
DCP Utilization and Maintenance
Authored by Janrey Flores
Information Technology (IT)
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following completes the list of common cyber threats in schools and among Filipinos: Phishing Attacks, Malware and Viruses, _________________, Inappropriate Content Access, Social Media Scams?
Phishing Attacks
Malware and Viruses
Social Engineering Attacks
Inappropriate Content Access
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cybercrime involves attackers using digital means to threaten individuals, organizations, or businesses with harm unless a ransom or other demands are met?
Email and internet fraud
Identity fraud
Ransomware
Cyberextortion
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Below are some of the things to remember to spot phishing email, which of the following is NOT TRUE? -Uses a Same Domain as the original
Asks for Sensitive Information
Uses a Same Domain as the original
Contains Links that Don't Match the Domain
Is Not Personalized
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended practice for enhancing password security?
Use the same password across multiple accounts
Share your password with trusted friends
Use strong, unique passwords and implement two-factor authentication (2FA)
Disable security measures for convenience
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following correctly describes the types of intrusion?
Network Intrusion: Gaining unauthorized physical access to a facility or hardware.
System Intrusion: Injecting malware into a network.
Physical Intrusion: Unauthorized access to a specific system or device.
Network Intrusion: Unauthorized access to a network, often to steal sensitive information or disrupt services.
System Intrusion: Unauthorized access to a specific system or device, such as a server or mobile device.
Physical Intrusion: Gaining unauthorized physical access to a facility or hardware.
Network Intrusion: Disrupting physical security systems in a facility.
System Intrusion: Unauthorized access to a mobile device only.
Physical Intrusion: Gaining unauthorized access to network servers remotely.
Network Intrusion: Accessing only public information on a network.
System Intrusion: Only manipulating user data without system access.
Physical Intrusion: Gaining access to digital files through online methods.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a systematic process used to locate the cause of a fault in a computer and correct the relevant hardware and software
Creating recovery disk
Troubleshooting
Installation of OS
Restoring backup
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If your Windows 11 device is running out of storage space, what is a recommended action?
Delete system files
Perform Disk Cleanup
Disable updates
Increase screen resolution
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Prelim: Networking II
Quiz
•
Professional Development
20 questions
NMC-IT PD 2024
Quiz
•
Professional Development
21 questions
Remote Support and Scripting Best Practices
Quiz
•
Professional Development
28 questions
Computer Hardware and Troubleshooting Quiz
Quiz
•
Professional Development
30 questions
Virtually Versed Round 2
Quiz
•
Professional Development
30 questions
Networking and IP Addressing Quiz
Quiz
•
Professional Development
20 questions
Understanding Cybersecurity Threats
Quiz
•
Professional Development
23 questions
Azure SQL Database Quiz
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development