
DCP Utilization and Maintenance
Authored by Janrey Flores
Information Technology (IT)
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following completes the list of common cyber threats in schools and among Filipinos: Phishing Attacks, Malware and Viruses, _________________, Inappropriate Content Access, Social Media Scams?
Phishing Attacks
Malware and Viruses
Social Engineering Attacks
Inappropriate Content Access
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cybercrime involves attackers using digital means to threaten individuals, organizations, or businesses with harm unless a ransom or other demands are met?
Email and internet fraud
Identity fraud
Ransomware
Cyberextortion
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Below are some of the things to remember to spot phishing email, which of the following is NOT TRUE? -Uses a Same Domain as the original
Asks for Sensitive Information
Uses a Same Domain as the original
Contains Links that Don't Match the Domain
Is Not Personalized
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended practice for enhancing password security?
Use the same password across multiple accounts
Share your password with trusted friends
Use strong, unique passwords and implement two-factor authentication (2FA)
Disable security measures for convenience
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following correctly describes the types of intrusion?
Network Intrusion: Gaining unauthorized physical access to a facility or hardware.
System Intrusion: Injecting malware into a network.
Physical Intrusion: Unauthorized access to a specific system or device.
Network Intrusion: Unauthorized access to a network, often to steal sensitive information or disrupt services.
System Intrusion: Unauthorized access to a specific system or device, such as a server or mobile device.
Physical Intrusion: Gaining unauthorized physical access to a facility or hardware.
Network Intrusion: Disrupting physical security systems in a facility.
System Intrusion: Unauthorized access to a mobile device only.
Physical Intrusion: Gaining unauthorized access to network servers remotely.
Network Intrusion: Accessing only public information on a network.
System Intrusion: Only manipulating user data without system access.
Physical Intrusion: Gaining access to digital files through online methods.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a systematic process used to locate the cause of a fault in a computer and correct the relevant hardware and software
Creating recovery disk
Troubleshooting
Installation of OS
Restoring backup
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If your Windows 11 device is running out of storage space, what is a recommended action?
Delete system files
Perform Disk Cleanup
Disable updates
Increase screen resolution
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
svsvs
Quiz
•
Professional Development
23 questions
Standard-Tools
Quiz
•
Professional Development
25 questions
General Knowledge Quiz #2
Quiz
•
Professional Development
20 questions
Computer 101
Quiz
•
Professional Development
20 questions
Comparing Internet and Embedded Appliances
Quiz
•
Professional Development
20 questions
Preguntas sobre Azure Fundamentals p3
Quiz
•
Professional Development
20 questions
Micro-Credential Part 2 Mock Exam
Quiz
•
Professional Development
20 questions
Topic 1 Question 201 to 220
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...