Practice 5 Flashcards
..
A user’s Android smartphone is becoming sluggish and slow to load applications. Which of the following should you perform FIRST to fix this problem?
Close all of the running applications
Turn off the smartphone’s Bluetooth and Wi-Fi
Update the smartphone’s firmware
Conduct a factory restore of the smartphone
Close all of the running applications
Dion Training is building a new computer for its video editor to use. The new computer will use four physical Intel Xeon processors, 128 GB of DDR4 memory, and a RAID 0 with two 2 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer’s resources properly?
Education
Home
Pro
Pro for Workstations
Pro for Workstations
Dion Training’s offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these under-voltage events?
Surge suppressor
Diesel generator
Uninterruptible power supply
Line conditioner
Line Conditioner
Which of the following is a connectionless protocol that utilizes on UDP?
HTTPS
FTP
TFTP
HTTP
TFTP
A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection?
Disable System Restore in Windows
Quarantine the infected system
Investigate and verify malware symptoms
Update the anti-malware solution
Remediate the infected systems
Enable System restore and create a restore point in Windows
Update the anti-malware solution
On your lunch break, you walked down to the coffee shop on the corner. You open your laptop and connect to their wireless network. After a few minutes of surfing the Internet, a pop-up is displayed on your screen. You close the pop-up, finish your lunch break, shut down the laptop, and put it back into your backpack. When you get back to the office, you take out the laptop and turn it on, but instead of your normal desktop background, you are greeted by a full-screen image with a padlock and a message stating you have to pay 0.1 BTC to regain access to your personal files. What type of malware has infected your laptop?
Spyware
Trojan
Rootkit
Ransomware
Ransomware
A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files?
xcopy
sfc
gpupdate
chkdsk
sfc
Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren’t working. Which of the following is MOST likely the problem?
Bluetooth is not enabled
WiFi is not enabled
Cellular is not enabled
The phone is in airplane mode
Bluetooth is not enabled
Your company recently suffered a small data breach caused by an employee emailing themselves a copy of the current customer’s names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data?
DLP
Strong Passwords
MDM
Firewall
DLP
What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?
32 GB
64 GB
20 GB
16 GB
32 GB
Eduardo is installing Windows 11 (64-bit) in a virtual machine on his macOS desktop. The installation is continually failing and producing an error. Eduardo has configured the virtual machine with a 2.2 GHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?
Amount of hard drive space
Amount of memory
The screen resolution
Number of CPU cores
Number of CPU cores
(Dual-core CPUs are needed for Windows 11)
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have finished remediating the infected system. Which of the following steps should you NEXT?
Schedule scans and run updates
Identify and research malware symptoms
Quarantine infected systems
Educate the end user
Schedule scans and run updates
.
You are installing a new firewall for Dion Training’s corporate network. Which of the following documents should you update FIRST?
Incident database
Knowledge base articles
Password policy
Network topology diagram
Network topology diagram
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have directly observed symptoms that indicate the system is infected with malware. Which of the following actions should you perform NEXT?
Remediate the infected system
Quarantine the affected system
Disable System Restore
Enable System Restore
Quarantine the affected system
A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer’s file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?
Perform a data wipe operation on the USB thumb drive before its next use
Connect the workstation to the Internet to receive the latest Windows XP patches
Manually update the antivirus on the workstation and set it to perform on-screen scans
Disable System restore and remote the previous restore points
Manually update the antivirus on the workstation and set it to perform on-screen scans
You recently moved 1.5 TB of data from your office’s file server to a new 16 TB NAS and decommissioned the old file server. You verified all users had been given the same permissions to the new file shares on the NAS as they had on the old server. The users are receiving an error stating, “Windows cannot access \server10\shared" every time they click the Share drive icon on their desktop. What is MOST likely the source of this error?
The users are still mapped to the old share drive
The users are outside the authorized hours set in the GPO
The users need administrative permission to access the new NAS
The users are using the incorrect password for the new server
The users are still mapped to the old share drive
Jennifer decided that the licensing cost for a piece of video editing software was too expensive. Instead, she decided to download a keygen program to generate a license key and install a pirated version of the editing software. After she runs the keygen, a license key is created, but her system performance becomes very sluggish, and her antimalware suite begins to display numerous alerts. Which type of malware might her computer be infected with?
