Computer Software Prep 2

Computer Software Prep 2

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

L2 - Social Engineering  KS3

L2 - Social Engineering KS3

9th - 11th Grade

10 Qs

Effective Leadership Test Review

Effective Leadership Test Review

8th - 12th Grade

10 Qs

Word Pretest

Word Pretest

4th - 12th Grade

10 Qs

Word 2019 Moment 3

Word 2019 Moment 3

11th Grade

14 Qs

BTEC Level 2 DIT : 3: Managing Modern Teams: Retrieval

BTEC Level 2 DIT : 3: Managing Modern Teams: Retrieval

10th - 11th Grade

8 Qs

Basics of Word Processing

Basics of Word Processing

12th Grade

10 Qs

1.6 Threats to networks 1: People as the weak point

1.6 Threats to networks 1: People as the weak point

10th Grade

12 Qs

Cover Letters [Cengage Ch 4]

Cover Letters [Cengage Ch 4]

9th - 12th Grade

10 Qs

Computer Software Prep 2

Computer Software Prep 2

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ray Heyob

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your costumer has lost her internet access. To try to fix this issue you update network drivers on her computer. How do you verify that the update resolved the issue?
Access to the internet has been restored
Verify ability to print
Receive a test email

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At which point in the diagram will you evaluate information about the problem
Analyze Data
Design Solution
Test Solution
Document Process

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An advantage of cloud computing is
high availability
high energy cost
low bandwidth usage
retrieval speed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best porcedure for documenting and recording which computers have been configured and deployed throughout your organization?
Document immediately after installation on each workstation
Document intallations at the end of each day
Document installations on a sticky note on each monitor to inform the user
Document once all workstations are deployed to end-users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clark intentionally leaves an infected flash drive in the parking lot of a bank in hopes that a bank employee will find it, plug it into their workstation, and grant him remote access inside the bank's firewall. What type of attack is Clark attempting?
Spyware
Spoofing
Phishing/Vishing
Social Engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Francesca is developing a disaster recovery plan that needs to include natural disasters to the building. What should be included in their plan?
Off-site backup storage
Full, on-site backups
Daily incremental backups
Full device MDM backup

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have installed a new application on a computer and you immedietly notice that the application is not working correctly. You suspect the software might have been tempered with. You decided to prepare the computer for law enforcement to investigate. Why is chain of custody important in preserving this evidence?
So the evidence is preserved for court
So the evidence is preserved to show the CTO who tampered with the software
So law enforcement can correct the problem
To show where the software was obtained.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?