98-367 PT3

98-367 PT3

9th - 12th Grade

35 Qs

quiz-placeholder

Similar activities

MIDTERM TEST REVISION 1 GRADE 10

MIDTERM TEST REVISION 1 GRADE 10

10th Grade

40 Qs

Ôn tập kiểm tra giữa kỳ 1 khối 10 2022 - 2023

Ôn tập kiểm tra giữa kỳ 1 khối 10 2022 - 2023

1st - 12th Grade

30 Qs

Entrepreneurship Honors 1 Unit 4

Entrepreneurship Honors 1 Unit 4

9th - 12th Grade

30 Qs

PARTS OF COMPUTER TEST

PARTS OF COMPUTER TEST

12th Grade

36 Qs

Konsep Jaringan Komputer

Konsep Jaringan Komputer

10th Grade

40 Qs

AD S2 G360s Week 9 -2021

AD S2 G360s Week 9 -2021

12th Grade

30 Qs

Programacion Vb (11)

Programacion Vb (11)

11th Grade

35 Qs

Ujian Sekolah Tikom

Ujian Sekolah Tikom

9th Grade

40 Qs

98-367 PT3

98-367 PT3

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Thomas Ray

Used 90+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two are included in an enterprise antivirus program?

On-demand scanning
Scheduled scanning
Attack surface scanning
Packet scanning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Windows Firewall protects computers from unauthorized network connections.

Email viruses
Phishing scams
Unencrypted network access
No change is needed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When conducting a security audit the first step is to:

Inventory the company's technology assets
Install auditing software on your servers
Set up the system logs to audit security events
Set up a virus quarantine area

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Setting a minimum password age restricts when users can:

Request a password reset
Change their passwords
Log on by using their passwords
Set their own password expiration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The purpose of a digital certificate is to verify that a:

Public key belongs to a sender.
Computer is virus-free.
Private key belongs to a sender.
Digital document is complete.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You create a new file in a folder that has inheritance enabled. By default, the new file:

Takes the permissions of the parent folder
Does not take any permissions
Takes the permissions of other folders in the same directory
Takes the permissions of other files in the same directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dumpster diving refers to a physical threat that a hacker might use to look for information
about a computer network.

Phishing
Malware
Reverse Social Engineering
No Change is Needed

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?