Worm
Adware
Trojan
Logic Bomb
Trojan
Which file system type should you format a 4 TB USB flash drive to use with both Windows and macOS laptops?
NTFS
exFAT
FAT32
APFS
exFAT
(FAT32 can only support maximum volume sizes of up to 2 TB and maximum file sized of up to 4 GB)
Which command is used in the Linux terminal to change the permissions of a file?
pwd
chmod
sudo
chown
Dion Training uses DHCP to assign private Class B IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class B address?
192.168.2.14
10.5.34.15
172.16.13.12
169.254.125.154
172.16.13.12
David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device?
Jailbreak
Developer Mode
Rooting
Sideloading
Developer Mode
Christina is attempting to install Windows 10 (32-bit) on an older netbook-style laptop. The installation is continually failing and producing an error. The device has a 1.1 GHz processor, 1 GB of memory, an 8 GB hard drive, and a 720p display. Which component would need to be fixed to allow Windows 10 (32-bit) to be installed on this device?
The screen resolution
Amount of memory
Amount of hard drive space
Number of CPU cores
Amount of hard drive space
Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?
Spoofing
Zero-day
Spear phishing
Phishing
Spear Phishing
Which of the following remote access tools is a command-line terminal emulation program operating on port 23?
VNC
SSH
RDP
Telnet
Telnet
Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?
ls
cp
rm
mv
mv
A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash?
System Information
Registry Editor
Performance Monitor
Event Viewer
Event Viewer
Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?
Whaling
Spear Phishing
VIshing
Phishing
Spear Phishing
Nicole’s smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is in her apartment building. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue?
Update the smartphone’s applications or OS
Reset the data usage statistics on the smartphone
Reset the smartphone’s wireless network settings
Verify the smartphone has adequate signal strength
Verify the smartphone has adequate signal strength
Bradley has been authorized to work from home every Friday. Normally, he can use his work laptop home from home while still accessing the company’s internal network shares, but for some reason, it isn’t working today. What is MOST likely the cause of Bradley’s issue today?
The corporate MDM policy
An inactive VPN connection
Outdated anti-malware software
Missing OS security patches
An inactive VPN connection
You want to ensure that only one person can enter or leave the server room at a time. Which of the following physical security devices would BEST help you meet this requirement?
Access control vestibule
Thumbprint reader
Cipher lock
Video monitoring
Access control vestibule
Which of the following installation types would allow a single technician to quickly install Windows 10 Enterprise on 50 workstations simultaneously?
Repair installation
In-place upgrade
Refresh install
Image deployment
Image Deployment
A user’s Android smartphone is sluggish in responding when the user tries to open any of its apps. The smartphone has 2 GB of memory and a 16 GB internal storage device. The technician saw that the smartphone currently has 1.7 GB of memory in use and 412 MB of free storage space on the internal storage device. Which of the following should the technician perform to improve the device’s performance?
Replace the device’s battery
Replace the device’s screen
Uninstall any unneeded apps
Upgrade the internal storage device
Uninstall any unneeded apps
Dion Training is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this small company to purchase?
Enterprise
Business
Open-source
Personal
Business
A user is complaining that when they attempt to access Google’s homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?
Remove any proxy servers configured in their web browser
Verify the user’s date and time zone are correctly listed in Windows
Disable the Windows Firewall
Download the latest security updates for Windows
Remove any proxy servers configured in their web browser
How would you represent the Linux permissions rwxr-xr– in octal notation?
754
724
624
742
754
Which of the following commands is used on a Linux system to switch to another user’s account?
passwd
ps
su
chown
su
A programmer is writing a script to calculate the temperature in Fahrenheit when it receives input in celsius. The conversion factor used is 5/9. Which of the following would be used to store this fixed conversion factor in the script?
Constant
Comment
Variable
Loop
Constant
Which of the following types of encryption should be selected on a SOHO access point if you are running a coffee shop and want all of your customers to be able to join it by default?
