
A+ Core2 Day 5c methods for securing mobile and embedded devices
Authored by Patrick Hines
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user frequently loses their phone. Which feature helps locate the device if misplaced?
Answer explanation
Location services allow authorized users to track the device on a map, aiding in recovery.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're setting up a new phone for a business user. Which security measure is MOST crucial?
Answer explanation
A strong screen lock like fingerprint or PIN prevents unauthorized access to sensitive data and applications.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee uses their personal phone for work. What's the safest way to access sensitive company data?
Answer explanation
A VPN encrypts data traffic, securing communication even on potentially unsecure public Wi-Fi networks.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user wants to improve the security of their tablet. Disabling which feature would be MOST beneficial?
Answer explanation
Background app refresh can drain battery and potentially increase security risks by allowing unauthorized actions.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're troubleshooting a smartwatch that won't connect to a phone. What's the FIRST step?
Answer explanation
Restarting devices often resolves temporary connection issues before proceeding with more complex troubleshooting.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user reports their smart TV keeps displaying unwanted pop-up ads. Which action could resolve the issue?
Answer explanation
Updating the firmware ensures the TV has the latest security patches and bug fixes that address potential vulnerabilities.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user wants to sell their old laptop but is concerned about leaving personal data behin What's the BEST way to ensure data security?
Answer explanation
Data wiping software securely overwrites data on the drive, making it virtually impossible to recover deleted files.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
37 questions
Numpy_Pandas_Matplotlib
Quiz
•
Professional Development
40 questions
Komputer Akuntansi Kelas XI AK
Quiz
•
KG - Professional Dev...
40 questions
Examen Teórico de Sistemas Operativos
Quiz
•
Professional Development
40 questions
RA8 (Drive) - Examen
Quiz
•
Professional Development
43 questions
Digital Functional Skills bank
Quiz
•
Professional Development
41 questions
ITIL SERVICE LIFECYCLE
Quiz
•
Professional Development
40 questions
21 st Century Literacy Skills
Quiz
•
Professional Development
38 questions
Informática Básica: Introdução
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development