
DCP Utilization and Maintenance
Authored by Janrey Flores
Information Technology (IT)
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following completes the list of common cyber threats in schools and among Filipinos: Phishing Attacks, Malware and Viruses, _________________, Inappropriate Content Access, Social Media Scams?
Phishing Attacks
Malware and Viruses
Social Engineering Attacks
Inappropriate Content Access
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cybercrime involves attackers using digital means to threaten individuals, organizations, or businesses with harm unless a ransom or other demands are met?
Email and internet fraud
Identity fraud
Ransomware
Cyberextortion
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Below are some of the things to remember to spot phishing email, which of the following is NOT TRUE? -Uses a Same Domain as the original
Asks for Sensitive Information
Uses a Same Domain as the original
Contains Links that Don't Match the Domain
Is Not Personalized
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended practice for enhancing password security?
Use the same password across multiple accounts
Share your password with trusted friends
Use strong, unique passwords and implement two-factor authentication (2FA)
Disable security measures for convenience
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following correctly describes the types of intrusion?
Network Intrusion: Gaining unauthorized physical access to a facility or hardware.
System Intrusion: Injecting malware into a network.
Physical Intrusion: Unauthorized access to a specific system or device.
Network Intrusion: Unauthorized access to a network, often to steal sensitive information or disrupt services.
System Intrusion: Unauthorized access to a specific system or device, such as a server or mobile device.
Physical Intrusion: Gaining unauthorized physical access to a facility or hardware.
Network Intrusion: Disrupting physical security systems in a facility.
System Intrusion: Unauthorized access to a mobile device only.
Physical Intrusion: Gaining unauthorized access to network servers remotely.
Network Intrusion: Accessing only public information on a network.
System Intrusion: Only manipulating user data without system access.
Physical Intrusion: Gaining access to digital files through online methods.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a systematic process used to locate the cause of a fault in a computer and correct the relevant hardware and software
Creating recovery disk
Troubleshooting
Installation of OS
Restoring backup
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If your Windows 11 device is running out of storage space, what is a recommended action?
Delete system files
Perform Disk Cleanup
Disable updates
Increase screen resolution
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?