A+ CORE 2 FINAL REVIEW QUIZ

A+ CORE 2 FINAL REVIEW QUIZ

University

100 Qs

quiz-placeholder

Similar activities

ICT practica ENU

ICT practica ENU

University

101 Qs

Икт первый 100

Икт первый 100

University

100 Qs

Computer Awareness Marathon

Computer Awareness Marathon

University

100 Qs

Principles of Programming Languages

Principles of Programming Languages

University

100 Qs

ICT 1-100

ICT 1-100

University

100 Qs

CNE_MCQ

CNE_MCQ

University

105 Qs

АКТ - 3

АКТ - 3

University

105 Qs

икт 1

икт 1

University

100 Qs

A+ CORE 2 FINAL REVIEW QUIZ

A+ CORE 2 FINAL REVIEW QUIZ

Assessment

Quiz

Computers

University

Medium

Created by

Candice Kiser

Used 45+ times

FREE Resource

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

You're at a favorite coffee shop using their Wi-Fi, when suddenly you notice that your mouse is moving, and you aren't moving it. You knew using this unsecured Wi-Fi was a bad idea, and now you've been hacked and want to stop the attacker as soon as possible, but you need time to save your files. What is the best course of action?

Turn on Airplane mode

Unhook the network cable

Close the lid on the laptop

Turn the laptop's power off

Answer explanation

The quickest way to thwart this would-be attacker is to turn on Airplane mode. This disconnects all of your wireless connections and is usually done by pressing a key or two, such as the Fn key and whichever F key has a picture of an airplane on it. There is no network cable to disconnect if you are on Wi-Fi, and what closing the lid does depends on how the computer is configured. It may do nothing. If you turn the laptop's power off, you will lose whatever you have been working on.

2.

MULTIPLE SELECT QUESTION

1 min • 5 pts

You are on-site fixing a client's laptop that will not load the OS. You are waiting to hear about your friend's awesome party that they are hosting this weekend, and your phone starts to vibrate. And it keeps vibrating. You're sure that all your friends are texting information about the party. What should you do? (Choose two.)

Turn your phone off and apologize to the client. Tell them that the phone was distracting you from your job, but it won't be a problem now.

Ignore your phone.

Text your friends back and tell them that you are working.

Call your friend and tell them to wait until after this job before planning all the details because you want to help.

Answer the texts while you are waiting for the OS to load - this could take a while.

Answer explanation

When working with customers, it's important to avoid distractions such as personal phone calls, texting, or social media sites. Exceptions can be made if it's an emergency situation, but in those cases notify the client that you might get a call or text and explain that you will deal with it only if it's the emergency. Otherwise, ignore the personal interruption until you are not working with a client.

3.

MULTIPLE SELECT QUESTION

1 min • 5 pts

You are planning on formatting a hard drive with NTFS that will be used to share files between Windows 10 and Windows 11 Pro computers. Which of the following features are present in NTFS? (Choose two.)

macOS support

File compression

File and folder encryption

Enhanced flash drive support

Convert to FAT32 without losing data

Answer explanation

The New Technology File System (NTFS) is available with all current versions of Windows. NTFS is an advanced filesystem that includes such features as individual file security, compression, and RAID support as well as support for extremely large file and partition sizes and disk transaction monitoring. In Pro and higher editions of Windows, the Encrypting File System (EFS) is available to encrypt individual files and folders.

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

You are logged into a Linux workstation with a regular user account. You need to execute a command with root permissions. Which command do you need to use?

su

sudo

grep

man

Answer explanation

The sudo ("substitute user do" or "superuser do") command is used to run a command with a different privilege level than the current user logged in. Typically this means running a command with superuser or root permissions. The su command switches to a different user, again the default is root, but with sudo you need to enter sudo before each command. With su, you don't. Considering best practices, you would use sudo if you had one command to run and su if you had several. The grep command is used to search for patterns in a file, so if you can't remember the filename but know what is in it, you can still find it. The man command brings up a manual—for example, man grep would show you how to use the grep command.

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

A security consultant recommends that your secure facility implement biometrics as a form of building access control. Which of the following systems might they be referring to?

RFID badges

Key fobs

Palmprint scanner

Guards

Answer explanation

Biometric devices use physical characteristics to identify the user. Biometric systems include fingerprint/palm/hand scanners, retina scanners, and anything else that uses part of your body to identify you. To gain access to resources, you must pass a physical screening process. While it's true that guards are humans, they are not biometric devices. Radio frequency identification (RFID) badges have information on them that is read by an RFID scanner, and key fobs generate a new code every few seconds to allow access.

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

You are looking online to find pictures to use as part of promotional materials your company wants to make. Which of the following statements is true regarding online content?

Online content is considered open source; therefore, you may use whatever you find

Online content can be protected through the use of DRM

Online content is protected through the use of the EULA

Online content is protected through terms established by Microsoft

Answer explanation

Many companies rely on digital rights management (DRM) to protect digital assets such as online photos or videos. Unlike an end-user license agreement (EULA) that legally protects software and other objects, DRM will physically protect the information by not allowing copies to be made, printing a watermark on the face of an image or document, or similar measures to prevent use, modification, and distribution of materials that are copyrighted. DRM is not as established as licensing agreements are, but you should still respect the property of the owners of digital content.

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

In which type of security threat will someone try to gain access to a secure area without credentials by following someone else, who used their access rights, into the secured area?

Brute force

Shoulder surfing

Evil twin

Tailgating

Answer explanation

Tailgating refers to being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device. Using access control vestibules, which are devices such as small rooms that limit access to one or a few individuals, is a great way to stop tailgating. A brute-force attack attempts to repeatedly guess a password. Shoulder surfing is just like it sounds—someone looking over your shoulder to gain passwords and logins, and an evil twin is an unauthorized wireless access point that has the same SSID as a legitimate one.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?