
Computers 2h

Quiz
•
Computers
•
12th Grade
•
Easy
Akau Anyieth
Used 5+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #351
Topic 1
A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?
A. Educate the end user on best practices for security.
B. Quarantine the host in the antivirus system.
C. Investigate how the system was infected with malware.
D. Create a system restore point.
Answer explanation
Before educating the user you should create a system restore point.
CompTIA has identified a seven-step best practice procedure for malware removal: 1. Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore in Windows. 4. Remediate infected systems: a) Update anti-malware software. b) Scanning and removal techniques (e.g., safe mode, preinstallation environment). 5. Schedule scans and run updates. 6. Enable System Restore and create a restore point in Windows. 7. Educate the end user.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #352
Topic 1
An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?
A. Preserving chain of custody
B. Implementing data protection policies
C. Informing law enforcement
D. Creating a summary of the incident
Answer explanation
A. Preserving chain of custody The administrator demonstrated the concept of preserving the chain of custody by documenting the movement of the evidence, which, in this case, involves the financial data copied to a portable hard drive. Explanation: Preserving chain of custody (Option A): Chain of custody refers to the chronological documentation or paper trail showing the collection, transfer, control, analysis, and disposition of physical or electronic evidence.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #353
Topic 1
A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?
A. gpupdate
B. net use
C. hostname
D. dir
Answer explanation
Type the following command to map the network drive: "net use [drive letter]: \[network location][shared folder name]." For example, to map the network drive to drive letter Z: and the network location \server\shared, type "net use Z: \server\shared
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #354
Topic 1
Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and its files. Which of the following will MOST likely allow all users to access the new folders?
A. Assigning share permissions
B. Enabling inheritance
C. Requiring multifactor authentication
D. Removing archive attribute
Answer explanation
B. Enabling inheritance Enabling inheritance is the action that would most likely allow all users to access the new folders. Explanation: Enabling inheritance (Option B): Enabling inheritance allows new folders and files to inherit the permissions of their parent folder. If a user creates a new subfolder within the department share, enabling inheritance would mean that the new subfolder automatically inherits the permissions of the parent department share, providing access to other users.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #355
Topic 1
A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?
A. Phishing
B. Dumpster diving
C. Tailgating
D. Evil twin
Answer explanation
This scenario describes a Phishing attack. Phishing often involves tricking the user into opening a malicious attachment or visiting a malicious site. In this case, the user received a USB device (the “prize”) in the mail, which likely contained malicious software that caused the computer to stop booting. So, the correct answer is: A. Phishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #356
Topic 1
A macOS user is installing a new application. Which of the following system directories is the software most likely to install by default?
A. /etc/services
B. /Applications
C. /usr/bin
D. C:\Program Files
Answer explanation
The default installation directory for applications on Mac OS is /Applications/
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #357
Topic 1
A customer is requesting help with a technical issue. Which of the following techniques should the technician use to properly evaluate and correct the customer concern?
A. Have a videoconference using the customer’s personal phone so the customer can share the screen.
B. Ask yes or no questions so that the answers are clear.
C. Use open-ended questions to get additional information.
D. Ask for the customer’s password so the issue can be resolved quickly and directly by the technician.
Answer explanation
C. Use open-ended questions to get additional information. When dealing with technical issues, using open-ended questions is a good technique to gather additional information and understand the customer's concern more thoroughly. Open-ended questions encourage customers to provide detailed explanations, helping the technician to diagnose the problem accurately.
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
Computers 2b

Quiz
•
12th Grade
50 questions
MIDTERM EXAMNINATION OF IT FUNDAMENTAL

Quiz
•
12th Grade
53 questions
Computer Servicing Ch 1-3 Review

Quiz
•
9th - 12th Grade
50 questions
CSS- 3rd Quarterly Assessment

Quiz
•
12th Grade
48 questions
Year 8 Revision quiz

Quiz
•
9th - 12th Grade
45 questions
Ujian Akhir Informatika

Quiz
•
3rd Grade - University
46 questions
sample

Quiz
•
12th Grade
55 questions
Computers 7

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade