
Computers 2b

Quiz
•
Computers
•
12th Grade
•
Easy
Akau Anyieth
Used 8+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #51
Topic 1
A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?
A. Device Manager
B. Indexing Options
C. File Explorer
D. Administrative Tools
Answer explanation
How to hide files and folders in Windows 10 using File Explorer Navigate to the file or folder you want to hide. ... Right-click and choose Properties. ... Choose Hidden and press OK. ... Confirm Attribute Changes. ... The selected file is marked as hidden and its icon grayed out.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #52
Topic 1
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?
A. Encryption
B. Wi-Fi channel
C. Default passwords
D. Service set identifier
Answer explanation
Whenever you get a new router, the first thing you should do is change the password immediately. Changing the SSID doesn't mean better security, it just changes the name but the password still stays the same, that's why you gotta change that password ASAP. Otherwise any one can try and guess the default password.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #53
Topic 1
A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following step should the technician take NEXT?
A. Continue researching the issue.
B. Repeat the iterative processes.
C. Inform the CEO the repair will take a couple of weeks.
D. Escalate the ticket.
Answer explanation
Ticket escalation is the process by which a customer issue (support ticket) is passed on to a senior customer service manager or supervisor for a quick and effective resolution. Ticket escalation happens when support agents are unable to resolve a customer query effectively in a timely manner
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #54
Topic 1
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
A. Acceptable use
B. Chain of custody
C. Security policy
D. Information management
Answer explanation
B. Chain of custody must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence. The chain of custody refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. It is crucial to maintain a clear and complete chain of custody to ensure that the evidence is admissible in court and that its integrity and authenticity are not compromised. While acceptable use, security policy, and information management are also important considerations in forensic investigations, they do not specifically refer to the maintenance of the chain of custody.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #55
Topic 1
A technician is configuring a SOHO device. Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same
IP address at all times. Which of the following should the technician use?
A. DHCP reservation
B. Port forwarding
C. DNS A record
D. NAT
Answer explanation
If static IP addresses are not allowed, then the technician can use DHCP reservation to ensure that the server maintains the same IP address at all times. DHCP reservation is a feature available in most SOHO devices and it allows the technician to assign a fixed IP address to a specific device on the network. The device's MAC address is used to identify the device, and the DHCP server assigns the same IP address to that device every time it requests an IP address.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #56
Topic 1
Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?
A. Owners can be notified a change is being made and can monitor it for performance impact.
B. A risk assessment can be performed to determine if the software is needed.
C. End users can be aware of the scope of the change.
D. A rollback plan can be implemented in case the software breaks an application.
Answer explanation
According to the CompTIA Security+ certification exam objectives, the BEST reason to follow the change management process in this scenario is D. A rollback plan can be implemented in case the software breaks an application. This will ensure that the change can be reversed or undone if it causes any negative consequences or unexpected outcomes.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #57
Topic 1
Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?
A. Install and run Linux and the required application in a PaaS cloud environment.
B. Install and run Linux and the required application as a virtual machine installed under the Windows OS.
C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive. Swap the drives as needed.
D. Set up a dual boot system by selecting the option to install Linux alongside Windows.
Answer explanation
Limited bandwidth negates any cloud environment solution; therefore, the answer is B.
Create a free account and access millions of resources
Similar Resources on Wayground
53 questions
Computer Servicing Ch 1-3 Review

Quiz
•
9th - 12th Grade
55 questions
Computers 7

Quiz
•
12th Grade
46 questions
Chp. 3 Alice Variables

Quiz
•
12th Grade - University
55 questions
Domain 2 - Network Security

Quiz
•
10th Grade - University
50 questions
MIDTERM EXAMNINATION OF IT FUNDAMENTAL

Quiz
•
12th Grade
50 questions
AHJ: U6 Data Privacy and Security

Quiz
•
12th Grade - University
50 questions
SYSTEM KOMPUTER

Quiz
•
12th Grade
51 questions
IC3 Domain 1 Lesson 3 Review

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade