mock 5

mock 5

University

25 Qs

quiz-placeholder

Similar activities

Informática 1ra Semana

Informática 1ra Semana

University

20 Qs

PRE2041-R5

PRE2041-R5

University

20 Qs

Lesson 3 (Model Training)

Lesson 3 (Model Training)

University

20 Qs

L1AR17 Interior Valeting.

L1AR17 Interior Valeting.

University

20 Qs

TIN HỌC 7

TIN HỌC 7

9th Grade - University

22 Qs

HCI - Quiz 1

HCI - Quiz 1

University

20 Qs

Aula Invertida y las TICS C1, C2 y C3

Aula Invertida y las TICS C1, C2 y C3

University

20 Qs

REMEDIAL PAS KJD GANJL

REMEDIAL PAS KJD GANJL

University

20 Qs

mock 5

mock 5

Assessment

Quiz

Instructional Technology

University

Practice Problem

Medium

Created by

hanan hanan.ahmed@esgsa.com

Used 75+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which best describes a directory structure?

A way of storing names and addresses.

A network structure.

A way or organising files and folders.

A network topology.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of profile permits users to access a network from any terminal on a LAN?

A roaming profile.

An options profile.

A server profile.

A log-out profile.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What function is performed when the F8 key is pressed during start-up on an MS Windows system?

Boot to BIOS.

Boot to safe mode.

Boot to command prompt.

Boot to desktop.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What would cause a blue screen error?

The network.

The hard drive.

The graphics card.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What piece of infrastructure connects two or more networks in a system?

A hub.

A gateway.

A server.

A firewall.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the first stage of an impersonation attack?

The accessing of a system to steal software.

The misuse of existing log-in details.

The infection of a system via BIOS.

The deletion of user data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which is considered an organizational security threat?

Accidental data loss.

Computer roaming.

Remote access of drives.

A shared resources policy.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?