Search Header Logo

DCP Utilization and Maintenance

Authored by Janrey Flores

Information Technology (IT)

Professional Development

Used 4+ times

DCP Utilization and Maintenance
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following completes the list of common cyber threats in schools and among Filipinos: Phishing Attacks, Malware and Viruses, _________________, Inappropriate Content Access, Social Media Scams?

Phishing Attacks

Malware and Viruses

Social Engineering Attacks

Inappropriate Content Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cybercrime involves attackers using digital means to threaten individuals, organizations, or businesses with harm unless a ransom or other demands are met?

Email and internet fraud

Identity fraud

Ransomware

Cyberextortion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Below are some of the things to remember to spot phishing email, which of the following is NOT TRUE? -Uses a Same Domain as the original

Asks for Sensitive Information

Uses a Same Domain as the original

Contains Links that Don't Match the Domain

Is Not Personalized

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended practice for enhancing password security?

Use the same password across multiple accounts

Share your password with trusted friends

Use strong, unique passwords and implement two-factor authentication (2FA)

Disable security measures for convenience

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following correctly describes the types of intrusion?

Network Intrusion: Gaining unauthorized physical access to a facility or hardware.

System Intrusion: Injecting malware into a network.

Physical Intrusion: Unauthorized access to a specific system or device.

Network Intrusion: Unauthorized access to a network, often to steal sensitive information or disrupt services.

System Intrusion: Unauthorized access to a specific system or device, such as a server or mobile device.

Physical Intrusion: Gaining unauthorized physical access to a facility or hardware.

Network Intrusion: Disrupting physical security systems in a facility.

System Intrusion: Unauthorized access to a mobile device only.

Physical Intrusion: Gaining unauthorized access to network servers remotely.

Network Intrusion: Accessing only public information on a network.

System Intrusion: Only manipulating user data without system access.

Physical Intrusion: Gaining access to digital files through online methods.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a systematic process used to locate the cause of a fault in a computer and correct the relevant hardware and software

Creating recovery disk

Troubleshooting

Installation of OS

Restoring backup

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If your Windows 11 device is running out of storage space, what is a recommended action?

Delete system files

Perform Disk Cleanup

Disable updates

Increase screen resolution

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?