1102 Practice Quiz

Quiz
•
Computers
•
12th Grade
•
Hard

willie reynolds
Used 7+ times
FREE Resource
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?
SFTP
SSH
VNC
MSRA
Answer explanation
SSH is the best method for troubleshooting the server as it allows secure command-line access to diagnose issues without relying on the GUI, which is crashing. Other options like SFTP and VNC are less effective for this purpose.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?
Reinstalling Windows
Performing a quick format
Using disk-wiping software
Deleting all files from command-line interface
Answer explanation
Using disk-wiping software is the most secure method as it overwrites the entire hard drive multiple times, making data recovery nearly impossible. Other methods like reinstalling Windows or formatting do not ensure complete data removal.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?
Reset the phone to factory settings.
Uninstall the fraudulent application.
Increase the data plan limits.
Disable the mobile hotspot.
Answer explanation
The first step to mitigate the issue is to uninstall the fraudulent application, as it is causing high network utilization and security warnings. This action directly addresses the root cause of the problem.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?
End user acceptance
Perform risk analysis
Communicate to stakeholders
Sandbox testing
Answer explanation
After a change request is approved by the change advisory board, the next step is to perform a risk analysis. This assesses potential impacts and ensures that the change can be implemented safely.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user’s PC is infected with ransomware. Which of the following should the technician do FIRST?
Scan and remove the malware.
Schedule automated malware scans.
Quarantine the system.
Disable System Restore.
Answer explanation
Quarantining the system is the first step to prevent further damage and stop the ransomware from spreading. This isolates the infected PC, allowing for safe malware removal and recovery of files without risking other systems.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?
Anti-malware
Remote wipe
Locator applications
Screen lock
Answer explanation
Remote wipe is the best solution as it allows the company to erase all data on a lost or stolen device, ensuring sensitive information remains secure. Other options do not provide the same level of data protection.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?
Disable the browser from sending notifications to the Action Center.
Run a full antivirus scan on the computer.
Disable all Action Center notifications.
Move specific site notifications from Allowed to Block.
Answer explanation
Moving specific site notifications from Allowed to Block directly addresses the issue of unwanted ads, allowing the user to maintain other notifications while stopping the non-malicious advertisements.
Create a free account and access millions of resources
Similar Resources on Wayground
33 questions
AP CSP Review

Quiz
•
9th - 12th Grade
40 questions
2024 US XII PWPB RPL1

Quiz
•
12th Grade
35 questions
term 2 practice grade 7

Quiz
•
7th Grade - University
40 questions
removal Empowerment Technologies-11 Galanida

Quiz
•
11th - 12th Grade
31 questions
OS

Quiz
•
12th Grade
30 questions
CSS12-2Q-ST2

Quiz
•
12th Grade
40 questions
YEAR 11 DATA PROCESSING SECOND TERM UNIFIED TEST

Quiz
•
9th - 12th Grade
31 questions
N5 High Priority

Quiz
•
12th Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade