placeholder image to represent content

April 17th A+ practice

Quiz by Rachel Hirsch

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1
    What kind of document would detail a specific set of rules for network use?
    Statement of Work
    Privacy Policy
    End User License Agreement
    Acceptable Use Policy
    30s
  • Q2
    What does it mean when a mobile device application runs in a "sandbox?"
    The application will automatically build links to other data sources as required - like gps.
    The application will only use a specific amount of memory
    The application will only have access to specific data sources
    the application has full access to the mobile device storage and memory.
    30s
  • Q3
    What term best describes the fraudulent gathering of sensitive information through look-alike web pages? (the bad guys make a website that looks exactly like your bank website). What type of attack?
    phishing
    spam
    adware
    trojan
    30s
  • Q4
    You would like to improve the security on your network by adding an additional authentication requirement to access network resources, especially over a VPN. What's the best network security technology to address this requirement?
    require NTFS file systems
    BIOS passwords
    software firewalls
    token generators
    30s
  • Q5
    What would you commonly secure with Bitlocker To Go?
    laptop storage drives
    Removable USB flash drives
    windows system volumes
    VPN connections
    30s
  • Q6
    Which of these would prevent tailgating?
    after scanning a badge, only allow one person to enter a secure area at a time
    computer desktops should be manually locked before leaving your desk
    physical papers and work documents should be locked in your desk when unattended
    require multiple factors of information when authenticating
    30s
  • Q7
    Which of these is true about high-level formatting?
    all data is securely deleted after a high level format
    the high-level formatting process is always done at a factory
    a high-level format can be performed by the operating system
    a drive cannot be used again after a high-level format
    30s
  • Q8
    Which of these security features would prevent a computer from booting an operating system without the correct password?
    windows login screen
    user BIOS password
    Encrypting file system
    NTFS
    30s
  • Q9
    Which of the following file systems can support EFS?
    NTFS
    FAT
    HPFS
    FAT32
    30s
  • Q10
    What is the fundamental characteristic that defines a computer worm?
    a worm causes massive OS outages
    a worm can replicate itself without any user intervention
    a worm captures keystrokes
    a worm pretends to be a legitimate application
    30s

Teachers give this quiz to your class