
ITF+ TO B.4

Quiz
•
Instructional Technology
•
University
•
Hard
Paul Pesce
FREE Resource
51 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your friend Andrew has confirmed that someone has been using his password to log in to his social media account. He believes that two bank accounts may also have been compromised. Which of the following password best practices has Andrew MOST likely violated?
Password length
Password reuse
Password history
Password age
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon.
Which of the following steps have you forgotten in your troubleshooting process?
Create an action plan.
Implement the solution.
Verify system functionality.
Perform a backup.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the best definition of a bit?
A single 1 or 0 in a digital signal
An electrical signal in a wire
A physical signal that becomes a digital signal
A measure of computer graphics and sound
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A system administrator is troubleshooting a company financial application that has several problems, including locking up on Windows 10 laptops, failing to save automatically, and allowing access to unauthorized users.
Which of the following is the BEST approach to solving these problems?
Back up the system hosting the financial application.
Approach each problem separately.
Create an action plan for each problem.
Try to find the relationship between the problems.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?
Full Control
Read & Execute
Read
Modify
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Diane has a few files on her computer that she does not want anyone to read. She has placed strict file permissions on them, which will help accomplish this goal. Which other security feature could she use to guarantee no one else can read these files?
Compression
Zip
Encryption
Hide
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are examples of non-repudiation implemenation? (Select two.)
Mandatory access control
Biometrics
Multifactor authentication
Surveillance cameras
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
ICT 9 2nd Quarter Review

Quiz
•
9th Grade - University
50 questions
TLE-IA-EIM 10 2ND QUARTER EXAM

Quiz
•
10th Grade - University
54 questions
Modules 1-3 Quizzes

Quiz
•
University
50 questions
MIDTERM EXAMINATION IN LIVING IN THE IT ERA

Quiz
•
University
50 questions
AMT 221 Final Quiz

Quiz
•
University
50 questions
BSCS 4-3 - Midterm Exam (Jan. 6, 2024)

Quiz
•
University
55 questions
SemesterExamReview

Quiz
•
12th Grade - University
50 questions
AUT 102 Pre/Post test

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade