placeholder image to represent content

902 Review 1

Quiz by Rogue One

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
14 questions
Show answers
  • Q1
    A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?
    Setting a high encryption level
    Turning down the radio power level
    Enabling MAC filtering
    Disabling the SSID broadcast
    30s
  • Q2
    A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?
    Logically move the server to the DMZ
    Reallocate the server to a different networking closet
    Configure the server to use a static IP
    Disable the remote desktop port
    30s
  • Q3
    To prevent other users from editing files in ‘C:\ Files’, which of the following steps should be taken?
    Set the local administrator as the owner of the folder
    Set NTFS permissions to read onlySet NTFS permissions to read only
    Set network share permissions to read only
    Set the folder to index files for search
    30s
  • Q4
    An unauthorized user observing system security procedures is known as:
    shoulder surfing
    a worm
    phishing
    spyware
    30s
  • Q5
    A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications?
    The workstation is victim of a denial of service attack
    The administrator has not applied appropriate security patches
    The username is not authenticating on the network
    The username is not part of the local administrator group
    30s
  • Q6
    A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?
    DLP
    ACL
    RDP
    VPN
    30s
  • Q7
    A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?
    Require users to change their password at frequent intervals
    Require biometric identification to log into the laptop
    Require multifactor authentication to log into laptop
    Require laptop hard drives to be encrypted
    30s
  • Q8
    A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?
    COMPRESSED
    exFAT
    EFS
    NTFS
    45s
  • Q9
    A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend?
    Enable MAC filtering
    Disable SSID broadcast
    Turn on content filtering
    Assign static IP addresses
    45s
  • Q10
    A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?
    Quick Format
    Low Level Format
    Physical Destruction
    Overwrite
    30s
  • Q11
    A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?
    Recycling
    Overwriting
    Reformatting
    Shredding
    30s
  • Q12
    Which of the following prevention methods is considered to be digital security?
    Mantrap
    RFID badge
    Biometrics
    Firewalls
    30s
  • Q13
    Which of the following Windows features would be used to encrypt a single file or folder?
    Security
    EFS
    NTFS
    BitLocker
    30s
  • Q14
    An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?
    Ransomware infection
    Antivirus software
    Internet connectivity issues
    Content-Filtering
    30s

Teachers give this quiz to your class