Assessment Test Flashcards
Which of the following optical discs will store the most data?
A. CD-ROM
B. DVD-ROM DL
C. DVD-ROM DS
D. RS-ROM
C. DVD-ROM DS
A double-sided DVD-ROM can store more data than a dual-layer DVD-ROM, and both can store much more than a CD-ROM. There is no RS-ROM.
Which of the following devices are used to permanently store user data in a computer? Choose two.
A. HDD
B. RAM
C. ROM
D. SSD
A. HDD
D. SSD
Hard disk drives (HDD) are used to permanently store user data. Solid state drives (SSD) are one type of hard drive.
Which of the following on your computer is considered firmware?
A. RAM
B. SSD
C. CMOS
D. BIOS
D. BIOS
The Basic Input/Output System (BIOS) is firmware. It’s stored on a hardware chip called the CMOS. See Chapter 1 for more information.
What was the first widely adopted video connector standard?
A. CGA
B. VGA
C. XGA
D. DVI
B. VGA
VGA was the first widely used video connector standard, and it was released in 1987. See Chapter 2 for more information.
What type of removable storage is often used in digital cameras?
A. Flash drive
B. NAS
C. Memory card
D. Mobile media card
C. Memory card
Digital cameras use memory cards. The most popular form of memory card in the market today is the SD card.
Which of the following devices is considered an input device?
A. Scanner
B. Printer
C. Touchscreen
D. Flash drive
A. Scanner
Scanners are input devices. Printers produce output. Touchscreens and flash drives are both input and output devices.
Which operating system named its versions after large cats?
A. iOS
B. OS X
C. Android
D. Chrome OS
B. OS X
Apple’s OS X was named for large cats. Now versions are named after locations in California.
Your computer has a 64-bit CPU. Which statement is true regarding which operating systems you can install on it?
A. 64-bit operating systems only.
B. 64-bit or 32-bit operating systems.
C. 32-bit operating systems only.
D. It depends on how much RAM your system has.
B. 64-bit or 32-bit operating systems.
A 64-bit processor can handle 32-bit or 64-bit OSs. It is a waste of power to use a 32-bit OS on it, but it will work.
What happens to a file on your hard drive when you move it from one directory to another in Windows?
A. It gets erased from the original location and re-created in the new location.
B. It is maintained in the original location and re-created in the new location.
C. Nothing happens to the file; the metadata gets changed pointing to the new directory.
D. Nothing happens to the file.
C. Nothing happens to the file; the metadata gets changed pointing to the new directory.
Moving a file is analogous to a cut and paste. It takes the file from one folder and places it in another within Windows. However, on the hard drive the only thing that happens is the file gets associated with a new folder. It does not physically move.
A .flac file is an example of what type of file?
A. Image
B. Video
C. Audio
D. Compressed
C. Audio
The .flac extension is for audio files.
You are configuring some Windows computers for an office, and the manager tells you that employees should not be able to play the games. What should you do?
A. Uninstall the games from within Control Panel.
B. Uninstall the games from within Windows Update.
C. In the Start menu, right-click the Games folder and select Delete.
D. Delete and reinstall Windows, and deselect the games upon reinstallation.
A. Uninstall the games from within Control Panel.
Games and other software components can be added and removed from within Control Panel. See Chapter 4 for more information.
A common compression format file extension seen on UNIX and Linux computers is what?
A. .rar
B. .dmg
C. .iso
D. .gz
D. .gz
The .gz extension is used by gzip, which is a UNIX- and Linux-compatible compression utility.
What type of software is used to create 3-D drawings for construction projects?
A. CAD
B. Graphic design
C. PDF
D. Specialized
A. CAD
Computer Aided Design (CAD) software is designed to create 2-D and 3-D drawings for construction projects. CAD is a type of specialized software.
You open your web browser and type in www.google.com, but your computer can’t find the website. Your neighbor’s computer finds it just fine. What is most likely the cause?
A. Incorrect DNS configuration.
B. Incorrect DHCP configuration.
C. Incorrect WPA2 configuration.
D. The website is down.
A. Incorrect DNS configuration.
DNS servers resolve host names to IP addresses. It’s possible that your computer has the wrong address for the DNS server. DHCP automatically configures TCP/IP clients, and WPA2 is a security protocol. If the website was down, your neighbor would not be able to access it either.
Your friend Marcos asks you which of the following is the most secure. What do you tell him?
A. 802.11n
B. Infrared
C. Fiber-optic
D. UTP
C. Fiber-optic
Wired connections are more secure than wireless ones. Fiber-optic cable is also immune to wiretaps, which makes it more secure than UTP.
Your need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement?
A. WPA2
B. WPA
C. NAT
D. WEP
A. WPA2
WPA2 is the most secure wireless security protocol in use today.
Which of the following types of networks features decentralized security and resource administration?
A. LAN
B. WAN
C. Peer-to-peer
D. Client-server
C. Peer-to-peer
A peer-to-peer network is one where all computers are equals. Each one is responsible for setting its own security and resource sharing.
You need to install a local storage solution that multiple users can easily access and has its own file-management software. Which option should you choose?
A. NAS
B. DAS
C. Network drive
D. Cloud
A. NAS
Network attached storage (NAS) is an external hard drive (or multiple hard drives) complete with its own file management and sharing software.
Which of the following is an advantage of using a workgroup instead of a homegroup?
A. It’s more secure because it requires a password.
B. It has guaranteed compatibility because all computers must be running Windows 7 or newer.
C. It’s more secure because all clients must be on the same local network.
D. It’s more flexible because multiple operating systems can join it.
D. It’s more flexible because multiple operating systems can join it.
Homegroups require their clients to be running Windows 7 or newer, and they are more secure than workgroups because a password is needed to join. An advantage of a workgroup is that multiple client OSs can participate, such as OS X.
Angela has an iPhone with a biometric scanner enabled. She powered the device off, and just turned it back on. What methods can she use to unlock her phone?
A. Fingerprint only
B. Passcode only
C. Fingerprint or passcode
D. Fingerprint, passcode, or iris scan
B. Passcode only
With biometrics enabled, you can use either the passcode or your fingerprint to access a locked device. However, if it was just powered off, the only option is to enter the passcode.
You are setting up a new Wi-Fi connection on your iPad. What is the first step in the process?
A. Enter the wireless password.
B. Verify the Internet connection.
C. Verify wireless capabilities.
D. Locate SSID.
E. Turn on Wi-Fi.
C. Verify wireless capabilities.
The proper steps in order are to verify wireless capabilities, turn on Wi-Fi, locate SSID, enter the wireless password, and verify the Internet connection.
What type of security is involved when pairing two Bluetooth devices together?
A. SSL certificates are exchanged.
B. A PIN is provided by the Bluetooth device.
C. The Bluetooth security layer negotiates the security mechanism.
D. There is no security involved.
B. A PIN is provided by the Bluetooth device.
When pairing two Bluetooth devices, you need to enter the PIN into your mobile device that allows it to connect to the Bluetooth device.
Which of the following are considered physical security risks? (Choose two.)
A. Dumpster diving
B. Phishing
C. Software theft
D. Password cracking
A. Dumpster diving
C. Software theft
Examples of physical security risks include hardware damage and theft, software and license theft, shoulder surfing, and dumpster diving.
What is the primary difference between a computer virus and a worm?
A. A virus can replicate itself to infect another computer.
B. A worm can replicate itself to infect another computer.
C. Viruses only damage operating systems while worms damage software applications.
D. Viruses can’t cause total system crashes whereas worms can.
B. A worm can replicate itself to infect another computer.
Viruses and worms are similar in the damage they do. The major difference is that while a virus needs a host to replicate and spread, a worm can replicate itself and spread without user intervention.
You are online and you see a link to a free virus-scanning program appear. You click it, and after a few minutes your computer starts behaving erratically. What happened?
A. The virus scanner found a virus and is deleting it.
B. The link is attempting to crack your password.
C. The link was a phishing attempt.
D. The link was a Trojan horse.
D. The link was a Trojan horse.
The link was most likely a Trojan horse, which pretends to be a beneficial program but then does damage to your computer. It most likely installed malware on your system.
