98-367 PT3

98-367 PT3

9th - 12th Grade

35 Qs

quiz-placeholder

Similar activities

ĐỀ CƯƠNG ÔN TẬP CÔNG NGHỆ 4 CUỐI KỲ 2

ĐỀ CƯƠNG ÔN TẬP CÔNG NGHỆ 4 CUỐI KỲ 2

10th Grade

32 Qs

dasar desain grafis

dasar desain grafis

10th Grade

33 Qs

Mid Tes HTML Quiz

Mid Tes HTML Quiz

11th Grade

35 Qs

Tin học 11c2

Tin học 11c2

11th Grade

40 Qs

Prueba de Microsoft Excel

Prueba de Microsoft Excel

7th - 9th Grade

33 Qs

Computer Pretest(Arduino)

Computer Pretest(Arduino)

12th Grade

33 Qs

KUIZ TMK TAHUN 6

KUIZ TMK TAHUN 6

12th Grade

40 Qs

1.1.1. Structure and function of the processor

1.1.1. Structure and function of the processor

12th Grade

34 Qs

98-367 PT3

98-367 PT3

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Thomas Ray

Used 90+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two are included in an enterprise antivirus program?

On-demand scanning
Scheduled scanning
Attack surface scanning
Packet scanning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Windows Firewall protects computers from unauthorized network connections.

Email viruses
Phishing scams
Unencrypted network access
No change is needed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When conducting a security audit the first step is to:

Inventory the company's technology assets
Install auditing software on your servers
Set up the system logs to audit security events
Set up a virus quarantine area

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Setting a minimum password age restricts when users can:

Request a password reset
Change their passwords
Log on by using their passwords
Set their own password expiration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The purpose of a digital certificate is to verify that a:

Public key belongs to a sender.
Computer is virus-free.
Private key belongs to a sender.
Digital document is complete.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You create a new file in a folder that has inheritance enabled. By default, the new file:

Takes the permissions of the parent folder
Does not take any permissions
Takes the permissions of other folders in the same directory
Takes the permissions of other files in the same directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dumpster diving refers to a physical threat that a hacker might use to look for information
about a computer network.

Phishing
Malware
Reverse Social Engineering
No Change is Needed

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?