Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Lab Safety Test: Cyber Foundations2 _Coach Aaron

Lab Safety Test: Cyber Foundations2 _Coach Aaron

6th - 12th Grade

22 Qs

ICT 9 Q1 M5, MATERIALS, TOOLS, EQUIPMENT AND TESTING DEVICES

ICT 9 Q1 M5, MATERIALS, TOOLS, EQUIPMENT AND TESTING DEVICES

9th Grade

25 Qs

Photoshop Tools and Procedures

Photoshop Tools and Procedures

9th - 12th Grade

20 Qs

hardware

hardware

11th - 12th Grade

20 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

computer organization fundamentals

computer organization fundamentals

9th - 10th Grade

20 Qs

4th summative exam 1st quarter

4th summative exam 1st quarter

10th Grade

20 Qs

IT1 Final Term Quiz2 2022

IT1 Final Term Quiz2 2022

12th Grade

20 Qs

Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Medium

Created by

Ciara Williams

Used 5+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Having a generator to power your office in case of a power outage is a ________ plan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a generator to power your office in case of a power outage is a contingency plan

speed

ease of use

continuous availability

presentation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users should learn always to lock their workstations and mobile devices when leaving them unattended

Ture

False

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Windows can be locked by pressing WINDOWS+

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

surfing refers to stealing a password or PIN, or other secure information, by watching the user type it.

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Most specific identity ​ (a)   are aimed at getting someone to reveal their ​ (b)   , or other secure information, through a ​ (c)   or other social ​ (d)   .

frauds
logon
phishing
engineering attack
fualt
PII
OEM
latency
throughput

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PII is often used for password reset mechanisms and to confirm identity over the telephone.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?