
Initial Assessment - CompTIA IT fundamentals
Computers
University
Used 573+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following security threats includes suspicious activity, such as reviewing someone’s screen display without permission?
Malware
Shoulder surfing
Phishing
Password cracking
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following application types is MOST often used for doing a mail merge?
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following storage methods provides the HIGHEST redundancy and availability?
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A technician has added an external hard drive to a personal computer. The hard drive is powered on, but the computer does not see the new hard disk. Which of the following is the FIRST thing the technician should check?
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user, Ann, calls the manufacturer of a software product she purchased, but is denied assistance because the product is no longer supported. Which of the following options is a BEST next choice?
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user is accessing an online bank account for the first time via an Internet browser. Which of the following should the user check?
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following connections provide data with the MOST secure protection from interception?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?