1. Which of the following BEST describes malicious software that demands the end-user pay a fee or face the destruction of their files?
A) A. Trojan B) B. Virus C) C. Spyware D) D. Ransomware
2. Which of the following should be done to reduce the risk of having sensitive passwords compromised while browsing the Internet?
A) A. Enable software firewalls to block unknown ports B) B. Disable autofill of forms and passwords C) C. Enable screensavers and time-outs on the computer D) D. Use ad-blocking software on the computer
3. Which of the following would be the MOST efficient way to transport a file from one location on a local hard drive to a different location on the same hard drive?
A) A. Rename B) B. Cut C) C. Move D) D. Save
4. A student wishes to share contacts with another student's mobile device. Which of the following would be the easiest method to use?
A) A. Network attached storage B) B. Bluetooth sharing C) C. Local hard drive D) D. Peer-to-Peer network
5. When setting up a new desktop, which of the following should be performed FIRST?
A) A. Configure user accounts B) B. Plug in cables C) C. Install security software D) D. Configure wireless network settings
Leave a comment