This practice exam can be taken as many times as needed to feel confident and prepared for the Technology Exam.
Exam Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the exam before. Hence you can not start it again.
Exam is loading…
You must sign in or sign up to start the exam.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
When evaluating software, it is considered “bank level” secure if they encrypt using AES-256.
CorrectIncorrect -
Question 2 of 10
2. Question
If you and your client are connected to the internet using a secure VPN, your client is still NOT safe to send you sensitive information by email.
CorrectIncorrect -
Question 3 of 10
3. Question
What is the optimal way to use 2-factor authentication?
CorrectIncorrect -
Question 4 of 10
4. Question
What are some ways to protect yourself from phishing? (Select all that apply)
CorrectIncorrect -
Question 5 of 10
5. Question
Many cloud-based password managers like LastPass and 1Password will not help protect against a phishing attempt even when used properly.
CorrectIncorrect -
Question 6 of 10
6. Question
Which statements are true of a firewall? (Select all that apply.)
CorrectIncorrect -
Question 7 of 10
7. Question
You should set your software to auto-update because keeping software updated is one of the most important security measures you can take.
CorrectIncorrect -
Question 8 of 10
8. Question
You need to ensure files used by cloud accounting software are backed up securely.
CorrectIncorrect -
Question 9 of 10
9. Question
Smartphones are secure without doing anything special like installing security apps.
CorrectIncorrect -
Question 10 of 10
10. Question
If one of your online accounts is accessed by a cyber criminal, it cannot lead to other accounts also being accessed.
CorrectIncorrect