Module 19 Review

Module 19 Review

12th Grade

•

29 Qs

quiz-placeholder

Similar activities

Cybersecurity Midterm

Cybersecurity Midterm

Firewall and Network Security Quiz

Firewall and Network Security Quiz

Networking and Cybersecurity Quiz

Networking and Cybersecurity Quiz

Networking Test

Networking Test

Module 19 Review

Module 19 Review

Assessment

Quiz

•

Computers

•

12th Grade

•

Practice Problem

•

Medium

Created by

Becky West

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What two small programs would you install to change the way a browser functions or enhance the features of a single website?

Plug-ins and extensions

Google Docs and Microsoft Excel

Photoshop and Adobe Reader

Skype and Zoom

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What are the two suggested best practices to best secure a browser?

Clear the cache and all browsing data

Use private browsing mode and disable cookies

Install multiple browsers and switch regularly

Enable JavaScript and use browser extensions

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What applet is used to configure Internet Explorer in Windows 10?

Control Panel

Settings App

Command Prompt

Internet Options

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

When you configure a proxy server, which of the following browsers does this setting apply to?

Only the browser where it is configured

All browsers on the system

Only browsers that do not have built-in proxy settings

None of the browsers

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

If two hash values do not match after a download, what has happened?

The file was downloaded correctly without any errors.

There was an error or alteration in the file during download.

The file was downloaded faster than usual.

The hash function used was incorrect.

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What technique does a VPN use to encrypt and protect data?

Tunneling

Firewall

Antivirus software

Password protection

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What are the two functions of Windows Defender Firewall?

Protect a computer from intrusion and from attacking other computers

Scanning for malware and automatic updates

Data encryption and user authentication

Internet browsing history tracking and data backup

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?