You're at a favorite coffee shop using their Wi-Fi, when suddenly you notice that your mouse is moving, and you aren't moving it. You knew using this unsecured Wi-Fi was a bad idea, and now you've been hacked and want to stop the attacker as soon as possible, but you need time to save your files. What is the best course of action?
A+ CORE 2 FINAL REVIEW QUIZ

Quiz
•
Computers
•
University
•
Medium
Candice Kiser
Used 45+ times
FREE Resource
100 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Turn on Airplane mode
Unhook the network cable
Close the lid on the laptop
Turn the laptop's power off
Answer explanation
The quickest way to thwart this would-be attacker is to turn on Airplane mode. This disconnects all of your wireless connections and is usually done by pressing a key or two, such as the Fn key and whichever F key has a picture of an airplane on it. There is no network cable to disconnect if you are on Wi-Fi, and what closing the lid does depends on how the computer is configured. It may do nothing. If you turn the laptop's power off, you will lose whatever you have been working on.
2.
MULTIPLE SELECT QUESTION
1 min • 5 pts
You are on-site fixing a client's laptop that will not load the OS. You are waiting to hear about your friend's awesome party that they are hosting this weekend, and your phone starts to vibrate. And it keeps vibrating. You're sure that all your friends are texting information about the party. What should you do? (Choose two.)
Turn your phone off and apologize to the client. Tell them that the phone was distracting you from your job, but it won't be a problem now.
Ignore your phone.
Text your friends back and tell them that you are working.
Call your friend and tell them to wait until after this job before planning all the details because you want to help.
Answer the texts while you are waiting for the OS to load - this could take a while.
Answer explanation
When working with customers, it's important to avoid distractions such as personal phone calls, texting, or social media sites. Exceptions can be made if it's an emergency situation, but in those cases notify the client that you might get a call or text and explain that you will deal with it only if it's the emergency. Otherwise, ignore the personal interruption until you are not working with a client.
3.
MULTIPLE SELECT QUESTION
1 min • 5 pts
You are planning on formatting a hard drive with NTFS that will be used to share files between Windows 10 and Windows 11 Pro computers. Which of the following features are present in NTFS? (Choose two.)
macOS support
File compression
File and folder encryption
Enhanced flash drive support
Convert to FAT32 without losing data
Answer explanation
The New Technology File System (NTFS) is available with all current versions of Windows. NTFS is an advanced filesystem that includes such features as individual file security, compression, and RAID support as well as support for extremely large file and partition sizes and disk transaction monitoring. In Pro and higher editions of Windows, the Encrypting File System (EFS) is available to encrypt individual files and folders.
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
You are logged into a Linux workstation with a regular user account. You need to execute a command with root permissions. Which command do you need to use?
su
sudo
grep
man
Answer explanation
The sudo ("substitute user do" or "superuser do") command is used to run a command with a different privilege level than the current user logged in. Typically this means running a command with superuser or root permissions. The su command switches to a different user, again the default is root, but with sudo you need to enter sudo before each command. With su, you don't. Considering best practices, you would use sudo if you had one command to run and su if you had several. The grep command is used to search for patterns in a file, so if you can't remember the filename but know what is in it, you can still find it. The man command brings up a manual—for example, man grep would show you how to use the grep command.
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A security consultant recommends that your secure facility implement biometrics as a form of building access control. Which of the following systems might they be referring to?
RFID badges
Key fobs
Palmprint scanner
Guards
Answer explanation
Biometric devices use physical characteristics to identify the user. Biometric systems include fingerprint/palm/hand scanners, retina scanners, and anything else that uses part of your body to identify you. To gain access to resources, you must pass a physical screening process. While it's true that guards are humans, they are not biometric devices. Radio frequency identification (RFID) badges have information on them that is read by an RFID scanner, and key fobs generate a new code every few seconds to allow access.
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
You are looking online to find pictures to use as part of promotional materials your company wants to make. Which of the following statements is true regarding online content?
Online content is considered open source; therefore, you may use whatever you find
Online content can be protected through the use of DRM
Online content is protected through the use of the EULA
Online content is protected through terms established by Microsoft
Answer explanation
Many companies rely on digital rights management (DRM) to protect digital assets such as online photos or videos. Unlike an end-user license agreement (EULA) that legally protects software and other objects, DRM will physically protect the information by not allowing copies to be made, printing a watermark on the face of an image or document, or similar measures to prevent use, modification, and distribution of materials that are copyrighted. DRM is not as established as licensing agreements are, but you should still respect the property of the owners of digital content.
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
In which type of security threat will someone try to gain access to a secure area without credentials by following someone else, who used their access rights, into the secured area?
Brute force
Shoulder surfing
Evil twin
Tailgating
Answer explanation
Tailgating refers to being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device. Using access control vestibules, which are devices such as small rooms that limit access to one or a few individuals, is a great way to stop tailgating. A brute-force attack attempts to repeatedly guess a password. Shoulder surfing is just like it sounds—someone looking over your shoulder to gain passwords and logins, and an evil twin is an unauthorized wireless access point that has the same SSID as a legitimate one.
Create a free account and access millions of resources
Similar Resources on Quizizz
101 questions
ICT 101-200

Quiz
•
University
100 questions
Mid-term cybersecurity

Quiz
•
University
102 questions
Информатика

Quiz
•
11th Grade - University
96 questions
Chủ đề 1: CĂN BẢN VỀ CÔNG NGHỆ (GS6 _LV1_2024)

Quiz
•
1st Grade - University
100 questions
UI Design Principles Quiz

Quiz
•
University
102 questions
информатика

Quiz
•
University
100 questions
(ROOM 2) TEST QUIZIZ OPEN LREK ASLAB KOMPUTER 2024

Quiz
•
University
100 questions
Principles of Programming Languages

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade