MTA Security Fund 5

MTA Security Fund 5

10th - 12th Grade

75 Qs

quiz-placeholder

Similar activities

preTEST Pranata Komputer Terampil Part 1

preTEST Pranata Komputer Terampil Part 1

10th Grade - Professional Development

80 Qs

Latihan Test Pengetahuan AIJ Kelas XII

Latihan Test Pengetahuan AIJ Kelas XII

12th Grade

70 Qs

LS 6: COMPUTER CITIZENSHIP

LS 6: COMPUTER CITIZENSHIP

10th Grade

73 Qs

FINAL  ASK F3 (PART A&B)

FINAL ASK F3 (PART A&B)

10th Grade

80 Qs

Asesmen Awal  informatika fase F

Asesmen Awal informatika fase F

12th Grade

70 Qs

Hardware & Software

Hardware & Software

10th Grade

80 Qs

QUIZ 02 KONSENTRASI DKV-4 (VIDEOGRAFI)

QUIZ 02 KONSENTRASI DKV-4 (VIDEOGRAFI)

11th Grade

75 Qs

KELAS XI

KELAS XI

11th Grade

70 Qs

MTA Security Fund 5

MTA Security Fund 5

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Windows tool is used to encrypt removable drives?

EFS

TPM

BitLocker

BitLocker To Go

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the I.T. field, impersonation, such as a person impersonating a help desk agent and asking for a password, is a type of what kind of attack?

Threat modeling

Administrative control

Attack service analysis

Social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IEEE 802.11 standard defines the name for a WLAN as the ___________

SSID

WAP

WLAN

WEP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital signature included in an email is used to do what?

Encrypt message

Validate the recipient

Decrypt the message

Validate the sender

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which password policy prohibits reusing the same password?

Lockout policy

History policy

Length policy

Complexity policy

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which three characteristics describe Worms?

Uses system resources like bandwidth, memory, and processor time, which makes the computer run slow

Contained in most music and videos

Typically does not corrupt or modify files

A self-replacing program that copies itself to other computers without user intervention

Only passed by email

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A department head wants to control the types of permissions and the recipient of permissions on a set of folders for the department. The department head is not in the Administrator's group. What should the department head do in order to be able to control permissions?

Become an Administrator

Gain Modify permissions on the folder

Gain Full Control permissions on the folder

Take ownership of the folder

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?