98-367

98-367

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

python lists

python lists

10th Grade

20 Qs

REPASO EXCEL

REPASO EXCEL

6th - 10th Grade

20 Qs

Examen Octubre

Examen Octubre

10th Grade

20 Qs

สอบปลายภาคเรียนที่ 1/2562 ม.3

สอบปลายภาคเรียนที่ 1/2562 ม.3

9th Grade

20 Qs

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

PSTS Administrasi Infrastruktur Jaringan Kelas XII TKJ

12th Grade

20 Qs

Berpikir Komputasional

Berpikir Komputasional

10th Grade

20 Qs

Remedial PH 1 AIJ XII

Remedial PH 1 AIJ XII

12th Grade

20 Qs

Asesment technopreneur dkv

Asesment technopreneur dkv

10th Grade

20 Qs

98-367

98-367

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Thomas Ray

Used 54+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your password is 1Vu*cI!8sT
Which attack method is your password vulnerable to?

 Rainbow table
Brute force
Spidering
Dictionary

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of users has access to Folder A and all of its contents. You need to prevent some of the users from accessing a subfolder inside Folder A. What should you do first?

 Disable folder sharing
Hide the folder
Change the owner
Block inheritance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the minimum requirement to create BitLocker-To-Go media on a client computer?

Windows XP Professional Service Pack 3
Windows Vista Enterprise Edition
Windows 7 Enterprise Edition
Windows 2000 Professional Service Pack 4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many Internet sites that you visit require a user name and password. How should you secure these passwords?

Save them to a text file
Reuse the same password
Save them to an encrypted file
Configure the browser to save passwords

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Active Directory controls, enforces, and assigns security policies and access rights for all users.

NTFS permissions
User Account Control
Registry
No change is needed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two security settings can be controlled by using group policy?

Password complexity + Access to the Run... command
Automatic file locking + Encrypted access from a smart phone

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Account lockout policies are used to prevent which type of security attack?

 Brute force attacks
Users sharing passwords
 Social engineering
Passwords being reused immediately

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?