Open
WPA
WPA2
WEP
Open
You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?
Duplicate IP address
Failed DNS resolution
DHCP failure
Poisoned ARP cache
DHCP failure
When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?
Biometric lock
PIV card
Smart Card
Key fob
Key Fob
You are installing a new file server at the offices of Dion Training. The entire building has a diesel generator installed to protect it from power outages. The file server must have zero downtime once placed into production. Which of the following power sources should the file server utilize?
A line conditioner
A surge protector connected to a UPS
A surge protector
An uninterruptible power supply
An uninterruptible power supply
The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend?
Use a Remote Desktop Protocol application on a Windows 10 desktop
Install and deploy Windows 10 Home edition on each user’s thick client
Install and deploy thin client without an operating system for each user
Use a Virtual Network Client (VNC) on a Windows 2019 server
Install and deploy thin client without an operating system for each user
Your company has just installed 50 new LCD monitors to replace some older CRT monitors. How should you properly dispose of the old CRT monitors?
Recycle them
Give them to charity
Haul them to the landfill
Follow local government regulations and handling procedures
Follow local government regulations and handling procedures
Which of the following commands can be used to install software on a Linux system?
nano
yum
cat
grep
yum
You are assisting a network administrator with updating the firmware of a Cisco iOS-based router. This router is the only border router for your organization, and it connects them to the internet. A request for change (RFC) is being written and contains the purpose, plan, scope, and risk analysis of the proposed change. Which of the following should be added to the RFC before its approval?
Document a blackout plan if the update is not successful
Update the asset management database with the new router’s asset ID
Extend the maintenance database with the new router’s asset ID
Configure a secondary route during the maintenance window
Document a blackout plan if the update is not successful
What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card’s hardware address?
WEP
WPS
MAC filtering
Disable SSID broadcast
MAC filtering
A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?
Document the pop-ups displayed and take a screenshot
- Quarantine the machine and report it as infected to your company’s cybersecurity department for investigation
Clear the browser’s cookies, history, and enable the pop-up blocker
Reinstall or reimage the operating system
Quarantine the machine and report it as infected to your company’s cybersecurity department for investigation
Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as?
Power spikes
Power failure
Under-voltage event
Power surge
Under-voltage event
A network technician determines that two dynamically assigned workstations have duplicate IP addresses. What command should the technician use to correct this issue?
ipconfig /release | ipconfig /renew
ipconfig /all
ipconfig /renew
ipconfig /dhcp
ipconfig /release | ipconfig /renew
During a penetration test of your company’s network, the assessor came across a spreadsheet with the passwords being used for several servers. Four of the passwords recovered are listed below. Which one is the weakest password and should be changed FIRST to increase the password’s complexity?
P@$$w0rd
pa55word
Pa55w0rd
P@$$W0RD
pa55word
Which of the following Control Panel sections would allow a technician to turn on Hyper-V on a Windows 10 Pro workstation?
Programs and Features
Devices and Printers
Device Manager
System
Programs and Features
Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as challenge/response and password encryption?
ISAKMP
TACACS+
Network Access Control
Multi-Factor Authentication
TACACS+
The customer service manager at Dion Training is having issues with her Windows 10 laptop. A technician believes that the operating system may have been corrupted by a piece of malware. The technician has removed the malware and wants to perform an installation or upgrade that will recopy the system files and revert most of the system settings to their default configurations while still preserving the user’s personalization settings, data files, and any applications installed through the Windows store. The technician has been told that they may delete any applications installed by the user, though, since they may have been infected by the malware. Which of the following types of upgrades or installations should the technician use?
Clean Install
In-Place Upgrade
Refresh Installation
Repair Installation
Refresh Installation
Susan, an executive at Dion Training, will be traveling to Italy for a conference next week. She is worried about remaining connected to the internet while overseas and plans to use the Wi-Fi in her hotel room and the local coffee shop with her laptop. Which of the following should she purchase and configure before leaving for Italy to ensure her communications remain secure regardless of where she is connecting from?
