Computers 2b

Computers 2b

12th Grade

50 Qs

quiz-placeholder

Similar activities

ITS 101 10-14 Review

ITS 101 10-14 Review

10th Grade - Professional Development

45 Qs

Computers 2d

Computers 2d

12th Grade

47 Qs

Computers 2f

Computers 2f

12th Grade

50 Qs

Computers 2h

Computers 2h

12th Grade

50 Qs

Computers 5

Computers 5

12th Grade

55 Qs

Computers 2c

Computers 2c

12th Grade

50 Qs

IT Fundamentals Test Part 1

IT Fundamentals Test Part 1

KG - University

49 Qs

CompTIA ITFundamentals CRAM

CompTIA ITFundamentals CRAM

6th Grade - University

46 Qs

Computers 2b

Computers 2b

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Akau Anyieth

Used 8+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #51

Topic 1

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?


  • A. Device Manager

  • B. Indexing Options

  • C. File Explorer

  • D. Administrative Tools

Answer explanation

How to hide files and folders in Windows 10 using File Explorer Navigate to the file or folder you want to hide. ... Right-click and choose Properties. ... Choose Hidden and press OK. ... Confirm Attribute Changes. ... The selected file is marked as hidden and its icon grayed out.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #52

Topic 1

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?


  • A. Encryption

  • B. Wi-Fi channel

  • C. Default passwords

  • D. Service set identifier

Answer explanation

Whenever you get a new router, the first thing you should do is change the password immediately. Changing the SSID doesn't mean better security, it just changes the name but the password still stays the same, that's why you gotta change that password ASAP. Otherwise any one can try and guess the default password.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #53

Topic 1

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following step should the technician take NEXT?


  • A. Continue researching the issue.

  • B. Repeat the iterative processes.

  • C. Inform the CEO the repair will take a couple of weeks.

  • D. Escalate the ticket.

Answer explanation

Ticket escalation is the process by which a customer issue (support ticket) is passed on to a senior customer service manager or supervisor for a quick and effective resolution. Ticket escalation happens when support agents are unable to resolve a customer query effectively in a timely manner

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #54

Topic 1

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?


  • A. Acceptable use

  • B. Chain of custody

  • C. Security policy

  • D. Information management

Answer explanation

B. Chain of custody must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence. The chain of custody refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. It is crucial to maintain a clear and complete chain of custody to ensure that the evidence is admissible in court and that its integrity and authenticity are not compromised. While acceptable use, security policy, and information management are also important considerations in forensic investigations, they do not specifically refer to the maintenance of the chain of custody.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #55

Topic 1

A technician is configuring a SOHO device. Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same
IP address at all times. Which of the following should the technician use?

  • A. DHCP reservation

  • B. Port forwarding

  • C. DNS A record

  • D. NAT

Answer explanation

If static IP addresses are not allowed, then the technician can use DHCP reservation to ensure that the server maintains the same IP address at all times. DHCP reservation is a feature available in most SOHO devices and it allows the technician to assign a fixed IP address to a specific device on the network. The device's MAC address is used to identify the device, and the DHCP server assigns the same IP address to that device every time it requests an IP address.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #56

Topic 1

Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?


  • A. Owners can be notified a change is being made and can monitor it for performance impact.

  • B. A risk assessment can be performed to determine if the software is needed.

  • C. End users can be aware of the scope of the change.

  • D. A rollback plan can be implemented in case the software breaks an application.

Answer explanation

According to the CompTIA Security+ certification exam objectives, the BEST reason to follow the change management process in this scenario is D. A rollback plan can be implemented in case the software breaks an application. This will ensure that the change can be reversed or undone if it causes any negative consequences or unexpected outcomes.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #57

Topic 1

Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?


  • A. Install and run Linux and the required application in a PaaS cloud environment.

  • B. Install and run Linux and the required application as a virtual machine installed under the Windows OS.

  • C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive. Swap the drives as needed.

  • D. Set up a dual boot system by selecting the option to install Linux alongside Windows.

Answer explanation

Limited bandwidth negates any cloud environment solution; therefore, the answer is B.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?