IT Fundamentals+ Network, Security Concepts & Databases

IT Fundamentals+ Network, Security Concepts & Databases

Professional Development

21 Qs

quiz-placeholder

Similar activities

Scrum 101

Scrum 101

Professional Development

25 Qs

TECHNOLOGY INTEGRATION

TECHNOLOGY INTEGRATION

Professional Development

16 Qs

Revision Monday - 4

Revision Monday - 4

Professional Development

18 Qs

ISTQB-CTFLU1-2-3-4_220422a

ISTQB-CTFLU1-2-3-4_220422a

Professional Development

16 Qs

Post Test - Agile/Scrum Batch 2

Post Test - Agile/Scrum Batch 2

Professional Development

20 Qs

[Intensive Odoo 1 - 12/2022] W0 - Introduction + General things

[Intensive Odoo 1 - 12/2022] W0 - Introduction + General things

Professional Development

21 Qs

SAFe Quiz for Teams-1

SAFe Quiz for Teams-1

Professional Development

24 Qs

Issue Submission Process Quiz

Issue Submission Process Quiz

Professional Development

18 Qs

IT Fundamentals+ Network, Security Concepts & Databases

IT Fundamentals+ Network, Security Concepts & Databases

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

willie reynolds

Used 7+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a corporate setting, which of the following actions is primarily a concern for confidentiality?

A colleague impersonating another colleague

An unauthorized person eavesdropping on a confidential meeting

A disgruntled employee destructing company property

An employee altering company records without permission

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
Patent
Copyright
Watermark
Trademark

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
Encryption
Compression
Permissions
Auditing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Proprietary software
Commercial software
Open source software
Cross-platform software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are the basic computing operations?
Input, process, output, and feedback
Input, output, storage, and feedback
Input, process, output, and storage
Input, process, and output

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following internet service types typically provides the fastest speed?
Dial-up
DSL
Satellite
Fiber optic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice for securing your device?
Using the same password for all accounts
Sharing your password with trusted friends
Regularly updating your software
Writing your password on a sticky note and attaching it to your monitor

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?