1101 Day 5 Review

1101 Day 5 Review

Professional Development

10 Qs

quiz-placeholder

Similar activities

Systèmes Vieillissants

Systèmes Vieillissants

Professional Development

10 Qs

THE BIG BANG QUIZ

THE BIG BANG QUIZ

1st Grade - Professional Development

15 Qs

11142020_A+_Lesson_5_Quiz

11142020_A+_Lesson_5_Quiz

Professional Development

10 Qs

ITF - Quiz 2.2 - OS Types

ITF - Quiz 2.2 - OS Types

Professional Development

10 Qs

BICEP Day 1 Review

BICEP Day 1 Review

Professional Development

12 Qs

Preventive  Maintenance and Troubleshooting

Preventive Maintenance and Troubleshooting

Professional Development

14 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

15 Qs

Linux Pro Chapter 4 - 8 part 1

Linux Pro Chapter 4 - 8 part 1

Professional Development

11 Qs

1101 Day 5 Review

1101 Day 5 Review

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Chris Hatch

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Avery, a system administrator, is configuring a workstation for enhanced security and data protection. They want to enable a feature in the UEFI settings that ensures only trusted operating systems are allowed to boot. Which UEFI setting should Avery enable for this purpose?


USB permissions


Fan considerations


Secure Boot


Boot password


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Elijah needs to change the boot order on a desktop. Which credentials does Elijah need to enter to access this part of the CPU system configuration?

User Password

Network Admin Password

System Password

All of These

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Harper wants to ensure safe, trusted software starts when she turns on her computer, helping protect it from malicious programs. Which option should she choose?

None of These

BIOS

Secure Boot

Boot Sequence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma is sending a confidential email and wants to ensure that only the intended recipient can read it. Encryption is the process of transforming data into an unreadable format.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jill is working on a document when she gets an urgent call. She locks her computer and leaves. She returns the next day to find her computer has been tampered with. What can Forensics use to determine the integrity of the data.

PII

Cryptographic Key

Hashing

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rohan's computer does a basic check of the hardware, verifying CPU and memory requirements are met before loading the operating system. What is this process called?

BIOS

POST

Windows Defender

Operator

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma's workstation was just moved to a new work location without a surge protector. It was working the day before, but now the PC will not power on, the fans will not spin, and there are no signs of activity. Which of the following should the technician do FIRST?

Check the voltage switch

Check the power cable connection

Ask an electrician

Check the voltage of the PSU with a voltmeter

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?