
Computer Software Prep 2
Authored by Ray Heyob
Computers
9th - 12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your costumer has lost her internet access. To try to fix this issue you update network drivers on her computer. How do you verify that the update resolved the issue?
Access to the internet has been restored
Verify ability to print
Receive a test email
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
At which point in the diagram will you evaluate information about the problem
Analyze Data
Design Solution
Test Solution
Document Process
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An advantage of cloud computing is
high availability
high energy cost
low bandwidth usage
retrieval speed
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best porcedure for documenting and recording which computers have been configured and deployed throughout your organization?
Document immediately after installation on each workstation
Document intallations at the end of each day
Document installations on a sticky note on each monitor to inform the user
Document once all workstations are deployed to end-users
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Clark intentionally leaves an infected flash drive in the parking lot of a bank in hopes that a bank employee will find it, plug it into their workstation, and grant him remote access inside the bank's firewall. What type of attack is Clark attempting?
Spyware
Spoofing
Phishing/Vishing
Social Engineering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Francesca is developing a disaster recovery plan that needs to include natural disasters to the building. What should be included in their plan?
Off-site backup storage
Full, on-site backups
Daily incremental backups
Full device MDM backup
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have installed a new application on a computer and you immedietly notice that the application is not working correctly. You suspect the software might have been tempered with. You decided to prepare the computer for law enforcement to investigate. Why is chain of custody important in preserving this evidence?
So the evidence is preserved for court
So the evidence is preserved to show the CTO who tampered with the software
So law enforcement can correct the problem
To show where the software was obtained.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?