Search Header Logo

Testout 9

Authored by BlurVee BlurVee

Computers

11th Grade

Used 10+ times

Testout 9
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you arrive at your company, you discover that a hard drive with your customer's sensitive information has been stolen. You feel confident that the thief will not be able to view the data on this hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive?

BitLocker To Go

Windows Security

Microsoft Defender

BitLocker with TPM

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best reader in the past, you decide to send him the new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer?

The file was corrupted during the sending process.

The wrong file extension was used when saving the file.

Mark's computer does not have the same program that you used to write the proposal.

The wrong email address is selected for the type of file that you sent.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements are true regarding administrative shares? (Select two.)

Adding a ! sign to the end of a share name creates an administrative share.

Default administrative shares grant access to the Administrators or Power Users group.

By default, Windows automatically creates an administrative share for every volume.

To connect to an administrative share, you must use the UNC path.

If you are a member of the Administrators group, the administrative shares are visible to you when you browse the network.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user has a problem accessing several shared folders on the network. After determining that the issue is not from his computer's IP configuration, you suspect that the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

net use

netstat

ipconfig

netstat -r

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You manage the two folders listed below on your computer: C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. On the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Costs.doc Reports.doc You then take the following actions. You: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files.

Permissions are kept on both files.

Permissions are kept for Reports.doc but removed from Costs.doc.

Permissions are removed from Reports.doc but kept for Costs.doc.

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

You want to know more about the usage, command syntax, and options available with the Linux cat command. What would you enter at the Command Prompt to display this information about the cat command?

(a)  

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to this computer?

Have the user search the internet for a local store and drive to the store to share.

Establish remote assistance and transfer the file within the session.

Use the C$ administrative share to copy the file.

Attach the file to an email and have the user copy the file to the correct folder.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?