IT Fundamentals 1
Quiz
•
9th - 12th Grade
•
Practice Problem
•
Medium
Cerima Thomas
Used 161+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A users laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another users laptop. How could the user have prevented this breach?
A. Disable file and print sharing on the laptop.
B. Delete unused drives from network.
C. Remove shared keys from the key ring.
D. Set the read-only attribute on the files.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?
A. Only browse the Internet on WiFi connections that use WPA2
B. Turn off the guest account in the operating system
C. Disable autofill functionality within the web browse
D. Remove any legacy browsers from the computer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following printers requires a special type of paper in order to print?
A. Impact
B. Thermal
C. Inkjet
D. Laser
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following
BEST describes this type of malware infection?
A. Ransomware
B. Adware
C. Spyware
D. Virus
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).
A. Keyboard
B. Speaker
C. Mouse
D. Bluetooth
E. NFC
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following extensions identifies a video file?
A. .msi
B. .tar
C. .img
D. .mp4
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
A. Hacking
B. Phishing
C. Spam
D. Cracking
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
10 questions
Understanding Meiosis
Interactive video
•
6th - 10th Grade
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
10 questions
Exploring Christmas Traditions Through Cartoons
Interactive video
•
6th - 10th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
