Computers 2f

Computers 2f

12th Grade

50 Qs

quiz-placeholder

Similar activities

Decimal Easy to other bases

Decimal Easy to other bases

7th - 12th Grade

50 Qs

IT Fundamentals Chapter 6

IT Fundamentals Chapter 6

8th - 12th Grade

47 Qs

Testout IT Fundamentals Chapter 3

Testout IT Fundamentals Chapter 3

11th - 12th Grade

51 Qs

CSEC IT - 04 Loops & Trace Tables

CSEC IT - 04 Loops & Trace Tables

10th - 12th Grade

50 Qs

Exploring Computer Science Benchmark 1 –Review

Exploring Computer Science Benchmark 1 –Review

9th Grade - University

49 Qs

ET MID TERM REVIEW

ET MID TERM REVIEW

12th Grade

51 Qs

Networking I Chapter 4 Test

Networking I Chapter 4 Test

9th - 12th Grade

49 Qs

Testout PC Pro System Management

Testout PC Pro System Management

11th - 12th Grade

46 Qs

Computers 2f

Computers 2f

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Akau Anyieth

Used 6+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #251

Topic 1

Which of the following is an advantage of using WPA2 instead of WPA3?


  • A. Connection security

  • B. Encryption key length

  • C. Device compatibility

  • D. Offline decryption resistance

Answer explanation

Devices might not yet detect WPA3 and support only WPA2. Similarly, WPA2 provides a more secure connection than WPA, but some legacy WiFi devices do not detect WPA2 and support only WPA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #252

Topic 1

A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The technician needs to make use of a tool natively designed for Linux. Which of the following tools will the technician MOST likely use?


  • A. VNC

  • B. MFA

  • C. MSRA

  • D. RDP

Answer explanation

VNC stands for Virtual Network Computing. It is a cross-platform screen sharing system that was created to remotely control another computer.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #253

Topic 1

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?


  • A. Disable System Restore.

  • B. Schedule a malware scan.

  • C. Educate the end user.

  • D. Run Windows Update.

Answer explanation

Disabling System Restore before removal is recommended to prevent possible re-infection, as it may unintentionally save a backup copy of the suspect file, which will remain even after removal is completed

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Question #254

Topic 1

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Choose two.)


  • A. Licensing agreements

  • B. Chain of custody

  • C. Incident management documentation

  • D. Data integrity

  • E. Material safety data sheet

Answer explanation

  • BD, Chain of custody to determine who has touched the evidence. Data integrity for keeping the data safe for evaluation.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Question #255

Topic 1

Which of the following would MOST likely be deployed to enhance physical security for a building? (Choose two.)


  • A. Multifactor authentication

  • B. Badge reader

  • C. Personal identification number

  • D. Firewall

  • E. Motion sensor

Answer explanation

B. Badge reader: Badge readers are commonly used for physical access control. They require authorized individuals to present a valid badge or access card to gain entry to a building or specific areas within it. E. Motion sensor: Motion sensors are used to detect movement in and around a building. They can trigger alarms, surveillance systems, or lighting based on detected motion, helping to deter unauthorized access or intruders.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #256

Topic 1

A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?


  • A. EULA

  • B. PII

  • C. DRM

  • D. Open-source agreement

Answer explanation

When a technician discovers multiple copies of home edition software installed on computers, the most likely violation is related to the EULA (End User License Agreement).

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #257

Topic 1

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?


  • A. Enable firewall ACLs.

  • C. Verify the routing tables.

  • D. Update the antivirus definitions.

Answer explanation

To resolving the issue of unexpected website redirections. One must examine the localhost file entries (option B). The hosts file contains mappings of domain names to IP addresses, and any suspicious or unauthorized entries in this file could be causing the redirection. Investigating and correcting any problematic entries in the hosts file may help resolve the issue.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers