Time limit: 0
Quiz Summary
0 of 25 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Test complete. Results are being recorded.
Results
0 of 25 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Question 1 of 25
1. Question
Which malware type is known for tricking users into downloading and installing security cleanup software while urging users to give additional permissions to it?
CorrectIncorrect -
Question 2 of 25
2. Question
You are experiencing unwanted ads popping up on your smartphone whenever you try to access an app. They are also causing sluggish response times. What should you do first to identify the source of these unwanted popup ads?
CorrectIncorrect -
Question 3 of 25
3. Question
Which severity level requires an escalation of a ticket to the systems troubleshooting team?
CorrectIncorrect -
Question 4 of 25
4. Question
Which of the following tags includes the information stored within an information system asset?
CorrectIncorrect -
Question 5 of 25
5. Question
Which of the following should be included in a company’s internal knowledge base? (Choose two.)
CorrectIncorrect -
Question 6 of 25
6. Question
Which change management actions help in rolling back changes, bringing the system back to its state before the changes were implemented?
CorrectIncorrect -
Question 7 of 25
7. Question
Which risk analysis approach identifies the possibility of exploitations and the impact of malicious attacks?
CorrectIncorrect -
Question 8 of 25
8. Question
Who is appointed to take ownership of managing and overseeing a change implementation plan?
CorrectIncorrect -
Question 9 of 25
9. Question
You already have a full backup of your hard drive. You want to backup the updated files and folders each week. Which backup type allows you to backup modified files and folders?
CorrectIncorrect -
Question 10 of 25
10. Question
To restore data after a disaster, you have to take the recovery point designed by which two methods in a disaster recovery plan?
CorrectIncorrect -
Question 11 of 25
11. Question
Your organization wants to safeguard data against disasters or catastrophic failures. Which backup scheme is suitable for keeping three copies of the production and backed-up data where two copies are kept on two different media types and the third copy of the current backup should be stored offsite?
CorrectIncorrect -
Question 12 of 25
12. Question
What is the correct way to store computer components like PCI cards, RAM modules, or motherboards?
CorrectIncorrect -
Question 13 of 25
13. Question
You experienced an electric shock while handling the power supply unit (PSU). You wore an anti-static wristband and used an anti-static mat underneath the system. What could be the reason for the electric shock?
CorrectIncorrect -
Question 14 of 25
14. Question
A colleague hurt his back while moving new computers that were still boxed up and labeled “team lifts.” He was seen lifting the boxes by bending his waist and standing straight. What could have been done to avoid getting hurt?
CorrectIncorrect -
Question 15 of 25
15. Question
Which battery type requires special disposal methods because it is toxic and poses a threat to human health and the environment?
CorrectIncorrect -
Question 16 of 25
16. Question
Which proactive action protects and secures servers and workstations from environmental impacts like dust, heat, and humidity?
CorrectIncorrect -
Question 17 of 25
17. Question
You want to protect a computer system configured as a central database server from power surges and sudden spikes in voltage. Which of the following is the cheapest and the most effective device for protecting against power surges?
CorrectIncorrect -
Question 18 of 25
18. Question
You are securing data evidence on a hard drive during an active crime investigation. What is the first step in preserving evidence using the chain of custody methodology?
CorrectIncorrect -
Question 19 of 25
19. Question
You want Microsoft 365 apps for a couple of users in your office. To manage costs, you decide to use per-device licensing for users with a heavy Microsoft Office workload. What type of licensing is the per-device licensing?
CorrectIncorrect -
Question 20 of 25
20. Question
Which regulated data type includes patient demographics, lab results, insurance information, ailment details, and treatments?
CorrectIncorrect -
Question 21 of 25
21. Question
You are stuck in a massive traffic jam trying to reach your destination. It has disrupted your schedule because you will be late for an appointment with an important client. What should you do?
CorrectIncorrect -
Question 22 of 25
22. Question
You’re trying to understand the situation your client is experiencing with her computer system. The client is in fear and sounds frustrated. Nothing is making sense. What type of questions can help you understand the problem and assess the situation before moving on to a solution?
CorrectIncorrect -
Question 23 of 25
23. Question
Which file extension is used for scripts that support macros in Microsoft Excel and other Office applications?
CorrectIncorrect -
Question 24 of 25
24. Question
Which of the following is not the correct use of a script on a computer system?
CorrectIncorrect -
Question 25 of 25
25. Question
Which command initiates a remote desktop connection to perform remote troubleshooting?
CorrectIncorrect
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Current
- Correct
- Incorrect