might get a call or text and explain that you will deal with it only if it's the emergency. Otherwise, ignore the personal interruption until you are not working with a client.
3.
MULTIPLE SELECT QUESTION
1 min • 5 pts
You are planning on formatting a hard drive with NTFS that will be used to share files between Windows 10 and Windows 11 Pro computers. Which of the following features are present in NTFS? (Choose two.)
macOS support
File compression
File and folder encryption
Enhanced flash drive support
Convert to FAT32 without losing data
Answer explanation
The New Technology File System (NTFS) is available with all current versions of Windows. NTFS is an advanced filesystem that includes such features as individual file security, compression, and RAID support as well as support for extremely large file and partition sizes and disk transaction monitoring. In Pro and higher editions of Windows, the Encrypting File System (EFS) is available to encrypt individual files and folders.
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
You are logged into a Linux workstation with a regular user account. You need to execute a command with root permissions. Which command do you need to use?
su
sudo
grep
man
Answer explanation
The sudo ("substitute user do" or "superuser do") command is used to run a command with a different privilege level than the current user logged in. Typically this means running a command with superuser or root permissions. The su command switches to a different user, again the default is root, but with sudo you need to enter sudo before each command. With su, you don't. Considering best practices, you would use sudo if you had one command to run and su if you had several. The grep command is used to search for patterns in a file, so if you can't remember the filename but know what is in it, you can still find it. The man command brings up a manual—for example, man grep would show you how to use the grep command.
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A security consultant recommends that your secure facility implement biometrics as a form of building access control. Which of the following systems might they be referring to?
RFID badges
Key fobs
Palmprint scanner
Guards
Answer explanation
Biometric devices use physical characteristics to identify the user. Biometric systems include fingerprint/palm/hand scanners, retina scanners, and anything else that uses part of your body to identify you. To gain access to resources, you must pass a physical screening process. While it's true that guards are humans, they are not biometric devices. Radio frequency identification (RFID) badges have information on them that is read by an RFID scanner, and key fobs generate a new code every few seconds to allow access.
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
You are looking online to find pictures to use as part of promotional materials your company wants to make. Which of the following statements is true regarding online content?
Online content is considered open source; therefore, you may use whatever you find
Online content can be protected through the use of DRM
Online content is protected through the use of the EULA
Online content is protected through terms established by Microsoft
Answer explanation
Many companies rely on digital rights management (DRM) to protect digital assets such as online photos or videos. Unlike an end-user license agreement (EULA) that legally protects software and other objects, DRM will physically protect the information by not allowing copies to be made, printing a watermark on the face of an image or document, or similar measures to prevent use, modification, and distribution of materials that are copyrighted. DRM is not as established as licensing agreements are, but you should still respect the property of the owners of digital content.
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
In which type of security threat will someone try to gain access to a secure area without credentials by following someone else, who used their access rights, into the secured area?
Brute force
Shoulder surfing
Evil twin
Tailgating
Answer explanation
Tailgating refers to being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device. Using access control vestibules, which are devices such as small rooms that limit access to one or a few individuals, is a great way to stop tailgating. A brute-force attack attempts to repeatedly guess a password. Shoulder surfing is just like it sounds—someone looking over your shoulder to gain passwords and logins, and an evil twin is an unauthorized wireless access point that has the same SSID as a legitimate one.
Create a free account and access millions of resources
Similar Resources on Wayground
100 questions
ICT Input Output

Quiz
•
10th Grade - University
101 questions
ICT 101-200

Quiz
•
University
100 questions
Computer Architecture Year 7 EOU Test

Quiz
•
6th Grade - University
100 questions
Mid-term cybersecurity

Quiz
•
University
102 questions
Информатика

Quiz
•
11th Grade - University
96 questions
CompTIA A+ 220-1101 Pretest

Quiz
•
University
96 questions
Chủ đề 1: CĂN BẢN VỀ CÔNG NGHỆ (GS6 _LV1_2024)

Quiz
•
1st Grade - University
100 questions
Principles of Programming Languages

Quiz
•
University
Popular Resources on Wayground
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
20 questions
Lab Safety and Equipment

Quiz
•
8th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University
2 questions
Pronouncing Names Correctly

Quiz
•
University
12 questions
Civil War

Quiz
•
8th Grade - University
18 questions
Parent Functions

Quiz
•
9th Grade - University
21 questions
Mapa países hispanohablantes

Quiz
•
1st Grade - University
19 questions
Primary v. Secondary Sources

Quiz
•
6th Grade - University
25 questions
Identifying Parts of Speech

Quiz
•
8th Grade - University
20 questions
Disney Trivia

Quiz
•
University