mock 5

mock 5

University

25 Qs

quiz-placeholder

Similar activities

Peligros en Internet para Niños

Peligros en Internet para Niños

12th Grade - University

20 Qs

Aprendizaje autonomo

Aprendizaje autonomo

University

20 Qs

EVALUACIÓN DE UNA IDEA DE NEGOCIO

EVALUACIÓN DE UNA IDEA DE NEGOCIO

University

20 Qs

Especialidad de Internet

Especialidad de Internet

5th Grade - University

20 Qs

CLASIFICACION DE LA INVESTIGACION

CLASIFICACION DE LA INVESTIGACION

University

20 Qs

Primer Parcial

Primer Parcial

University

20 Qs

Introducción a la computadora

Introducción a la computadora

University

20 Qs

ARQUITECTURA DE COMPUTADORAS. UNIDAD.1

ARQUITECTURA DE COMPUTADORAS. UNIDAD.1

University

20 Qs

mock 5

mock 5

Assessment

Quiz

Instructional Technology

University

Medium

Created by

hanan hanan.ahmed@esgsa.com

Used 75+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which best describes a directory structure?

A way of storing names and addresses.

A network structure.

A way or organising files and folders.

A network topology.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of profile permits users to access a network from any terminal on a LAN?

A roaming profile.

An options profile.

A server profile.

A log-out profile.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What function is performed when the F8 key is pressed during start-up on an MS Windows system?

Boot to BIOS.

Boot to safe mode.

Boot to command prompt.

Boot to desktop.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What would cause a blue screen error?

The network.

The hard drive.

The graphics card.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What piece of infrastructure connects two or more networks in a system?

A hub.

A gateway.

A server.

A firewall.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the first stage of an impersonation attack?

The accessing of a system to steal software.

The misuse of existing log-in details.

The infection of a system via BIOS.

The deletion of user data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which is considered an organizational security threat?

Accidental data loss.

Computer roaming.

Remote access of drives.

A shared resources policy.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?