98-367 PT3

98-367 PT3

9th - 12th Grade

35 Qs

quiz-placeholder

Similar activities

TJBL  (JARINGAN BERBASIS LUAS)

TJBL (JARINGAN BERBASIS LUAS)

11th Grade

40 Qs

Latihan Soal 3 - SIMKOMDIG

Latihan Soal 3 - SIMKOMDIG

10th Grade

30 Qs

TIK kelas 7, Penilaian Tengah semester

TIK kelas 7, Penilaian Tengah semester

7th Grade - University

40 Qs

Sumatif Tengah Sem2  Informatika 11F

Sumatif Tengah Sem2 Informatika 11F

11th Grade

40 Qs

UTS1 XII TKJ B Teknologi Layanan Jaringan

UTS1 XII TKJ B Teknologi Layanan Jaringan

12th Grade

40 Qs

PROGRAMMING(MIDTERM EXAM)

PROGRAMMING(MIDTERM EXAM)

12th Grade

35 Qs

Programming Techniques

Programming Techniques

8th - 10th Grade

30 Qs

MYOB Asyiik

MYOB Asyiik

11th Grade

40 Qs

98-367 PT3

98-367 PT3

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Thomas Ray

Used 90+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two are included in an enterprise antivirus program?

On-demand scanning
Scheduled scanning
Attack surface scanning
Packet scanning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Windows Firewall protects computers from unauthorized network connections.

Email viruses
Phishing scams
Unencrypted network access
No change is needed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When conducting a security audit the first step is to:

Inventory the company's technology assets
Install auditing software on your servers
Set up the system logs to audit security events
Set up a virus quarantine area

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Setting a minimum password age restricts when users can:

Request a password reset
Change their passwords
Log on by using their passwords
Set their own password expiration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The purpose of a digital certificate is to verify that a:

Public key belongs to a sender.
Computer is virus-free.
Private key belongs to a sender.
Digital document is complete.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You create a new file in a folder that has inheritance enabled. By default, the new file:

Takes the permissions of the parent folder
Does not take any permissions
Takes the permissions of other folders in the same directory
Takes the permissions of other files in the same directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dumpster diving refers to a physical threat that a hacker might use to look for information
about a computer network.

Phishing
Malware
Reverse Social Engineering
No Change is Needed

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?