DCP Utilization and Maintenance

DCP Utilization and Maintenance

Professional Development

25 Qs

quiz-placeholder

Similar activities

Networking and Routing Quiz 1

Networking and Routing Quiz 1

Professional Development

23 Qs

CTech Unit2 LO6.4 Information Security and Data Management Quiz

CTech Unit2 LO6.4 Information Security and Data Management Quiz

Professional Development

20 Qs

cryptography

cryptography

Professional Development

25 Qs

Prelim: Networking II

Prelim: Networking II

Professional Development

20 Qs

Information Security Controls Quiz

Information Security Controls Quiz

Professional Development

22 Qs

Remote Support and Scripting Best Practices

Remote Support and Scripting Best Practices

Professional Development

21 Qs

Cuestionario Nivel

Cuestionario Nivel

Professional Development

22 Qs

Malware Identification Quiz

Malware Identification Quiz

Professional Development

20 Qs

DCP Utilization and Maintenance

DCP Utilization and Maintenance

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Janrey Flores

Used 4+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following completes the list of common cyber threats in schools and among Filipinos: Phishing Attacks, Malware and Viruses, _________________, Inappropriate Content Access, Social Media Scams?

Phishing Attacks

Malware and Viruses

Social Engineering Attacks

Inappropriate Content Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cybercrime involves attackers using digital means to threaten individuals, organizations, or businesses with harm unless a ransom or other demands are met?

Email and internet fraud

Identity fraud

Ransomware

Cyberextortion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Below are some of the things to remember to spot phishing email, which of the following is NOT TRUE? -Uses a Same Domain as the original

Asks for Sensitive Information

Uses a Same Domain as the original

Contains Links that Don't Match the Domain

Is Not Personalized

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended practice for enhancing password security?

Use the same password across multiple accounts

Share your password with trusted friends

Use strong, unique passwords and implement two-factor authentication (2FA)

Disable security measures for convenience

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following correctly describes the types of intrusion?

Network Intrusion: Gaining unauthorized physical access to a facility or hardware.

System Intrusion: Injecting malware into a network.

Physical Intrusion: Unauthorized access to a specific system or device.

Network Intrusion: Unauthorized access to a network, often to steal sensitive information or disrupt services.

System Intrusion: Unauthorized access to a specific system or device, such as a server or mobile device.

Physical Intrusion: Gaining unauthorized physical access to a facility or hardware.

Network Intrusion: Disrupting physical security systems in a facility.

System Intrusion: Unauthorized access to a mobile device only.

Physical Intrusion: Gaining unauthorized access to network servers remotely.

Network Intrusion: Accessing only public information on a network.

System Intrusion: Only manipulating user data without system access.

Physical Intrusion: Gaining access to digital files through online methods.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a systematic process used to locate the cause of a fault in a computer and correct the relevant hardware and software

Creating recovery disk

Troubleshooting

Installation of OS

Restoring backup

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If your Windows 11 device is running out of storage space, what is a recommended action?

Delete system files

Perform Disk Cleanup

Disable updates

Increase screen resolution

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?