
BCS Network Security Test 6
Authored by Chris Whitehead
Professional Development, Instructional Technology, Education
University - Professional Development
Used 195+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Joe, an end user, reports that his computer is displaying numerous pop-up advertisements and is performing very slowly during the workday. Which of the following tools should the technician use FIRST to troubleshoot this issue?
Reinstall the Internet browser software
Run a trusted antivirus scan
Perform a System restore
Enable the local firewall
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
While booting a Linux workstation, a runtime error occurs as the kernel is loading. The error message is written to the screen and then disappears. Which of the following is the system location where this error will be available to reference during troubleshooting?
/var/log/message
/tmp/logs
/var/spool
/etc/sysconfig/kernel
3.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which of the following are examples of possession authentication? (Select THREE).
Key fob
RFID badge
Passphrase
PIN
Fingerprint reader
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A technician is assisting a user who cannot browse to the company's website. Each time the user types in the URL, a competitor's website loads. The technician verifies the company's website is accessible from other computers. Which of the following should the technician complete NEXT to troubleshoot the user's issues?
Install the company's trusted root certificate
Enable the proxy settings of the browser
Change the default gateway of the network connection
Perform an anti-malware scan on the system
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A technician has upgraded the hard drives on several Windows computers and is ready to reimage them. Which of the following commands would be the FASTEST?
format /c
format /q
format /p
format /d
6.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which of the following are digital security measures? (Select TWO).
RFID badges
Entry control rosters
Stateful firewalls
VPN tunnels
Mantraps
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following BEST describes an attack where communications between two parties are intercepted and forwarded to each party with neither party being aware of the interception and potential modification to the communications?
Spear phishing
Main-in-the-middle
URL hijacking
Tansitive access
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
EDUC102_Media Literacy
Quiz
•
University
20 questions
Accent
Quiz
•
Professional Development
20 questions
REVISION CHAPTER 8 & 9
Quiz
•
3rd Grade - University
20 questions
TEORI HUMANISTIK
Quiz
•
University
20 questions
Time and Tense 24 May
Quiz
•
Professional Development
25 questions
BASIC AUTOMOTIVE TECHNOLOGY & CAR QUIZ
Quiz
•
Professional Development
20 questions
Module 8: State and Non-state Institutions
Quiz
•
11th Grade - University
20 questions
Ordinal Number
Quiz
•
3rd Grade - University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade