Computer Maintenance Ch. 18 Security Strategies

Computer Maintenance Ch. 18 Security Strategies

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals

Cybersecurity Fundamentals

10th Grade

15 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

CYBER SAFETY

CYBER SAFETY

9th Grade

20 Qs

Cyber Security Homework 2

Cyber Security Homework 2

7th - 9th Grade

15 Qs

Cyber Security and Social Engineering

Cyber Security and Social Engineering

9th - 11th Grade

18 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Network Security

Network Security

11th Grade

20 Qs

Computer Maintenance Ch. 18 Security Strategies

Computer Maintenance Ch. 18 Security Strategies

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

WILLIAM BELIVEAU

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command can be used to launch the User Accounts or Network Places Wizard, which can be used to manage users and their passwords?

netplwiz

usraccwiz

gpedit

gpupdate

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should a user do before they walk away from their computer in order to keep it secure?

press Ctrl+Alt+Del

press Win+L

click on Start, then click Secure Workstation

turn off the monitor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a computer that has been hacked and the hacker is using the computer to run repetitive software in the background without the knowledge of its user?

zero-day attack

zombie

man-in-the-middle

spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which logon method is considered the most secure method?

requiring users to press Ctrl+Alt+Del

booting to advanced startup

using the welcome screen

requiring users to press the Win+L

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best example of a strong password?

Qwerty

p@ssw0rd

$y@mM2rr

abcdefg

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is best to use when destroying data on a SSD drive?

electromagnetic utility

degausser

Secure Erase utility

zero-fill utility

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For which type of problem might you visit www.snopes.com?

tailgating

email hoax

zero-day attack

keylogger

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?