Computers 2a

Computers 2a

12th Grade

50 Qs

quiz-placeholder

Similar activities

Application Software Quiz

Application Software Quiz

12th Grade - University

50 Qs

CBT - Revision # 3

CBT - Revision # 3

12th Grade - University

54 Qs

VOIP XII

VOIP XII

1st Grade - University

50 Qs

ICT SPM : LA4 (Multimedia)

ICT SPM : LA4 (Multimedia)

10th - 12th Grade

54 Qs

2425_ÔN TẬP TIN HỌC 9

2425_ÔN TẬP TIN HỌC 9

9th Grade - University

54 Qs

Latihan UNBK TKJ 2019

Latihan UNBK TKJ 2019

10th Grade - University

50 Qs

PHOTOPEA-TEST-2023-S2ACC

PHOTOPEA-TEST-2023-S2ACC

12th Grade

46 Qs

iMedia R093 Mix Up#2

iMedia R093 Mix Up#2

9th - 12th Grade

45 Qs

Computers 2a

Computers 2a

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Akau Anyieth

Used 13+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #2

Topic 1

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?


  • A. SFTP

  • B. SSH

  • C. VNC

  • D. MSRA

Answer explanation

SSH or Secure Shell is a network communication protocol that enables two computers to communicate (c.f http or hypertext transfer protocol, which is the protocol used to transfer hypertext such as web pages) and share data. The answer is B because we are discussing logging into a Linux SERVER (not a desktop). The best way to do that is via SSH.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #3

Topic 1

A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?


  • A. Reinstalling Windows

  • B. Performing a quick format

  • C. Using disk-wiping software

  • D. Deleting all files from command-line interface:

Answer explanation

The answer is C because both A and D will not accomplish wiping a hard drive, and subsequently a quick format will not sufficiently wipe information from a drive.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #4

Topic 1

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?


  • A. Reset the phone to factory settings.

  • B. Uninstall the fraudulent application.

  • C. Increase the data plan limits.

  • D. Disable the mobile hotspot.

Answer explanation

The application in question is clearly malware, therefore it is best to remove it. A factory reset can remove malware, but doing something drastic like that is usually not a first step. Additionally, C and D won't help with removing malware.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #5

Topic 1

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?


  • A. End user acceptance

  • B. Perform risk analysis

  • C. Communicate to stakeholders

  • D. Sandbox testing

Answer explanation

The change management phases are as follows: Request forms, Purpose of change, Scope of the change, Date and Time of the change, Affective systems/ impact, risk analysis, change board approval, finally end user acceptance. With this the answer is end user acceptance.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #6

Topic 1

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST?


  • A. Scan and remove the malware.

  • B. Schedule automated malware scans.

  • C. Quarantine the system.

  • D. Disable System Restore.

Answer explanation

After verifying the malware, quarantining would be the next step in malware removal process. Comptia Exam Objectives for malware removal. 1. Investigate and verify malware symptoms 2. Quarantine infected systems 3. Disable System Restore in Windows 4. Remediate infected systems a. Update anti-malware software b.Scanning and removal techniques (e.g., safe mode, preinstallation environment) 5. Schedule scans and run updates 6. Enable System Restore and create a restore point in Windows 7. Educate the end user

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #7

Topic 1

A company is issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?


  • A. Anti-malware

  • B. Remote wipe

  • C. Locator applications

  • D. Screen lock

Answer explanation

Remote wipe allows the company to remotely erase all data on the smartphone, preventing unauthorized access to sensitive information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #8

Topic 1

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?


  • A. Disable the browser from sending notifications to the Action Center.

  • B. Run a full antivirus scan on the computer.

  • C. Disable all Action Center notifications.

  • D. Move specific site notifications from Allowed to Block.

Answer explanation

Run a full antivirus scan on the computer would be the best solution for a technician to implement in this case. While the advertisements may not appear malicious, they could potentially be part of an adware or spyware program that is running on the computer. Running a full antivirus scan can help detect and remove any malicious software that may be causing the unwanted notifications. Disabling the browser from sending notifications, disabling all Action Center notifications, or moving specific site notifications from Allowed to Block may not address the underlying issue of a potential malware infection.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?