Search Header Logo

Feb23

Authored by Melvin Baker

Computers

9th - 12th Grade

Used 2+ times

Feb23
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?

Creating a database

Assigning users to assets

Inventorying asset tags

Updating the procurement account owners

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is command options is used to display hidden files and directories?

-s

-lh

-t

-a

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

.bat

.dll

.ps1

.txt

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

Turn on airplane mode.

Set the connection to be metered.

Configure the device to use a static IP address.

Enable the Windows Defender Firewall.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

Quarantine the host in the antivirus system.

Investigate how the system was infected with malware.

Educate the end user on best practices for security.

Create a system restore point.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

To maintain an information security policy

To properly identify the issue

To control evidence and maintain integrity

To gather as much information as possible

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the

user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?

Phishing

Dumpster diving

Tailgating

Evil twin

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?