Computers 2a

Computers 2a

12th Grade

50 Qs

quiz-placeholder

Similar activities

FC0-U61 - ITF (1)

FC0-U61 - ITF (1)

9th - 12th Grade

50 Qs

FC0-U61 - ITF (2)

FC0-U61 - ITF (2)

9th - 12th Grade

50 Qs

Computers 2i

Computers 2i

12th Grade

47 Qs

Computers 2g

Computers 2g

12th Grade

50 Qs

Computers 7

Computers 7

12th Grade

55 Qs

Computers 2b

Computers 2b

12th Grade

50 Qs

Q3 ICT Periodical Test

Q3 ICT Periodical Test

9th Grade - University

52 Qs

FC0-U61 - ITF (3)

FC0-U61 - ITF (3)

9th - 12th Grade

50 Qs

Computers 2a

Computers 2a

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Akau Anyieth

Used 13+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #2

Topic 1

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?


  • A. SFTP

  • B. SSH

  • C. VNC

  • D. MSRA

Answer explanation

SSH or Secure Shell is a network communication protocol that enables two computers to communicate (c.f http or hypertext transfer protocol, which is the protocol used to transfer hypertext such as web pages) and share data. The answer is B because we are discussing logging into a Linux SERVER (not a desktop). The best way to do that is via SSH.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #3

Topic 1

A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?


  • A. Reinstalling Windows

  • B. Performing a quick format

  • C. Using disk-wiping software

  • D. Deleting all files from command-line interface:

Answer explanation

The answer is C because both A and D will not accomplish wiping a hard drive, and subsequently a quick format will not sufficiently wipe information from a drive.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #4

Topic 1

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?


  • A. Reset the phone to factory settings.

  • B. Uninstall the fraudulent application.

  • C. Increase the data plan limits.

  • D. Disable the mobile hotspot.

Answer explanation

The application in question is clearly malware, therefore it is best to remove it. A factory reset can remove malware, but doing something drastic like that is usually not a first step. Additionally, C and D won't help with removing malware.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #5

Topic 1

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?


  • A. End user acceptance

  • B. Perform risk analysis

  • C. Communicate to stakeholders

  • D. Sandbox testing

Answer explanation

The change management phases are as follows: Request forms, Purpose of change, Scope of the change, Date and Time of the change, Affective systems/ impact, risk analysis, change board approval, finally end user acceptance. With this the answer is end user acceptance.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #6

Topic 1

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST?


  • A. Scan and remove the malware.

  • B. Schedule automated malware scans.

  • C. Quarantine the system.

  • D. Disable System Restore.

Answer explanation

After verifying the malware, quarantining would be the next step in malware removal process. Comptia Exam Objectives for malware removal. 1. Investigate and verify malware symptoms 2. Quarantine infected systems 3. Disable System Restore in Windows 4. Remediate infected systems a. Update anti-malware software b.Scanning and removal techniques (e.g., safe mode, preinstallation environment) 5. Schedule scans and run updates 6. Enable System Restore and create a restore point in Windows 7. Educate the end user

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #7

Topic 1

A company is issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?


  • A. Anti-malware

  • B. Remote wipe

  • C. Locator applications

  • D. Screen lock

Answer explanation

Remote wipe allows the company to remotely erase all data on the smartphone, preventing unauthorized access to sensitive information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #8

Topic 1

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?


  • A. Disable the browser from sending notifications to the Action Center.

  • B. Run a full antivirus scan on the computer.

  • C. Disable all Action Center notifications.

  • D. Move specific site notifications from Allowed to Block.

Answer explanation

Run a full antivirus scan on the computer would be the best solution for a technician to implement in this case. While the advertisements may not appear malicious, they could potentially be part of an adware or spyware program that is running on the computer. Running a full antivirus scan can help detect and remove any malicious software that may be causing the unwanted notifications. Disabling the browser from sending notifications, disabling all Action Center notifications, or moving specific site notifications from Allowed to Block may not address the underlying issue of a potential malware infection.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?