VPN
Local Mobile Hotspot
International Data Roaming Plan on her Cellphone
Local SIM card for her smartphone
VPN
Which of the following commands is used on a Linux system to display the current working directory’s full pathname to the screen?
Chown
pwd
chmod
passwd
pwd
Which of the following workstation operating systems are Ubuntu and Red Hat considered?
Linux
macOS
Windows
Android
Linux
You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which of the following concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet?
NAT
Perimeter Network
UPnP
DHCP
NAT
Dion Consulting Group has been hired by a small real estate office to build its network. The office has 4 computers running Windows 10 Professional edition configured in a workgroup to access a shared file server. Which of the following types of network models is being used by this real estate office?
Hub-and-spoke
Mesh
Client/Server
Peer-to-peer
Peer-to-peer
During the reconnaissance phase of a penetration test, you have determined that your client’s employees all use iPhones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these?
Use a tool like ICSSPLOIT to target specific vulnerabilities
Identify a jailbroken device for easy exploitation
Use social engineering to trick a user into opening a malicious APK
Use web-based exploits against the devices web interfaces
Identify a jailbroken device for easy exploitation
Which of the following techniques would be the most appropriate solution to implementing a multi-factor authentication system?
Username and password
Fingerprint and retinal scan
Smartcard and PIN
Password and security question
Smartcard and PIN
Which of the following network configurations is used to identify your computer’s individual host identifier and your computer’s network identifier?
Gateway
Subnet mask
WINS
DNS
Subnet mask
Which of the following data types would be used to store a user’s name?
Integers
Boolean
Floating point
String
String
Your company is expanding its operations in the European Union and is concerned about additional governmental regulations that may apply. Which of the following regulations applies when processing personal data within the European Union?
PHI
PII
PCI
GDPR
GDPR
A user receives the following error message: “Windows Update cannot currently check for updates because the service is not running.” The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT?
Reboot the computer
Restart the network services
Register the Windows Update service’s DLL files
Rollback the device drivers
Reboot the computer
Jason checks the Dion Training server room and finds that it currently has only 10% humidity. Which of the following risks to the servers could occur due to this low humidity level?
Corrosion of the servers
An under-voltage event
An over-voltage event
Accidental static discharge
Accidental static discharge
Which of the following commands is used on a Linux system to copy a file from one directory to another directory?
cp
mv
rm
ls
cp
Which command-line entry would be used on a Windows system to test if your system can reach diontraining.com?
sfc diontraining.com
ping diontraining.com
ipconfig diontraining.com
net use diontraining.com
ping diontraining.com
You are working on a Windows 10 workstation with a 1 TB HDD and 16 GB of memory that is operating slowly when reading large files from its storage device. Which of the following commands should you use to speed up this workstation?
ipconfig
chkdsk
diskpart
format
chkdsk
Which of the following commands would you use to duplicate the file c:\Users\Jason\Downloads\newfile.docx to c:\Users\Jason\Desktop\newfile.docx from the command line?
chkdsk
net user
copy
diskpart
Copy
A home user contacts the help desk and states that their desktop applications are running very slowly. The user also says that they have not received any emails all morning, but they normally get at least 5-10 emails each day. The help desk technician gets permission from the home user to remotely access their computer and runs some diagnostic scripts. The technician determines that the CPU performance is normal, the system can ping the local router/gateway, and the system can load websites slowly, or they fail to load completely. During the diagnosis, the technician also observes the remote connection dropping and reconnecting intermittently. Which of the following should the technician attempt to perform NEXT to resolve the user’s issue?
-Boot into the BIOS setup, enable TPM, reboot into safemode, and perform
a System Restore
-Empty the web browser’s cache, send a test email to the technician’s
personal account, and open the Explorer to check the file system
- Reboot into safe mode, uninstall the last OS update, and run a CHKDSK
against the hard
- Update the anti-virus software, run a full system, and verify the web
browser’s and email client’s settings
Update the anti-virus software, run a full system, and verify the web browser’s and email client’s settings
You need to connect to a Linux server to conduct some maintenance. The server is located in a remote office about 50 miles away. You decide to connect the server remotely instead of driving to the location to save some time, but you want to ensure you do this securely. The Linux server has VNC installed, but it isn’t configured to provide an encrypted connection. Which of the following should you use to secure the VNC connection to the remote server?
