Question #251
Topic 1
Which of the following is an advantage of using WPA2 instead of WPA3?
Computers 2f
Quiz
•
Computers
•
12th Grade
•
Medium
Akau Anyieth
Used 6+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #251
Topic 1
Which of the following is an advantage of using WPA2 instead of WPA3?
A. Connection security
B. Encryption key length
C. Device compatibility
D. Offline decryption resistance
Answer explanation
Devices might not yet detect WPA3 and support only WPA2. Similarly, WPA2 provides a more secure connection than WPA, but some legacy WiFi devices do not detect WPA2 and support only WPA
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #252
Topic 1
A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The technician needs to make use of a tool natively designed for Linux. Which of the following tools will the technician MOST likely use?
A. VNC
B. MFA
C. MSRA
D. RDP
Answer explanation
VNC stands for Virtual Network Computing. It is a cross-platform screen sharing system that was created to remotely control another computer.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #253
Topic 1
A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?
A. Disable System Restore.
B. Schedule a malware scan.
C. Educate the end user.
D. Run Windows Update.
Answer explanation
Disabling System Restore before removal is recommended to prevent possible re-infection, as it may unintentionally save a backup copy of the suspect file, which will remain even after removal is completed
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Question #254
Topic 1
Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Choose two.)
A. Licensing agreements
B. Chain of custody
C. Incident management documentation
D. Data integrity
E. Material safety data sheet
Answer explanation
BD, Chain of custody to determine who has touched the evidence. Data integrity for keeping the data safe for evaluation.
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Question #255
Topic 1
Which of the following would MOST likely be deployed to enhance physical security for a building? (Choose two.)
A. Multifactor authentication
B. Badge reader
C. Personal identification number
D. Firewall
E. Motion sensor
Answer explanation
B. Badge reader: Badge readers are commonly used for physical access control. They require authorized individuals to present a valid badge or access card to gain entry to a building or specific areas within it. E. Motion sensor: Motion sensors are used to detect movement in and around a building. They can trigger alarms, surveillance systems, or lighting based on detected motion, helping to deter unauthorized access or intruders.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #256
Topic 1
A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?
A. EULA
B. PII
C. DRM
D. Open-source agreement
Answer explanation
When a technician discovers multiple copies of home edition software installed on computers, the most likely violation is related to the EULA (End User License Agreement).
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #257
Topic 1
A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?
A. Enable firewall ACLs.
B. Examine the localhost file entries.
C. Verify the routing tables.
D. Update the antivirus definitions.
Answer explanation
To resolving the issue of unexpected website redirections. One must examine the localhost file entries (option B). The hosts file contains mappings of domain names to IP addresses, and any suspicious or unauthorized entries in this file could be causing the redirection. Investigating and correcting any problematic entries in the hosts file may help resolve the issue.
50 questions
THIRD QUARTER ASSESSMENT IN CSS - GRADE 9
Quiz
•
9th Grade - University
48 questions
Chapter 1 Cisco ITE Exam
Quiz
•
12th Grade
47 questions
Networking - Practice Test #1
Quiz
•
9th Grade - University
49 questions
ACWM Bloque III
Quiz
•
12th Grade
50 questions
PYTHON BASICS GRADE 11
Quiz
•
11th - 12th Grade
51 questions
Computers 6
Quiz
•
12th Grade
55 questions
Computers 5
Quiz
•
12th Grade
50 questions
CCST Networking Basics, Unit test
Quiz
•
12th Grade
15 questions
Multiplication Facts
Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz
Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set
Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025
Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)
Quiz
•
9th - 12th Grade
15 questions
June Review Quiz
Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles
Quiz
•
8th Grade
25 questions
Triangle Inequalities
Quiz
•
10th - 12th Grade
40 questions
Week 4 Student In Class Practice Set
Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025
Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)
Quiz
•
9th - 12th Grade
25 questions
Triangle Inequalities
Quiz
•
10th - 12th Grade
65 questions
MegaQuiz v2 2025
Quiz
•
9th - 12th Grade
10 questions
GPA Lesson
Lesson
•
9th - 12th Grade
15 questions
SMART Goals
Quiz
•
8th - 12th Grade
45 questions
Week 3.5 Review: Set 1
Quiz
•
9th - 12th Grade