1101 Day 5 Review

1101 Day 5 Review

Professional Development

10 Qs

quiz-placeholder

Similar activities

OS making with ARCH

OS making with ARCH

Professional Development

15 Qs

ITF - Quiz 14.5 - Password Security and Management

ITF - Quiz 14.5 - Password Security and Management

Professional Development

10 Qs

Cyber quiz

Cyber quiz

Professional Development

10 Qs

PC-ismeretek(5-particiók)

PC-ismeretek(5-particiók)

9th Grade - Professional Development

8 Qs

Kuis Password Manager

Kuis Password Manager

KG - Professional Development

10 Qs

System Ethical Hacking

System Ethical Hacking

Professional Development

10 Qs

ICTDBS506- HASHES, SALTS, PEPPERS Quiz

ICTDBS506- HASHES, SALTS, PEPPERS Quiz

Professional Development

11 Qs

Kuis 19122023

Kuis 19122023

Professional Development

10 Qs

1101 Day 5 Review

1101 Day 5 Review

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Chris Hatch

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Avery, a system administrator, is configuring a workstation for enhanced security and data protection. They want to enable a feature in the UEFI settings that ensures only trusted operating systems are allowed to boot. Which UEFI setting should Avery enable for this purpose?


USB permissions


Fan considerations


Secure Boot


Boot password


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Elijah needs to change the boot order on a desktop. Which credentials does Elijah need to enter to access this part of the CPU system configuration?

User Password

Network Admin Password

System Password

All of These

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Harper wants to ensure safe, trusted software starts when she turns on her computer, helping protect it from malicious programs. Which option should she choose?

None of These

BIOS

Secure Boot

Boot Sequence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma is sending a confidential email and wants to ensure that only the intended recipient can read it. Encryption is the process of transforming data into an unreadable format.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jill is working on a document when she gets an urgent call. She locks her computer and leaves. She returns the next day to find her computer has been tampered with. What can Forensics use to determine the integrity of the data.

PII

Cryptographic Key

Hashing

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rohan's computer does a basic check of the hardware, verifying CPU and memory requirements are met before loading the operating system. What is this process called?

BIOS

POST

Windows Defender

Operator

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Emma's workstation was just moved to a new work location without a surge protector. It was working the day before, but now the PC will not power on, the fans will not spin, and there are no signs of activity. Which of the following should the technician do FIRST?

Check the voltage switch

Check the power cable connection

Ask an electrician

Check the voltage of the PSU with a voltmeter

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?