RDP
WPA2
HTTPS
SSH in tunnel mode
SSH in tunnel mode
What is the minimum amount of memory required to install Windows 10 (x64) on a device?
4 GB
1 GB
8 GB
2 GB
2 GB
Which edition of Windows 10 does not have the group policy editor enabled?
Enterprise
Pro for Workstations
Pro
Home
Home
An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing?
Phishing
Bluejacking
ARP spoofing
DoS
DoS
You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk?
diskpart list
bootrec /rebuildbcd
bootrec /fixmbr
bootrec /fixboot
bootrec /fixmbr
Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards?
PHI
PII
PCI-DSS
GDPR
PCI-DSS
You are installing a new wireless network in your office building and want to ensure it is secure. Which of the following configurations would create the MOST secure wireless network?
WEP and TKIP
WPA2 and AES
WPA and MAC filtering
WPA2 and RC4
WPA2 and AES
Last week, a technician remediated a malware infection on Karen’s laptop. Today, she shows up at the service desk, frustrated because her laptop appears to have been infected again. What step of the malware remediation process did the technician MOST likely forget to complete?
Educating the end user
Quarantining the infected laptop
Investigate and verify malware symptoms
Enabling System Restore
Educating the end user
You are writing a script that will take an employee’s name as the input. Which of the following data types would the employee’s name be stored in?
Integers
Boolean
Float
String
String
A user’s smartphone has become unresponsive since installing the latest iOS update. Which of the following should a technician do to restore the smartphone’s performance?
Update the applications
Reimage the device
Rollback the iOS update
Perform a factory reset
Rollback the iOS update
An ethical hacker has been hired to conduct a physical penetration test of a company. During the first day of the test, the ethical hacker dresses up like a plumber and waits in the building’s main lobby until an employee goes through the main turnstile. As soon as the employee enters his access number and proceeds to go through the turnstile, the ethical hacker follows them through the access gate. What type of attack did the ethical hacker utilize to access the restricted area of the building?
Social Engineering
Tailgating
Spoofing
Shoulder surfing
Tailgating
What is the SIXTH step of the seven-step malware removal process?
Educate the end user
Update the applications and the operating system
Quarantine the infected system
Enable System Restore and create a restore point in Windows
Enable System Restore and create a restore point in Window
Fail to Pass Solutions has requested that its employees have a mobile device so that they can respond to questions when they are out of the office. Each employee is responsible for buying their Android smartphone and cellular plan service. To access the corporate network and its data, the employees need to install a company-provided APK on their device. This app contains access to their company-provided email, cloud storage, and customer relationship management (CRM) database. Which of the following policies BEST describes Fail to Pass’s mobile device deployment model?
COBO
CYOD
COPE
BYOD
BYOD
Jason is using a Windows 10 workstation in the Dion Training conference room. The workstation is acting extremely slow and he suspects there are other accounts logged on to the workstation. Which of the following features in the Task Manager should he use to identify if anyone else is currently logged on to the workstation?
Users
Services
Performance
Processes
Users
Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user’s passwords?
Tailgating
Phishing
On-path attack
Shoulder surfing
Shoulder surfing
Which of the following components presents the largest risk of electrical shock to a technician?
LCD monitor
CRT monitor
Laptop battery
Hard drive
CRT monitor
A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?
Conduct an antivirus scan
Upgrade their web browser
Check the host.ini file
Disable System Restore
Check the host.ini file
John is setting up 100 Windows 10 computers for a new corporate office. He wants to ensure that no one can change the boot order and boot from an unauthorized operating system. What feature should he ensure is enabled?
RAM integrity checking
Full disk encryption
Secure Boot
BIOS password required
BIOS password required
Which of the following types of screen locks uses a biometric authentication system to prevent access to a mobile device?
Swipe
Passcode
Pattern lock
TouchID