ET-C2 (1-25)

ET-C2 (1-25)

2nd Grade

25 Qs

quiz-placeholder

Similar activities

Operating Systems

Operating Systems

KG - University

20 Qs

Computer Maintenance

Computer Maintenance

1st Grade - Professional Development

20 Qs

Linux Basic

Linux Basic

1st - 12th Grade

20 Qs

Web Page Evaluation

Web Page Evaluation

KG - University

22 Qs

Data Security (G8)

Data Security (G8)

2nd Grade

20 Qs

Javascript

Javascript

1st - 5th Grade

25 Qs

COMPTIA ITF

COMPTIA ITF

1st Grade - Professional Development

29 Qs

Introduction to Operating System

Introduction to Operating System

1st - 3rd Grade

20 Qs

ET-C2 (1-25)

ET-C2 (1-25)

Assessment

Quiz

Computers

2nd Grade

Medium

Created by

Roger White

Used 7+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

SFTP

SSH

VNC

MSRA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?

Reinstalling Windows

Performing a quick format

Using disk-wiping software

Deleting all files from command-line interface

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

Reset the phone to factory settings.

Uninstall the fraudulent application.

Increase the data plan limits.

Disable the mobile hotspot.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

End user acceptance

Perform risk analysis

Communicate to stakeholders

Sandbox testing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST?

Scan and remove the malware.

Schedule automated malware scans.

Quarantine the system.

Disable System Restore.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Anti-malware

Remote wipe

Locator applications

Screen lock

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?

Run a full antivirus scan on the computer.

Disable the browser from sending notifications to the Action Center.

Disable all Action Center notifications.

Move specific site notifications from Allowed to Block.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?