DCP Utilization and Maintenance

DCP Utilization and Maintenance

Professional Development

25 Qs

quiz-placeholder

Similar activities

AI_Driven_Retail_Intelligence

AI_Driven_Retail_Intelligence

Professional Development

20 Qs

Malware Identification Quiz

Malware Identification Quiz

Professional Development

20 Qs

Information Security Controls Quiz

Information Security Controls Quiz

Professional Development

22 Qs

Tech Verse Quiz

Tech Verse Quiz

Professional Development

25 Qs

Digital Classroom - Architecting on Sim. SAA-C03 - Mod 08 e 09

Digital Classroom - Architecting on Sim. SAA-C03 - Mod 08 e 09

Professional Development

25 Qs

DCP Utilization and Maintenance

DCP Utilization and Maintenance

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Janrey Flores

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following completes the list of common cyber threats in schools and among Filipinos: Phishing Attacks, Malware and Viruses, _________________, Inappropriate Content Access, Social Media Scams?

Phishing Attacks

Malware and Viruses

Social Engineering Attacks

Inappropriate Content Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cybercrime involves attackers using digital means to threaten individuals, organizations, or businesses with harm unless a ransom or other demands are met?

Email and internet fraud

Identity fraud

Ransomware

Cyberextortion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Below are some of the things to remember to spot phishing email, which of the following is NOT TRUE? -Uses a Same Domain as the original

Asks for Sensitive Information

Uses a Same Domain as the original

Contains Links that Don't Match the Domain

Is Not Personalized

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended practice for enhancing password security?

Use the same password across multiple accounts

Share your password with trusted friends

Use strong, unique passwords and implement two-factor authentication (2FA)

Disable security measures for convenience

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following correctly describes the types of intrusion?

Network Intrusion: Gaining unauthorized physical access to a facility or hardware.

System Intrusion: Injecting malware into a network.

Physical Intrusion: Unauthorized access to a specific system or device.

Network Intrusion: Unauthorized access to a network, often to steal sensitive information or disrupt services.

System Intrusion: Unauthorized access to a specific system or device, such as a server or mobile device.

Physical Intrusion: Gaining unauthorized physical access to a facility or hardware.

Network Intrusion: Disrupting physical security systems in a facility.

System Intrusion: Unauthorized access to a mobile device only.

Physical Intrusion: Gaining unauthorized access to network servers remotely.

Network Intrusion: Accessing only public information on a network.

System Intrusion: Only manipulating user data without system access.

Physical Intrusion: Gaining access to digital files through online methods.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a systematic process used to locate the cause of a fault in a computer and correct the relevant hardware and software

Creating recovery disk

Troubleshooting

Installation of OS

Restoring backup

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If your Windows 11 device is running out of storage space, what is a recommended action?

Delete system files

Perform Disk Cleanup

Disable updates

Increase screen resolution

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?