
Chapter 13: Security
Authored by Jack Neo
Other
11th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
48 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
A technician discovers that an employee has attached an unauthorized wireless router to the company network so that the employee can get Wi-Fi coverage while outside taking a break. The technician immediately reports this to a supervisor. What are two actions that the company should take in response to this situation? (Choose two.)
Consult the company security policy to decide on actions to take against the employee
Create a guest account for the employee to use when outside the building.
Make sure that the wireless router is not broadcasting an SSID.
Immediately remove the device from the network.
Add an authorized wireless access point to the network to extend coverage for the employee.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When a support technician is troubleshooting a security issue on a system, which action should the technician take just before documenting the findings and closing the ticket?
ask what the problem is that the customer is experiencing.
Ensure that all applications are working.
Boot the system in Safe Mode
Disconnect the system from the network.
3.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)
cryptic
synchronous
multifactor
BIOS
login
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A technician has recently joined an organization and during the first week on the job, discovers a security breach. What policy should the technician implement after the security breach has occurred?
remote access policy
identification and authentication policy
acceptable use policy
incident handling policy
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?
adware
stealth virus
phishing
worm
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which is an example of social engineering?
a computer displaying unauthorized pop-ups and adware
an unidentified person claiming to be a technician collecting user information from employees
the infection of a computer by a virus carried by a Trojan
an anonymous programmer directing a DDoS attack on a data center
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?
adware
spyware
Trojan
ransomware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
45 questions
NOCTI HR EOPA
Quiz
•
10th - 12th Grade
50 questions
GK- Marathon 13,14 & 15
Quiz
•
8th Grade - Professio...
48 questions
Principles of Health Science Spring Final
Quiz
•
9th Grade - University
50 questions
Komputer Akuntansi (MYOB)
Quiz
•
11th Grade
45 questions
EL Santuario al alcance de todos 02
Quiz
•
11th Grade - University
45 questions
Kitchen Math & Measuring Review
Quiz
•
9th - 12th Grade
50 questions
PENYISIHAN OLIMPIADE BAHASA BALI 2023 JENJANG SMA/SMK
Quiz
•
9th - 12th Grade
50 questions
SMAW/ Arc Welding Safety Quiz
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Other
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
23 questions
TSI Math Vocabulary
Quiz
•
10th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
15 questions
ACT Reading Practice
Quiz
•
11th Grade
80 questions
ACT Math Important Vocabulary
Quiz
•
11th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
16 questions
ACT English - Grammar Practice #2
Quiz
•
11th Grade
12 questions
Unit 8: The Early Cold War
Quiz
•
11th Grade