Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

26 Qs

quiz-placeholder

Similar activities

Endpoint Security for Bootcamp

Endpoint Security for Bootcamp

Professional Development

22 Qs

Computer Application "Filler" Assessment (T2a1)

Computer Application "Filler" Assessment (T2a1)

Professional Development

25 Qs

Mock #3 Exam Practice

Mock #3 Exam Practice

Professional Development

31 Qs

Part II- Practice Study Guide (ITF+)

Part II- Practice Study Guide (ITF+)

Professional Development

30 Qs

Computer Science (The Big Quiz)

Computer Science (The Big Quiz)

Professional Development

30 Qs

A+ - 17A - Managing Security Settings

A+ - 17A - Managing Security Settings

Professional Development

24 Qs

Their Networking Certification

Their Networking Certification

Professional Development

25 Qs

Unix

Unix

University - Professional Development

21 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Tony Dedman

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following symptoms is MOST likely a sign of ransomware?

Internet connectivity is lost.

Battery life is reduced.

Files on devices are inaccessible.

A large number of ads appear.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician has been directed to dispose of hard drives from company laptops properly. Company standards require the use of a high-powered magnet to destroy data on decommissioned hard drives. Which of the following data destruction methods should the technician choose?

Degaussing

Drilling

Incinerating

Shredding

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports being unable to access the Internet or use wireless headphones on a mobile device. The technician confirms the headphones properly connect to another device. Which of the following should the technician do to solve the issue?

Turn off airplane mode.

Connect to a different service set identifier.

Test the battery on the device.

Disable near-field communication.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should a support technician do first after remotely wiping a laptop that was left at a hotel by a sales staff member and preparing a new laptop for deployment?

Recycle all the cardboard and other shipping materials appropriately.

Call the hotel and demand the old laptop be sent back to the repair depot.

Confirm the shipping address for the new laptop with the sales staff member.

Document the serial numbers and usernames for asset management.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When installing M.2 devices in several workstations, which of the following is required?

Air filtration

Heat-resistant gloves

Ergonomic floor mats

Electrostatic discharge straps

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would a technician run the 'sfc /scannow' command on a Windows desktop that continuously crashes during boot?

The user's profile is damaged.

The system files are corrupted.

The hard drive needs to be defragmented.

The system needs to have a restore performed.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a user reports that their computer data is encrypted and a ransom in Bitcoins is demanded via a pop-up, the infection is most likely caused by what type of malware?

Botnet

Spyware

Ransomware

Rootkit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?