Chapter 13: Security

Chapter 13: Security

11th Grade

48 Qs

quiz-placeholder

Similar activities

Med Term Test #1 (Chapters 2-5)

Med Term Test #1 (Chapters 2-5)

10th - 12th Grade

50 Qs

Data Processing 1st Term  Exams SS2

Data Processing 1st Term Exams SS2

11th Grade

51 Qs

Hospitality and Tourism 2nd Half Semester

Hospitality and Tourism 2nd Half Semester

9th - 12th Grade

45 Qs

Law, Public Safety, Corrections & Security Career Cluster

Law, Public Safety, Corrections & Security Career Cluster

6th - 12th Grade

43 Qs

1. ADMINISTRASI INFRASTRUKTUR JARINGAN (AIJ) KLS XI, XII TKJ

1. ADMINISTRASI INFRASTRUKTUR JARINGAN (AIJ) KLS XI, XII TKJ

11th - 12th Grade

44 Qs

AYES A6 Electrical Practice Exam

AYES A6 Electrical Practice Exam

10th Grade - University

50 Qs

Sheltered Personal Finance-Semester Review

Sheltered Personal Finance-Semester Review

9th - 12th Grade

52 Qs

IBA Review 2

IBA Review 2

9th - 12th Grade

50 Qs

Chapter 13: Security

Chapter 13: Security

Assessment

Quiz

Other

11th Grade

Hard

Created by

Jack Neo

Used 7+ times

FREE Resource

48 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)

Consult the company security policy to decide on actions to take against the employee

Create a guest account for the employee to use when outside the building.

Make sure that the wireless router is not broadcasting an SSID.

Immediately remove the device from the network.

Add an authorized wireless access point to the network to extend coverage for the employee.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?

ask what the problem is that the customer is experiencing.

Ensure that all applications are working.

Boot the system in Safe Mode

Disconnect the system from the network.

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)

cryptic

synchronous

multifactor

BIOS

login

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?

remote access policy

identification and authentication policy

acceptable use policy

incident handling policy

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

adware

stealth virus

phishing

worm

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which is an example of social engineering?

a computer displaying unauthorized pop-ups and adware

an unidentified person claiming to be a technician collecting user information from employees

the infection of a computer by a virus carried by a Trojan

an anonymous programmer directing a DDoS attack on a data center

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?

adware

spyware

Trojan

ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?