1101 Day 5 Review

1101 Day 5 Review

Professional Development

10 Qs

quiz-placeholder

Similar activities

Minecraft (Good luck Jake)

Minecraft (Good luck Jake)

KG - Professional Development

10 Qs

FH 6.2.1 MME 11.1-Detección de averías

FH 6.2.1 MME 11.1-Detección de averías

Professional Development

13 Qs

Python Data Structures & Statements

Python Data Structures & Statements

Professional Development

11 Qs

PLAL Agile Onboarding

PLAL Agile Onboarding

Professional Development

10 Qs

Exam Prep 1

Exam Prep 1

Professional Development

10 Qs

2. Day 1_ITBA 10 Soal

2. Day 1_ITBA 10 Soal

KG - Professional Development

10 Qs

social engineering

social engineering

1st Grade - Professional Development

10 Qs

HP Commercial Product Training Quiz

HP Commercial Product Training Quiz

Professional Development

10 Qs

1101 Day 5 Review

1101 Day 5 Review

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Chris Hatch

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Avery, a system administrator, is configuring a workstation for enhanced security and data protection. They want to enable a feature in the UEFI settings that ensures only trusted operating systems are allowed to boot. Which UEFI setting should Avery enable for this purpose?


USB permissions


Fan considerations


Secure Boot


Boot password


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Elijah needs to change the boot order on a desktop. Which credentials does Elijah need to enter to access this part of the CPU system configuration?

User Password

Network Admin Password

System Password

All of These

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Harper wants to ensure safe, trusted software starts when she turns on her computer, helping protect it from malicious programs. Which option should she choose?

None of These

BIOS

Secure Boot

Boot Sequence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma is sending a confidential email and wants to ensure that only the intended recipient can read it. Encryption is the process of transforming data into an unreadable format.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jill is working on a document when she gets an urgent call. She locks her computer and leaves. She returns the next day to find her computer has been tampered with. What can Forensics use to determine the integrity of the data.

PII

Cryptographic Key

Hashing

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rohan's computer does a basic check of the hardware, verifying CPU and memory requirements are met before loading the operating system. What is this process called?

BIOS

POST

Windows Defender

Operator

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma's workstation was just moved to a new work location without a surge protector. It was working the day before, but now the PC will not power on, the fans will not spin, and there are no signs of activity. Which of the following should the technician do FIRST?

Check the voltage switch

Check the power cable connection

Ask an electrician

Check the voltage of the PSU with a voltmeter

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?