Device Configuration and Management- Domains 3 & 4

Device Configuration and Management- Domains 3 & 4

9th - 12th Grade

16 Qs

quiz-placeholder

Similar activities

File Management 3

File Management 3

8th - 9th Grade

20 Qs

File Permissions

File Permissions

9th Grade

20 Qs

File Management

File Management

9th - 12th Grade

15 Qs

Final Computer Checkpoint

Final Computer Checkpoint

10th Grade

15 Qs

POCS-Ch. 3.2 (Vocab)

POCS-Ch. 3.2 (Vocab)

7th - 12th Grade

20 Qs

Inside a Computer

Inside a Computer

9th - 10th Grade

15 Qs

IGCSE ICT quiz

IGCSE ICT quiz

9th - 10th Grade

15 Qs

NETWORK SECURITY

NETWORK SECURITY

8th - 10th Grade

15 Qs

Device Configuration and Management- Domains 3 & 4

Device Configuration and Management- Domains 3 & 4

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Isaac Bernard

Used 117+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Which types of permissions combine to form the effective permissions of an object or file? Choose two answers

Explicit permissions

Implied permissions

Restricted permissions

Inherited permissions

Default permissions

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Which devices are good options for backup storage? Choose 3 answers

Onboard drive

Flash drive

Internal hard drive

Network drive

External hard drive

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of these is a security feature of mobile devices?

Acceptable Use Policy (AUP)

Memorandum of Understanding (MOU)

Remote wipe

Data ownership

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of these is the MDM application offered by Microsoft?

Microsoft Intune

Microsoft Azure

Microsoft SecDat

Microsoft SharePoint

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

An application that can be used to connect mobile devices to a corporate network.

Remote wipe

OneDrive

Microsoft Azure

Azure Remote App

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A firewall is _______.

a gatekeeper between a server and the outside world

an operating system for Wi-Fi users

a network used by guests

a password used to sign in to a network

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which protocol is best when establishing a PIN lock?

Use four digits that repeat

Use four digits that do not repeat and are not consecutive

Use at least two numbers that are not consecutive

Use four digits that are consecutive and do not repeat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?