You're at a favorite coffee shop using their Wi-Fi, when suddenly you notice that your mouse is moving, and you aren't moving it. You knew using this unsecured Wi-Fi was a bad idea, and now you've been hacked and want to stop the attacker as soon as possible, but you need time to save your files. What is the best course of action?
A+ CORE 2 FINAL REVIEW QUIZ

Quiz
•
Computers
•
University
•
Medium
Candice Kiser
Used 45+ times
FREE Resource
100 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Turn on Airplane mode
Unhook the network cable
Close the lid on the laptop
Turn the laptop's power off
Answer explanation
The quickest way to thwart this would-be attacker is to turn on Airplane mode. This disconnects all of your wireless connections and is usually done by pressing a key or two, such as the Fn key and whichever F key has a picture of an airplane on it. There is no network cable to disconnect if you are on Wi-Fi, and what closing the lid does depends on how the computer is configured. It may do nothing. If you turn the laptop's power off, you will lose whatever you have been working on.
2.
MULTIPLE SELECT QUESTION
1 min • 5 pts
You are on-site fixing a client's laptop that will not load the OS. You are waiting to hear about your friend's awesome party that they are hosting this weekend, and your phone starts to vibrate. And it keeps vibrating. You're sure that all your friends are texting information about the party. What should you do? (Choose two.)
Turn your phone off and apologize to the client. Tell them that the phone was distracting you from your job, but it won't be a problem now.
Ignore your phone.
Text your friends back and tell them that you are working.
Call your friend and tell them to wait until after this job before planning all the details because you want to help.
Answer the texts while you are waiting for the OS to load - this could take a while.
Answer explanation
When working with customers, it's important to avoid distractions such as personal phone calls, texting, or social media sites. Exceptions can be made if it's an emergency situation, but in those cases notify the client that you might get a call or text and explain that you will deal with it only if it's the emergency. Otherwise, ignore the personal interruption until you are not working with a client.
3.
MULTIPLE SELECT QUESTION
1 min • 5 pts
You are planning on formatting a hard drive with NTFS that will be used to share files between Windows 10 and Windows 11 Pro computers. Which of the following features are present in NTFS? (Choose two.)
macOS support
File compression
File and folder encryption
Enhanced flash drive support
Convert to FAT32 without losing data
Answer explanation
The New Technology File System (NTFS) is available with all current versions of Windows. NTFS is an advanced filesystem that includes such features as individual file security, compression, and RAID support as well as support for extremely large file and partition sizes and disk transaction monitoring. In Pro and higher editions of Windows, the Encrypting File System (EFS) is available to encrypt individual files and folders.
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
You are logged into a Linux workstation with a regular user account. You need to execute a command with root permissions. Which command do you need to use?
su
sudo
grep
man
Answer explanation
The sudo ("substitute user do" or "superuser do") command is used to run a command with a different privilege level than the current user logged in. Typically this means running a command with superuser or root permissions. The su command switches to a different user, again the default is root, but with sudo you need to enter sudo before each command. With su, you don't. Considering best practices, you would use sudo if you had one command to run and su if you had several. The grep command is used to search for patterns in a file, so if you can't remember the filename but know what is in it, you can still find it. The man command brings up a manual—for example, man grep would show you how to use the grep command.
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A security consultant recommends that your secure facility implement biometrics as a form of building access control. Which of the following systems might they be referring to?
RFID badges
Key fobs
Palmprint scanner
Guards
Answer explanation
Biometric devices use physical characteristics to identify the user. Biometric systems include fingerprint/palm/hand scanners, retina scanners, and anything else that uses part of your body to identify you. To gain access to resources, you must pass a physical screening process. While it's true that guards are humans, they are not biometric devices. Radio frequency identification (RFID) badges have information on them that is read by an RFID scanner, and key fobs generate a new code every few seconds to allow access.
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
You are looking online to find pictures to use as part of promotional materials your company wants to make. Which of the following statements is true regarding online content?
Online content is considered open source; therefore, you may use whatever you find
Online content can be protected through the use of DRM
Online content is protected through the use of the EULA
Online content is protected through terms established by Microsoft
Answer explanation
Many companies rely on digital rights management (DRM) to protect digital assets such as online photos or videos. Unlike an end-user license agreement (EULA) that legally protects software and other objects, DRM will physically protect the information by not allowing copies to be made, printing a watermark on the face of an image or document, or similar measures to prevent use, modification, and distribution of materials that are copyrighted. DRM is not as established as licensing agreements are, but you should still respect the property of the owners of digital content.
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
In which type of security threat will someone try to gain access to a secure area without credentials by following someone else, who used their access rights, into the secured area?
Brute force
Shoulder surfing
Evil twin
Tailgating
Answer explanation
Tailgating refers to being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device. Using access control vestibules, which are devices such as small rooms that limit access to one or a few individuals, is a great way to stop tailgating. A brute-force attack attempts to repeatedly guess a password. Shoulder surfing is just like it sounds—someone looking over your shoulder to gain passwords and logins, and an evil twin is an unauthorized wireless access point that has the same SSID as a legitimate one.
Create a free account and access millions of resources
Similar Resources on Quizizz
101 questions
Database Management System Quiz

Quiz
•
University
100 questions
Principles of Programming Languages

Quiz
•
University
100 questions
ICT 1-100

Quiz
•
University
100 questions
икт 1

Quiz
•
University
100 questions
Fundamentals of IT Revision

Quiz
•
University
100 questions
SOAL KELAS 8 CAMPURAN

Quiz
•
12th Grade - University
97 questions
Cuestionario de Seguridad Informática

Quiz
•
University
100 questions
QUIZ IT SUPPORT (BISMIILLAH KOMPETEN)

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade