Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Intro to Python Project Stem Unit 11 Test

Intro to Python Project Stem Unit 11 Test

9th - 12th Grade

20 Qs

ICT 7 Q1 M1, ICT Sectors and Career Opportunities

ICT 7 Q1 M1, ICT Sectors and Career Opportunities

9th Grade

20 Qs

Plan maintenance and/or diagnosis of faults in line with job

Plan maintenance and/or diagnosis of faults in line with job

12th Grade

20 Qs

Administrasi Sistem jaringan TKJ

Administrasi Sistem jaringan TKJ

11th Grade

20 Qs

ICT 9 Q1 M5, MATERIALS, TOOLS, EQUIPMENT AND TESTING DEVICES

ICT 9 Q1 M5, MATERIALS, TOOLS, EQUIPMENT AND TESTING DEVICES

9th Grade

25 Qs

Photoshop Tools and Procedures

Photoshop Tools and Procedures

9th - 12th Grade

20 Qs

hardware

hardware

11th - 12th Grade

20 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Chapter 18&20 Review CompTIA

Chapter 18&20 Review CompTIA

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Medium

Created by

Ciara Williams

Used 5+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Having a generator to power your office in case of a power outage is a ________ plan

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a generator to power your office in case of a power outage is a contingency plan

speed

ease of use

continuous availability

presentation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users should learn always to lock their workstations and mobile devices when leaving them unattended

Ture

False

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Windows can be locked by pressing WINDOWS+

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

surfing refers to stealing a password or PIN, or other secure information, by watching the user type it.

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Most specific identity ​ (a)   are aimed at getting someone to reveal their ​ (b)   , or other secure information, through a ​ (c)   or other social ​ (d)   .

frauds
logon
phishing
engineering attack
fualt
PII
OEM
latency
throughput

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PII is often used for password reset mechanisms and to confirm identity over the telephone.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?