
Unit Review: Security (Set 2)
Authored by Wayground CTE
Information technology (IT)
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user wants to unlock their phone by looking at the camera. Which screen lock method should be configured?
Facial recognition
Fingerprint
Swipe
PIN code
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee reports their company phone is missing. Which action allows IT to erase all data on the device immediately?
Triggering a remote wipe
Activating a screen lock
Enabling device encryption
Updating the mobile OS
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which screen lock method requires a user to draw a shape connecting dots on the screen?
Pattern
Swipe
PIN code
Fingerprint
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A student's personal device is being used to access school email under a BYOD policy. What distinguishes a BYOD device from a corporate-owned device in terms of management?
BYOD devices are owned by the user but may follow company policy
BYOD devices are owned and fully managed by the organization
BYOD devices are prohibited from installing antivirus software
BYOD devices cannot use encryption
5.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
Which TWO methods protect data stored on a lost mobile device?
Device encryption
Locator application
Swipe screen lock
Remote wipe
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to apply OS updates to mobile devices regularly?
Updates replace the device encryption keys
Updates patch security vulnerabilities in the operating system
Updates increase screen brightness and battery life
Updates remove all third-party applications automatically
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company deploys smart thermostats on its corporate network. What is a key security concern specific to these IoT devices?
They cannot connect to wireless networks without a VPN
They require frequent manual OS updates by end users
They automatically install malware from connected devices
They often have weak default credentials and limited security features
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?