
Computers 2b
Quiz
•
Computers
•
12th Grade
•
Practice Problem
•
Easy
Akau Anyieth
Used 8+ times
FREE Resource
Enhance your content in a minute
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #51
Topic 1
A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?
A. Device Manager
B. Indexing Options
C. File Explorer
D. Administrative Tools
Answer explanation
How to hide files and folders in Windows 10 using File Explorer Navigate to the file or folder you want to hide. ... Right-click and choose Properties. ... Choose Hidden and press OK. ... Confirm Attribute Changes. ... The selected file is marked as hidden and its icon grayed out.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #52
Topic 1
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?
A. Encryption
B. Wi-Fi channel
C. Default passwords
D. Service set identifier
Answer explanation
Whenever you get a new router, the first thing you should do is change the password immediately. Changing the SSID doesn't mean better security, it just changes the name but the password still stays the same, that's why you gotta change that password ASAP. Otherwise any one can try and guess the default password.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #53
Topic 1
A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following step should the technician take NEXT?
A. Continue researching the issue.
B. Repeat the iterative processes.
C. Inform the CEO the repair will take a couple of weeks.
D. Escalate the ticket.
Answer explanation
Ticket escalation is the process by which a customer issue (support ticket) is passed on to a senior customer service manager or supervisor for a quick and effective resolution. Ticket escalation happens when support agents are unable to resolve a customer query effectively in a timely manner
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #54
Topic 1
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
A. Acceptable use
B. Chain of custody
C. Security policy
D. Information management
Answer explanation
B. Chain of custody must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence. The chain of custody refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. It is crucial to maintain a clear and complete chain of custody to ensure that the evidence is admissible in court and that its integrity and authenticity are not compromised. While acceptable use, security policy, and information management are also important considerations in forensic investigations, they do not specifically refer to the maintenance of the chain of custody.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #55
Topic 1
A technician is configuring a SOHO device. Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same
IP address at all times. Which of the following should the technician use?
A. DHCP reservation
B. Port forwarding
C. DNS A record
D. NAT
Answer explanation
If static IP addresses are not allowed, then the technician can use DHCP reservation to ensure that the server maintains the same IP address at all times. DHCP reservation is a feature available in most SOHO devices and it allows the technician to assign a fixed IP address to a specific device on the network. The device's MAC address is used to identify the device, and the DHCP server assigns the same IP address to that device every time it requests an IP address.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #56
Topic 1
Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?
A. Owners can be notified a change is being made and can monitor it for performance impact.
B. A risk assessment can be performed to determine if the software is needed.
C. End users can be aware of the scope of the change.
D. A rollback plan can be implemented in case the software breaks an application.
Answer explanation
According to the CompTIA Security+ certification exam objectives, the BEST reason to follow the change management process in this scenario is D. A rollback plan can be implemented in case the software breaks an application. This will ensure that the change can be reversed or undone if it causes any negative consequences or unexpected outcomes.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #57
Topic 1
Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?
A. Install and run Linux and the required application in a PaaS cloud environment.
B. Install and run Linux and the required application as a virtual machine installed under the Windows OS.
C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive. Swap the drives as needed.
D. Set up a dual boot system by selecting the option to install Linux alongside Windows.
Answer explanation
Limited bandwidth negates any cloud environment solution; therefore, the answer is B.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
