CQB NTRMS 24

CQB NTRMS 24

University

15 Qs

quiz-placeholder

Similar activities

Lesson 11 | IP Addresses and Traceroutes Notes

Lesson 11 | IP Addresses and Traceroutes Notes

12th Grade - University

20 Qs

System Administration V

System Administration V

University

10 Qs

Pseudocode

Pseudocode

KG - University

20 Qs

POP QUIZ OS

POP QUIZ OS

University

13 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Initial Assessment - CompTIA IT fundamentals

Initial Assessment - CompTIA IT fundamentals

University

10 Qs

Pengantar Teknologi Informasi 8

Pengantar Teknologi Informasi 8

University

17 Qs

Principles of IT Vocabulary A-J

Principles of IT Vocabulary A-J

7th Grade - University

10 Qs

CQB NTRMS 24

CQB NTRMS 24

Assessment

Quiz

Computers

University

Medium

Created by

Aaron Paul Ramos

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What operating system did Google develop?

Windows

Blackberry OS

Android

iOS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does IoT stand for?

Internet of Technology

Internet of Things

Integration of Technology

Integration of Things

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is primarily responsible for converting a domain name into its corresponding IP address?

HTTP

TCP

SSH

DNS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The control panel is:

A disk on which data can be stored

Another term for display screen

A computer network that spans a relatively small area

A system tool that allows a user to set certain settings

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What feature is often used to identify whether a visitor to a Web site is human or not?

GPT

CAPTCHA

DENDRAL

Security Question

6.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.

Backdoors

Crackers

Botnets

Ransomware

7.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.

Token Ring

Ethernet

UWB

IrDA

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?