
Feb23
Authored by Melvin Baker
Computers
9th - 12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?
Creating a database
Assigning users to assets
Inventorying asset tags
Updating the procurement account owners
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is command options is used to display hidden files and directories?
-s
-lh
-t
-a
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?
.bat
.dll
.ps1
.txt
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?
Turn on airplane mode.
Set the connection to be metered.
Configure the device to use a static IP address.
Enable the Windows Defender Firewall.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?
Quarantine the host in the antivirus system.
Investigate how the system was infected with malware.
Educate the end user on best practices for security.
Create a system restore point.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?
To maintain an information security policy
To properly identify the issue
To control evidence and maintain integrity
To gather as much information as possible
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the
user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?
Phishing
Dumpster diving
Tailgating
Evil twin
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
TEST1.PY
Quiz
•
10th Grade - University
20 questions
Berpikir Komputasional
Quiz
•
9th - 12th Grade
16 questions
Serial Communication - Sensors
Quiz
•
9th Grade
17 questions
Python. Функції
Quiz
•
9th Grade
15 questions
Q1 W1 M1 PRE-TEST
Quiz
•
10th Grade
20 questions
Database&Relation
Quiz
•
12th Grade
15 questions
HTML Quiz
Quiz
•
11th Grade - University
15 questions
User Interface Design - Topic 1
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade