1102 Practice Quiz

1102 Practice Quiz

12th Grade

35 Qs

quiz-placeholder

Similar activities

CompTIA ITF+ Test 2-2

CompTIA ITF+ Test 2-2

10th - 12th Grade

35 Qs

Ch. 10.2 - 10.4

Ch. 10.2 - 10.4

9th - 12th Grade

30 Qs

Networking Essentials V2 Chapter 5 Review

Networking Essentials V2 Chapter 5 Review

9th Grade - University

30 Qs

1st Semester Review 4th-5th

1st Semester Review 4th-5th

9th - 12th Grade

30 Qs

Cyber I | L5 Topic D |Troubleshooting ISC by Mr. B

Cyber I | L5 Topic D |Troubleshooting ISC by Mr. B

12th Grade

30 Qs

FBLA Exploring Computer Science

FBLA Exploring Computer Science

6th - 12th Grade

40 Qs

Unix

Unix

1st Grade - Professional Development

36 Qs

Intro to Mobile Apps:  Unit 1 Review

Intro to Mobile Apps: Unit 1 Review

9th - 12th Grade

40 Qs

1102 Practice Quiz

1102 Practice Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

willie reynolds

Used 6+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

SFTP

SSH

VNC

MSRA

Answer explanation

SSH is the best method for troubleshooting the server as it allows secure command-line access to diagnose issues without relying on the GUI, which is crashing. Other options like SFTP and VNC are less effective for this purpose.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?

Reinstalling Windows

Performing a quick format

Using disk-wiping software

Deleting all files from command-line interface

Answer explanation

Using disk-wiping software is the most secure method as it overwrites the entire hard drive multiple times, making data recovery nearly impossible. Other methods like reinstalling Windows or formatting do not ensure complete data removal.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

Reset the phone to factory settings.

Uninstall the fraudulent application.

Increase the data plan limits.

Disable the mobile hotspot.

Answer explanation

The first step to mitigate the issue is to uninstall the fraudulent application, as it is causing high network utilization and security warnings. This action directly addresses the root cause of the problem.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

End user acceptance

Perform risk analysis

Communicate to stakeholders

Sandbox testing

Answer explanation

After a change request is approved by the change advisory board, the next step is to perform a risk analysis. This assesses potential impacts and ensures that the change can be implemented safely.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user’s PC is infected with ransomware. Which of the following should the technician do FIRST?

Scan and remove the malware.

Schedule automated malware scans.

Quarantine the system.

Disable System Restore.

Answer explanation

Quarantining the system is the first step to prevent further damage and stop the ransomware from spreading. This isolates the infected PC, allowing for safe malware removal and recovery of files without risking other systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Anti-malware

Remote wipe

Locator applications

Screen lock

Answer explanation

Remote wipe is the best solution as it allows the company to erase all data on a lost or stolen device, ensuring sensitive information remains secure. Other options do not provide the same level of data protection.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?

Disable the browser from sending notifications to the Action Center.

Run a full antivirus scan on the computer.

Disable all Action Center notifications.

Move specific site notifications from Allowed to Block.

Answer explanation

Moving specific site notifications from Allowed to Block directly addresses the issue of unwanted ads, allowing the user to maintain other notifications while stopping the non-malicious advertisements.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?