
902 Review 1
Quiz by Rogue One
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
14 questions
Show answers
- Q1A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?Setting a high encryption levelTurning down the radio power levelEnabling MAC filteringDisabling the SSID broadcast30s
- Q2A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?Logically move the server to the DMZReallocate the server to a different networking closetConfigure the server to use a static IPDisable the remote desktop port30s
- Q3To prevent other users from editing files in ‘C:\ Files’, which of the following steps should be taken?Set the local administrator as the owner of the folderSet NTFS permissions to read onlySet NTFS permissions to read onlySet network share permissions to read onlySet the folder to index files for search30s
- Q4An unauthorized user observing system security procedures is known as:shoulder surfinga wormphishingspyware30s
- Q5A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications?The workstation is victim of a denial of service attackThe administrator has not applied appropriate security patchesThe username is not authenticating on the networkThe username is not part of the local administrator group30s
- Q6A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?DLPACLRDPVPN30s
- Q7A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?Require users to change their password at frequent intervalsRequire biometric identification to log into the laptopRequire multifactor authentication to log into laptopRequire laptop hard drives to be encrypted30s
- Q8A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?COMPRESSEDexFATEFSNTFS45s
- Q9A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend?Enable MAC filteringDisable SSID broadcastTurn on content filteringAssign static IP addresses45s
- Q10A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?Quick FormatLow Level FormatPhysical DestructionOverwrite30s
- Q11A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?RecyclingOverwritingReformattingShredding30s
- Q12Which of the following prevention methods is considered to be digital security?MantrapRFID badgeBiometricsFirewalls30s
- Q13Which of the following Windows features would be used to encrypt a single file or folder?SecurityEFSNTFSBitLocker30s
- Q14An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?Ransomware infectionAntivirus softwareInternet connectivity issuesContent-Filtering30s