Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

GLOSARIO DE TERMINOS

GLOSARIO DE TERMINOS

7th - 11th Grade

20 Qs

Evaluación 1: Ofimática

Evaluación 1: Ofimática

1st - 12th Grade

20 Qs

Điện trở, tụ điện, cuộn cảm

Điện trở, tụ điện, cuộn cảm

12th Grade

20 Qs

Actúa - Informática Nivel Básico

Actúa - Informática Nivel Básico

3rd Grade - Professional Development

21 Qs

Arrays

Arrays

9th - 12th Grade

21 Qs

Tes Uji Kompetensi Klaster EFI

Tes Uji Kompetensi Klaster EFI

11th - 12th Grade

20 Qs

CDI - Electronic Components & Signals

CDI - Electronic Components & Signals

10th - 12th Grade

27 Qs

ÔN TẬP CN8

ÔN TẬP CN8

8th Grade - University

20 Qs

Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Practice Problem

Medium

Created by

Ciara Williams

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Having a generator to power your office in case of a power outage is a ________ plan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a generator to power your office in case of a power outage is a contingency plan

speed

ease of use

continuous availability

presentation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users should learn always to lock their workstations and mobile devices when leaving them unattended

Ture

False

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Windows can be locked by pressing WINDOWS+

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

surfing refers to stealing a password or PIN, or other secure information, by watching the user type it.

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Most specific identity ​ (a)   are aimed at getting someone to reveal their ​ (b)   , or other secure information, through a ​ (c)   or other social ​ (d)   .

frauds
logon
phishing
engineering attack
fualt
PII
OEM
latency
throughput

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PII is often used for password reset mechanisms and to confirm identity over the telephone.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?