Your friend Andrew has confirmed that someone has been using his password to log in to his social media account. He believes that two bank accounts may also have been compromised. Which of the following password best practices has Andrew MOST likely violated?

ITF+ TS B4

Quiz
•
Instructional Technology
•
University
•
Medium
Paul Pesce
Used 1+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Password age
Password length
Password reuse
Password history
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon.
Which of the following steps have you forgotten in your troubleshooting process?
Implement the solution.
Verify system functionality.
Perform a backup.
Create an action plan.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the best definition of a bit?
A single 1 or 0 in a digital signal
An electrical signal in a wire
A physical signal that becomes a digital signal
A measure of computer graphics and sound
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users.
Which of the following is the BEST approach to solving these problems?
Approach each problem separately.
Try to find the relationship between the problems.
Create an action plan for each problem.
Back up the system hosting the financial application.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How much power can a USB 3.0 dedicated charging port supply?
2.5W
4.5W
15W
7.5W *choose
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?
Read & Execute
Modify *choose
Read
Full Control
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Diane has a few files on her computer that she does not want anyone to read. She has placed strict file permissions on them, which will help accomplish this goal. Which other security feature could she use to guarantee no one else can read these files?
Hide
Zip
Encryption
Compression
Create a free account and access millions of resources
Similar Resources on Quizizz
25 questions
Connectivism Learning Theory

Quiz
•
University - Professi...
25 questions
Computer Hardware Quiz

Quiz
•
7th Grade - University
25 questions
Introduction to Alexa Skills and APIs

Quiz
•
10th Grade - Professi...
25 questions
Keyboarding and Document Processing - Long Quiz

Quiz
•
University
25 questions
EPA 608 Exam Study Type II

Quiz
•
11th Grade - University
25 questions
Grade 7 IA Q4Week3 Test

Quiz
•
7th Grade - University
25 questions
Copyright and Creative Commons

Quiz
•
6th Grade - University
25 questions
RA 9418

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade