Search Header Logo

Computer Software Prep 2

Authored by Ray Heyob

Computers

9th - 12th Grade

Used 5+ times

Computer Software Prep 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your costumer has lost her internet access. To try to fix this issue you update network drivers on her computer. How do you verify that the update resolved the issue?

Access to the internet has been restored
Verify ability to print
Receive a test email

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At which point in the diagram will you evaluate information about the problem

Analyze Data
Design Solution
Test Solution
Document Process

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An advantage of cloud computing is

high availability
high energy cost
low bandwidth usage
retrieval speed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best porcedure for documenting and recording which computers have been configured and deployed throughout your organization?

Document immediately after installation on each workstation
Document intallations at the end of each day
Document installations on a sticky note on each monitor to inform the user
Document once all workstations are deployed to end-users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clark intentionally leaves an infected flash drive in the parking lot of a bank in hopes that a bank employee will find it, plug it into their workstation, and grant him remote access inside the bank's firewall. What type of attack is Clark attempting?

Spyware
Spoofing
Phishing/Vishing
Social Engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Francesca is developing a disaster recovery plan that needs to include natural disasters to the building. What should be included in their plan?

Off-site backup storage
Full, on-site backups
Daily incremental backups
Full device MDM backup

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have installed a new application on a computer and you immedietly notice that the application is not working correctly. You suspect the software might have been tempered with. You decided to prepare the computer for law enforcement to investigate. Why is chain of custody important in preserving this evidence?

So the evidence is preserved for court
So the evidence is preserved to show the CTO who tampered with the software
So law enforcement can correct the problem
To show where the software was obtained.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?