Mod 15-17

Mod 15-17

9th Grade

37 Qs

quiz-placeholder

Similar activities

Systems Admin

Systems Admin

9th - 12th Grade

35 Qs

CS Unit 4

CS Unit 4

9th - 12th Grade

32 Qs

WINDOWS CƠ BẢN

WINDOWS CƠ BẢN

1st Grade - University

41 Qs

98-368 Mobility and Devices Fundamentals Study Guide

98-368 Mobility and Devices Fundamentals Study Guide

9th - 12th Grade

40 Qs

Operating System

Operating System

9th - 12th Grade

40 Qs

Ujian Sekolah TIK Kelas IX 2025

Ujian Sekolah TIK Kelas IX 2025

9th Grade

40 Qs

 INFORMATIKA  KELAS VII

INFORMATIKA KELAS VII

7th Grade - University

37 Qs

ICT MOCK

ICT MOCK

9th Grade

40 Qs

Mod 15-17

Mod 15-17

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Ben Caple

Used 12+ times

FREE Resource

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ken has discovered that a vice president of his company has been using their computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent. Which would be the most appropriate option for Ken to complete next?

Report the person through proper channels.

Approach the VP and ask them about the email.

Ignore the email; it is not his job.

Go right to the president of the company.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?

Disconnect the USB ports from the motherboard.

Enable the supervisor password in the BIOS/UEFI setup.

Require all employees to use a unique Windows user account and password.

Install a lock on the computer case to prevent the removal of the covers.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An operating system is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by Certificate Authorities (CAs). A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft's trusted root certificate, which is downloaded to the computer. The download happens seamlessly without the user's knowledge unless there's a problem. If Windows cannot obtain the root certificate to validate the email or website, an error is displayed. Where do you go in the Windows operating system to view and delete root certificates?

Action Center

Certificate Manager

Windows Security

Windows Defender

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Currently James's company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. Which option would James recommend as an upgrade to RADIUS?

AES

WPA

Radius+

TACACS+

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the command that is used to check for file systems errors.

mdsched

bootrec

sfc /scannow

chkdsk /r

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As an administrator works with various systems, versions and other OS related tools, there will be instances in which starting up a device might lead to a type of stop error. Which of the following would be a stop error that an administrator might encounter?

Frequent shutdowns

Startup error on a black screen

BSOD

Hard boot

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your computer has a single HDD formatted with NTFS with the following data folders: C:\Documents C:\Pictures You create a new child folder under the C:\Documents folder. What term describes the permissions the new folder automatically attains from the C:\Documents folder?

Inherited permissions

Explicit permissions

Allow permissions

Deny permissions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?