Core 2 day 9

Core 2 day 9

Professional Development

26 Qs

quiz-placeholder

Similar activities

ICT30120 Certificate III in Information Technology

ICT30120 Certificate III in Information Technology

Professional Development

22 Qs

ICT Mind Game

ICT Mind Game

Professional Development

25 Qs

Principles of coding

Principles of coding

Professional Development

25 Qs

AWS Quizz-2023 (CSS)

AWS Quizz-2023 (CSS)

Professional Development

25 Qs

Computer Basics Quiz

Computer Basics Quiz

Professional Development

30 Qs

IT102_Quiz8

IT102_Quiz8

Professional Development

22 Qs

EDPM - Computer Basics 1

EDPM - Computer Basics 1

Professional Development

25 Qs

Quiz Kisi-Kisi Coding - STS Ganjil

Quiz Kisi-Kisi Coding - STS Ganjil

KG - Professional Development

25 Qs

Core 2 day 9

Core 2 day 9

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Connor Hach

Used 1+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your organization has mandated that all web browsers used for business must

come from trusted sources. As an IT administrator, which of the following would

you recommend to ensure compliance?


A) Download browsers only from major vendor websites and verify hash-based

checksums.


B) Install any browser from third-party repositories to ensure variety.

C) Modify the Windows registry to disable browser security updates.

D) Use a legacy browser that does not require security validation.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user complains that their browser has suddenly started redirecting them to

unwanted web pages, and their search results show unusual advertisements.

Upon inspection, you notice new extensions installed that the user does not

recognize. What is the MOST likely cause of this issue?


A) The user installed a trusted browser update.

B) The browser has been compromised by a potentially unwanted application

(PUA).


C) The network firewall is blocking legitimate browser extensions.

D) The user enabled incognito mode.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company wants to ensure that employees use a browser with secure and

updated extensions. Which of the following is the BEST practice?


A) Allow users to install extensions from any source.

B) Restrict browser extensions to those from the official marketplace or store.

C) Disable all extensions, including those necessary for work.

D) Use older plug-ins instead of newer extensions.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company wants to migrate its on-premises servers to a cloud-based solution but still

wants full control over its operating systems, applications, and network configurations.

The IT manager has decided to choose a cloud model that provides virtual machines,

storage, and networking but requires the company to manage the OS and applications.

Which type of cloud service model best fits the company's needs?


A) SaaS

B) PaaS

C) IaaS

D) DaaS

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A small business is looking for a cost-effective way to provide its employees with email,

word processing, and spreadsheet applications without the need to install software on

individual computers. The IT administrator suggests using an online service where

users can access these applications through a web browser. Which cloud service model

is the IT administrator recommending?


A) IaaS

B) PaaS

C) SaaS

D) DaaS

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A software development company is building a new mobile application and needs a

cloud solution that provides an environment to develop, test, and deploy the app without

worrying about managing the underlying infrastructure. The solution should offer built-in

frameworks, APIs, and database services. Which cloud model should the company

use?


A) SaaS

B) PaaS

C) IaaS

D) DaaS

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company’s email server is not sending or receiving messages. The IT technician

suspects that the issue may be related to a recent firewall update. What is the next

troubleshooting step the technician should take?


A) Document findings and implement preventive measures

B) Test the theory by temporarily disabling the firewall rule

C) Identify the problem by interviewing users

D) Escalate the issue to upper management

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?