
Computers 2b
Authored by Akau Anyieth
Computers
12th Grade
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #51
Topic 1
A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?
A. Device Manager
B. Indexing Options
C. File Explorer
D. Administrative Tools
Answer explanation
How to hide files and folders in Windows 10 using File Explorer Navigate to the file or folder you want to hide. ... Right-click and choose Properties. ... Choose Hidden and press OK. ... Confirm Attribute Changes. ... The selected file is marked as hidden and its icon grayed out.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #52
Topic 1
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?
A. Encryption
B. Wi-Fi channel
C. Default passwords
D. Service set identifier
Answer explanation
Whenever you get a new router, the first thing you should do is change the password immediately. Changing the SSID doesn't mean better security, it just changes the name but the password still stays the same, that's why you gotta change that password ASAP. Otherwise any one can try and guess the default password.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #53
Topic 1
A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following step should the technician take NEXT?
A. Continue researching the issue.
B. Repeat the iterative processes.
C. Inform the CEO the repair will take a couple of weeks.
D. Escalate the ticket.
Answer explanation
Ticket escalation is the process by which a customer issue (support ticket) is passed on to a senior customer service manager or supervisor for a quick and effective resolution. Ticket escalation happens when support agents are unable to resolve a customer query effectively in a timely manner
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #54
Topic 1
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
A. Acceptable use
B. Chain of custody
C. Security policy
D. Information management
Answer explanation
B. Chain of custody must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence. The chain of custody refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. It is crucial to maintain a clear and complete chain of custody to ensure that the evidence is admissible in court and that its integrity and authenticity are not compromised. While acceptable use, security policy, and information management are also important considerations in forensic investigations, they do not specifically refer to the maintenance of the chain of custody.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #55
Topic 1
A technician is configuring a SOHO device. Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same
IP address at all times. Which of the following should the technician use?
A. DHCP reservation
B. Port forwarding
C. DNS A record
D. NAT
Answer explanation
If static IP addresses are not allowed, then the technician can use DHCP reservation to ensure that the server maintains the same IP address at all times. DHCP reservation is a feature available in most SOHO devices and it allows the technician to assign a fixed IP address to a specific device on the network. The device's MAC address is used to identify the device, and the DHCP server assigns the same IP address to that device every time it requests an IP address.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #56
Topic 1
Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?
A. Owners can be notified a change is being made and can monitor it for performance impact.
B. A risk assessment can be performed to determine if the software is needed.
C. End users can be aware of the scope of the change.
D. A rollback plan can be implemented in case the software breaks an application.
Answer explanation
According to the CompTIA Security+ certification exam objectives, the BEST reason to follow the change management process in this scenario is D. A rollback plan can be implemented in case the software breaks an application. This will ensure that the change can be reversed or undone if it causes any negative consequences or unexpected outcomes.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #57
Topic 1
Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?
A. Install and run Linux and the required application in a PaaS cloud environment.
B. Install and run Linux and the required application as a virtual machine installed under the Windows OS.
C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive. Swap the drives as needed.
D. Set up a dual boot system by selecting the option to install Linux alongside Windows.
Answer explanation
Limited bandwidth negates any cloud environment solution; therefore, the answer is B.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
52 questions
Media and Information Literacy (Generated)
Quiz
•
12th Grade
47 questions
MS Word Preliminary Examination
Quiz
•
10th Grade - University
53 questions
Računarski hardver
Quiz
•
9th - 12th Grade
45 questions
Informatika Sekarang dan Masa Depan
Quiz
•
12th Grade
45 questions
أسئلة تقنية المعلومات
Quiz
•
9th Grade - University
55 questions
Advanced HTML5 & CSS3 Part IV
Quiz
•
9th - 12th Grade
50 questions
Digital Graphics - Terminology, File Types, Photoshop Basics
Quiz
•
9th - 12th Grade
50 questions
MID INFORMATIKA
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade