IT Maintenance and Security Quiz
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which section of the Control Panel is used to edit a user's Microsoft Outlook account profile?

  • Programs and Features
  • Mail (correct)
  • Internet Options
  • User Accounts
  • What is the most responsible way to dispose of old CRT monitors according to regulatory standards?

  • Haul them to the landfill
  • Follow local government regulations and handling procedures (correct)
  • Recycle them
  • Give them to charity
  • To enhance the security of a server room, which TWO security measures should be implemented?

  • Biometric lock (correct)
  • Badge reader (correct)
  • Strong passwords
  • Cable lock
  • When facing an encrypted email on your smartphone, what is the best initial action to take?

    <p>Contact IT support for assistance</p> Signup and view all the answers

    Which option is NOT a valid method to secure a server room's physical access?

    <p>Installing privacy window shades</p> Signup and view all the answers

    What should you not do with CRT monitors when replacing them with LCD models?

    <p>Store them indefinitely in the office</p> Signup and view all the answers

    Which of the following is a direct benefit of using a badge reader in server room security?

    <p>Tracks entry and exit of personnel</p> Signup and view all the answers

    Which disposal method for CRT monitors is least environmentally responsible?

    <p>Hauling to the landfill</p> Signup and view all the answers

    Which of the following components presents the largest risk of electrical shock to a technician?

    <p>Power supply</p> Signup and view all the answers

    What should be the first step to take when troubleshooting an email application that crashes with an error message?

    <p>Clear the app's cache</p> Signup and view all the answers

    Which type of malware is specifically designed to capture a user's data when entered into applications?

    <p>Keylogger</p> Signup and view all the answers

    Which command-line entry would be most effective for checking connectivity to a specific website on a Windows system?

    <p>ping diontraining.com</p> Signup and view all the answers

    In the context of troubleshooting a mobile email app, what would be the least effective first step?

    <p>Update the smartphone's OS</p> Signup and view all the answers

    Which of the following is not likely to contribute to electrical shock risk when servicing devices?

    <p>Properly maintained equipment</p> Signup and view all the answers

    If an application repeatedly crashes with a specific error message, which action would typically provide the quickest resolution?

    <p>Clear the app's cache</p> Signup and view all the answers

    What type of malware might be confused with a keylogger but is actually designed to create backdoor access?

    <p>Rootkit</p> Signup and view all the answers

    Study Notes

    Control Panel and Microsoft Outlook

    • Use the Mail section in the Control Panel to edit account profiles related to a Microsoft Outlook client.

    Disposal of CRT Monitors

    • Proper disposal of old CRT monitors should follow local government regulations and handling procedures to ensure environmental safety.

    Server Room Security

    • To increase server room security, consider installing:
      • Badge reader for controlled access.
      • Biometric lock for enhanced security.

    Accessing Encrypted Emails

    • If unable to open an important encrypted email on a smartphone, the best action is to open the email using the device's web browser and corporate webmail for access.

    Electrical Shock Risks

    • The component that presents the largest risk of electrical shock to a technician is the Power supply due to its high voltage.

    Troubleshooting Mobile Email App

    • As a first step to resolve the mobile email app crash with error Code123, clear the app's cache to remove any temporary issues affecting performance.

    Type of Malware

    • Keylogger is a type of malware specifically designed to capture confidential information by recording keystrokes from a user.

    Command-Line Functionality

    • The command-line entry for testing connectivity to a website (like diontraining.com) is essential for diagnosing network issues, although the specific command entry was not provided in the text.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on various IT topics including Microsoft Outlook account settings, proper disposal of CRT monitors, and enhancing server room security. This quiz also covers email encryption access and troubleshooting mobile email applications, ensuring comprehensive understanding of IT maintenance and safety practices.

    Use Quizgecko on...
    Browser
    Browser