Search Header Logo

Unit Review: Security (Set 2)

Authored by Wayground CTE

Information technology (IT)

9th Grade

Unit Review: Security (Set 2)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user wants to unlock their phone by looking at the camera. Which screen lock method should be configured?

Facial recognition

Fingerprint

Swipe

PIN code

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee reports their company phone is missing. Which action allows IT to erase all data on the device immediately?

Triggering a remote wipe

Activating a screen lock

Enabling device encryption

Updating the mobile OS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which screen lock method requires a user to draw a shape connecting dots on the screen?

Pattern

Swipe

PIN code

Fingerprint

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A student's personal device is being used to access school email under a BYOD policy. What distinguishes a BYOD device from a corporate-owned device in terms of management?

BYOD devices are owned by the user but may follow company policy

BYOD devices are owned and fully managed by the organization

BYOD devices are prohibited from installing antivirus software

BYOD devices cannot use encryption

5.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

Which TWO methods protect data stored on a lost mobile device?

Device encryption

Locator application

Swipe screen lock

Remote wipe

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to apply OS updates to mobile devices regularly?

Updates replace the device encryption keys

Updates patch security vulnerabilities in the operating system

Updates increase screen brightness and battery life

Updates remove all third-party applications automatically

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company deploys smart thermostats on its corporate network. What is a key security concern specific to these IoT devices?

They cannot connect to wireless networks without a VPN

They require frequent manual OS updates by end users

They automatically install malware from connected devices

They often have weak default credentials and limited security features

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?