Search Header Logo

ITF+ TO B.4

Authored by Paul Pesce

Instructional Technology

University

ITF+ TO B.4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

51 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your friend Andrew has confirmed that someone has been using his password to log in to his social media account. He believes that two bank accounts may also have been compromised. Which of the following password best practices has Andrew MOST likely violated?

Password length

Password reuse

Password history

Password age

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon.

Which of the following steps have you forgotten in your troubleshooting process?

Create an action plan.

Implement the solution.

Verify system functionality.

Perform a backup.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best definition of a bit?

A single 1 or 0 in a digital signal

An electrical signal in a wire

A physical signal that becomes a digital signal

A measure of computer graphics and sound

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users.

Which of the following is the BEST approach to solving these problems?

Back up the system hosting the financial application.

Approach each problem separately.

Create an action plan for each problem.

Try to find the relationship between the problems.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?

Full Control

Read & Execute

Read

Modify

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Diane has a few files on her computer that she does not want anyone to read. She has placed strict file permissions on them, which will help accomplish this goal. Which other security feature could she use to guarantee no one else can read these files?

Compression

Zip

Encryption

Hide

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of non-repudiation implemenation? (Select two.)

Mandatory access control

Biometrics

Multifactor authentication

Surveillance cameras

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology