Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Primary 1 Computing Term 2 Assessment

Primary 1 Computing Term 2 Assessment

1st Grade - University

21 Qs

D.M.B.K's quizzez

D.M.B.K's quizzez

11th - 12th Grade

20 Qs

Logos de Informática

Logos de Informática

9th Grade

20 Qs

Tugas Jaringan Komputer Kelas XI - XII

Tugas Jaringan Komputer Kelas XI - XII

11th Grade - University

20 Qs

Setting Up a PC System

Setting Up a PC System

KG - 12th Grade

22 Qs

4th summative exam 1st quarter

4th summative exam 1st quarter

10th Grade

20 Qs

Lab Safety Test: Cyber Foundations2 _Coach Aaron

Lab Safety Test: Cyber Foundations2 _Coach Aaron

6th - 12th Grade

22 Qs

IT1 Final Term Quiz2 2022

IT1 Final Term Quiz2 2022

12th Grade

20 Qs

Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Medium

Created by

Ciara Williams

Used 5+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Having a generator to power your office in case of a power outage is a ________ plan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a generator to power your office in case of a power outage is a contingency plan

speed

ease of use

continuous availability

presentation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users should learn always to lock their workstations and mobile devices when leaving them unattended

Ture

False

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Windows can be locked by pressing WINDOWS+

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

surfing refers to stealing a password or PIN, or other secure information, by watching the user type it.

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Most specific identity ​ (a)   are aimed at getting someone to reveal their ​ (b)   , or other secure information, through a ​ (c)   or other social ​ (d)   .

frauds
logon
phishing
engineering attack
fualt
PII
OEM
latency
throughput

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PII is often used for password reset mechanisms and to confirm identity over the telephone.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?