April 17th A+ practice
Quiz by Rachel Hirsch
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1What kind of document would detail a specific set of rules for network use?Statement of WorkPrivacy PolicyEnd User License AgreementAcceptable Use Policy30s
- Q2What does it mean when a mobile device application runs in a "sandbox?"The application will automatically build links to other data sources as required - like gps.The application will only use a specific amount of memoryThe application will only have access to specific data sourcesthe application has full access to the mobile device storage and memory.30s
- Q3What term best describes the fraudulent gathering of sensitive information through look-alike web pages? (the bad guys make a website that looks exactly like your bank website). What type of attack?phishingspamadwaretrojan30s
- Q4You would like to improve the security on your network by adding an additional authentication requirement to access network resources, especially over a VPN. What's the best network security technology to address this requirement?require NTFS file systemsBIOS passwordssoftware firewallstoken generators30s
- Q5What would you commonly secure with Bitlocker To Go?laptop storage drivesRemovable USB flash driveswindows system volumesVPN connections30s
- Q6Which of these would prevent tailgating?after scanning a badge, only allow one person to enter a secure area at a timecomputer desktops should be manually locked before leaving your deskphysical papers and work documents should be locked in your desk when unattendedrequire multiple factors of information when authenticating30s
- Q7Which of these is true about high-level formatting?all data is securely deleted after a high level formatthe high-level formatting process is always done at a factorya high-level format can be performed by the operating systema drive cannot be used again after a high-level format30s
- Q8Which of these security features would prevent a computer from booting an operating system without the correct password?windows login screenuser BIOS passwordEncrypting file systemNTFS30s
- Q9Which of the following file systems can support EFS?NTFSFATHPFSFAT3230s
- Q10What is the fundamental characteristic that defines a computer worm?a worm causes massive OS outagesa worm can replicate itself without any user interventiona worm captures keystrokesa worm pretends to be a legitimate application30s