Which of the following are considered device hardening techniques? (Choose two.)
A. Disabling Bluetooth
B. Requiring complex passwords
C. Enabling single sign-on
D. Installing antispyware software
A. Disabling Bluetooth
D. Installing antispyware software
Device hardening makes it harder for attackers to gain access to your system by reducing the potential areas of attack. Two examples of device hardening are disabling unused or unneeded services and installing antimalware.
For security purposes, which of the following user accounts are disabled by default?
A. Guest
B. Users
C. Power Users
D. Administrator
A. Guest
The Guest account is disabled by default and should remain disabled if it is not being used. See Chapter 9 for more information.
You are browsing the Internet to purchase a gift for a friend. What two things should you look for to ensure it’s safe to enter your credit card information? (Choose two.)
A. Security seal of approval
B. RSA Secure Access symbol
C. A lock symbol
D. HTTPS://
C. A lock symbol
D. HTTPS://
Secure websites will start with HTTPS:// instead of HTTP://. In addition, there will be a lock symbol near the address in the address bar.
You are helping a friend choose the right laptop for their needs. Which of the following are criteria that should be important for choosing the laptop? (Choose two.)
A. Display size
B. Weight
C. CPU speed
D. Memory
A. Display size
B. Weight
Processor speed and memory are important for all computers. The display size and weight are considerations that are more specifically related to laptops than desktop computers.
Your office recently purchased five new workstations, and you are responsible for setting them up properly. After unpacking them, what is the next step you should perform?
A. Configure the Internet connection.
B. Configure localization settings.
C. Power on the computer.
D. Plug in the cables.
D. Plug in the cables.
The first step in setting up a workstation is to plug in the cables.
You are setting up a workstation for your neighbor. After following the operating system setup wizard, what is the next step to take in the setup process?
A. Configure peripherals.
B. Create user accounts.
C. Install security software.
D. Uninstall unneeded software.
C. Install security software.
After performing the initial setup of the operating system, the next step is to install security software. The security software is the second most important piece of software on the computer, so it should be taken care of immediately after the OS setup.
You just installed a new HP printer on your Dell computer, and it’s not printing. What is the first source to check for information on the problem?
A. Dell’s website
B. HP’s website
C. Google search
D. Internet technical community groups
B. HP’s website
Always check the manufacturer’s website first. Since it’s an HP printer, check their site and not Dell’s.
When configuring a backup solution for your computer, you decide that speed is the most important factor. Which storage option should you choose?
A. Locally attached storage
B. Network attached storage
C. Cloud storage
D. Offline storage
A. Locally attached storage
When choosing a backup solution, know that locally attached storage devices will always be faster than network storage or cloud-based solutions.
You have just completed a backup of your PC onto an optical disc. What is the next step you need to take?
A. Store the backup in a secure location.
B. Burn the disc to ensure the data is saved.
C. Test the backup to verify it works.
D. Copy the backup data to a cloud.
C. Test the backup to verify it works.
After completing a backup, you should verify that the backup is working properly.
You are conducting an ergonomic assessment of your working environment. What should be true of the monitor placement?
A. The bottom of the monitor should be level with your eyes.
B. The top of the monitor should be level with your eyes.
C. The center of the monitor should be level with your eyes.
D. Monitor position does not matter in ergonomic assessments.
B. The top of the monitor should be level with your eyes.
When placing a computer monitor, the top of the monitor should be at or slightly below eye level for the user.
At home, you are walking across a carpeted floor and touch a door handle. The handle shocks you and it stings a little. What caused this shock?
A. RoHS
B. EMI
C. ESD
D. UPS
C. ESD
The shock is caused by static electricity, which is also known as electrostatic discharge (ESD).
You need to purchase a device for your desktop computer so that if you lose power in your house, the computer can still operate until you shut it down safely. What do you need?
A. Surge suppressor
B. Power replicator
C. Power strip
D. UPS
D. UPS
An uninterruptable power supply contains batteries that allow your computer to operate even if there is no power coming to it.