mock 5

mock 5

University

25 Qs

quiz-placeholder

Similar activities

Ed Tech Vocabulary (L. Beaty)

Ed Tech Vocabulary (L. Beaty)

5th Grade - University

22 Qs

CPA Prelims JY 2022

CPA Prelims JY 2022

8th Grade - Professional Development

20 Qs

IT01 CHAPTER 6

IT01 CHAPTER 6

University

20 Qs

BCS Systems & Architecture Quiz 1

BCS Systems & Architecture Quiz 1

University - Professional Development

20 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

ICT QUIZ

ICT QUIZ

University

20 Qs

Midterm Exam Review

Midterm Exam Review

5th Grade - University

20 Qs

Pa Emission Study Guide

Pa Emission Study Guide

12th Grade - University

20 Qs

mock 5

mock 5

Assessment

Quiz

Instructional Technology

University

Medium

Created by

hanan hanan.ahmed@esgsa.com

Used 75+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which best describes a directory structure?

A way of storing names and addresses.

A network structure.

A way or organising files and folders.

A network topology.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of profile permits users to access a network from any terminal on a LAN?

A roaming profile.

An options profile.

A server profile.

A log-out profile.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What function is performed when the F8 key is pressed during start-up on an MS Windows system?

Boot to BIOS.

Boot to safe mode.

Boot to command prompt.

Boot to desktop.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What would cause a blue screen error?

The network.

The hard drive.

The graphics card.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What piece of infrastructure connects two or more networks in a system?

A hub.

A gateway.

A server.

A firewall.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the first stage of an impersonation attack?

The accessing of a system to steal software.

The misuse of existing log-in details.

The infection of a system via BIOS.

The deletion of user data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which is considered an organizational security threat?

Accidental data loss.

Computer roaming.

Remote access of drives.

A shared resources policy.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?