
Information Technology Academy
Authored by River Kritzar
Other
11th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
What are two recommended steps to protect and secure a wireless network? (Choose two.)
Update firmware.
Use WPA2-AES encryption.
Locate the wireless router where it is accessible to users.
Use the default SSID.
Enable remote management.
2.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
Which three elements should be combined when creating a strong password? (Choose three.)
personal information
dictionary words
combinations of letters and numbers
special characters
pet names
3.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
Which two online activities pose high security risks? (Choose two.)
using a VPN to access the Internet from a Wi-Fi hot spot
sharing information on social media
verifying a banking site URL before entering information
following email links that have already been scanned by the email server
creating a very complex password for a new account and storing it in a password manager service
4.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
What are three examples of personally identifiable information? (Choose three.)
home thermometer value
bank account number
birth date
vehicle fuel consumption
vehicle identification number
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
skide
sleep
skype
skip
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The picture above is the example of what category of computer?
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which is this Social Media Platform?
Sender
Sky High
Skype
Top Swop
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?