FC0-U51 Flashcards
Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?
Shortcut
URL
Attachment
FTP
Shortcut
Which of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?
Chrome OS
Windows 7 Home
Mac OS X
iOS
Mac OS X
A technician is trying to access a user’s files and is unable to open any folder or file. Which of the following BEST describes the situation?
The folders contain older versions of the files.
The files are corrupted.
The technician needs to change the file attributes.
The technician does not have permissions.
The technician does not have permissions.
A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select TWO).
Use only public computers to access the website
Create a complex password
Change the default password
Write the password down
Use the original password
Create a complex password
Change the default password
Which of the following components provides the FASTEST medium for hosting and storing an operating system?
Blu-Ray disc
7200RPM HDD
SSD
DVD-RW
SSD
An RoHS label on hardware indicates which of the following?
The hardware produces EMI when used
The hardware is certified to be energy efficient
The hardware provides battery backup for power outages
The hardware needs to be properly disposed
The hardware needs to be properly disposed
Which of the following settings will a user configure as part of the initial operating system setup wizard? Choose 2
Backup schedule
Accessibility options
Multiple user accounts
Time zone
Computer name
Time zone
Computer name
After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?
The application has to be registered to the user.
The application must be upgraded to a 64-bit version.
The application must be activated.
The application needs to be reinstalled.
The application must be activated.
Which of the following should be performed after a backup has been completed?
Delete the backup
Verify the backup
Save the backup
Schedule the backup
Verify the backup
Which of the following connections provide data with the MOST secure protection from interception?
Wired
WiFi
IR
Cellular
Wired
A technician is configuring a wireless router for a small office and the business owner would like the wireless network to be secured using the strongest encryption possible. Which of the following should the technician choose?
WPA2
WAP
WPA
WEP
WPA2
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?
Email address
Phone number
Mother’s maiden name
Last name
Mother’s maiden name
Which of the following operating systems is available for free and can be modified by anyone?
Windows
Linux
Mac OS
Chrome OS
Linux
A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following BEST describes this type of malware infection?
Ransomware
Adware
Spyware
Virus
Ransomware
Which of the following features of a smartphone controls the screen orientation?
Gyroscope
NFC
Accelerometer
GPS
Gyroscope
Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?
Thermal
Laser
Dot matrix
Inkjet
Laser
Which of the following components are used to store data? (Select TWO).
Motherboard
RAM
CPU
GPU
SSD
RAM
SSD
A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?
iOS
Windows
Mac OS
Chrome OS
Mac OS
Which of the following operating systems is very lightweight and relies heavily on Internet applications?
Chrome OS
Windows
Linux
Blackberry OS
Chrome OS
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website, She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem?
The company has configured a policy on her computer that forces her to stay on their website.
Her computer is infected with adware and is redirecting her browser to another site.
The memory of the browser is corrupt and she needs to have the browser reinstalled.
She did not reboot her computer after clearing the temporary files.
Her computer is infected with adware and is redirecting her browser to another site.
Ann, a user, wishes to free space in her documents folders. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files?
Date modified
File path
Size
Extension
Size
A user has finished setting up a new computer. Now the operating system requires activation, but the user discovers the computer has no Internet connection, Which of the following should the user do FIRST?
Contact technical support.
Reboot the computer.
Check the Ethernet cable.
Review the manufacturer’s website.
Check the Ethernet cable.
Which of the following will allow a user to move a file from one folder to another using the LEAST number of steps, while ensuring that the file is removed from its original location?
Open the file from its original location, save it to the new location, and delete it from the original location.
Cut the file from its original location and paste it to the new location.
Rename the file in its original location to a name that is not already taken in the new location.
Copy the file from its original location and paste it to the new location.
Cut the file from its original location and paste it to the new location.
Which of the following software package types is designed to accept input from multiple users?
Utility
Operating system
Specialized
Collaborative
Collaborative
Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?
The monitor power cable is unplugged.
The video cable has become disconnected.
The operating system has encountered a stop error.
The screen saver has activated.
The video cable has become disconnected.
Which of the following are examples of keyboard connectors? (Select TWO).
USB
RJ-11
Serial
Firewire
PS/2
USB
PS/2
A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard. The user can install the games by performing which of the following?
Schedule automatic updates.
Enable installed OS features.
Update hardware drivers.
Reinstall productivity applications.
Enable installed OS features.
A user is at the office and has a cellular phone that previously functioned properly. The phone is powered on with a fully charged battery. However, the phone does not have connectivity. Which of the following describes the problem?
Phone is disconnected from WiFi
Provider is conducting system testing
MAC address is bas
Phone is in airplane mode
Phone is in airplane mode
Which of the following alternative technologies allows a computer to run multiple operating systems with partitioning the hard drive?
Web applications
Dual boot
Telepresence
Virtualization
Virtualization
Which of the following is a 15-pin video connection?
DVI
S-video
Component
HDMI
VGA
VGA
Which of the following is considered an optical storage medium?
SSD
Blu-Ray
Flash drive
Memory card
Blu-Ray
Which of the following are best practices when it comes to using a computer in a public location?
(Select TWO).
Notify the administrator when finished.
Use strong passwords.
Turn off the computer when finished.
Disable the save password function on web pages.
Make sure to clean the keyboard when finished.
Make sure to log out of websites when done.
Disable the save password function on web pages.
Make sure to log out of websites when done.
Which of the following is a feature of a basic power strip?
Protects against lightning strikes
Provides multiple outlets for power
Generates power for devices
Provides battery backup for devices
Provides multiple outlets for power
Which of the following connectors consists of three separate plugs for video?
Display port
S-video
Thunderbolt
Component
Component
Which of the following technologies allows people to communicate all over the world inexpensively?
Virtualization
SSID
Kinetics
VoIP
VoIP
Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?
Large USB flash drive connected to a PC
Medium capacity SATA hard drive
Network-attached storage appliance
Firewall with security management
Network-attached storage appliance
Which of the following would BEST be describe as password best practices? (Select THREE).
Use a long passwords
Sharing passwords with a trusted source
Limiting password resuse
Keeping default passwords
Use of special characters
Writing down difficult passwords
Use a long passwords
Limiting password reuse
Use of special characters
Which of the following is MOST likely required during installation in order to legally install software?
Automatic updates
Service level agreement
License key
Antivirus software
License key
A user wants to purchase a CAD appliaction that requires 8GB of RAM to operate. Which of the following operating system types is required?
8-bit
16-bit
32-bit
64-bit
64-bit
Which of the following BEST describes the pros and cons of a home wired network?
Low throughput, low mobility, high availability, high latency, high security
High throughput, high mobility, low availability, low latency, hight security
High throughput, low mobility, high availability, low latency, high security
Low throughput, high mobility, low availiability, high latency, low security
High throughput, low mobility, high availability, low latency, high security
Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?
Standard
Guest
Administrator
Power user
Guest
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?
Malware
Social engineering
Spam
Physical security
Social engineering
Where can a user find the latest updates, upgrades, or firmware or an electronic device that the vendor supports?
Internet search engine
Internet forum
Technical community groups
OEM website
OEM website
A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the users browser?
HTTP
HTTPS
SFTP
FTP
HTTPS
When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO).
IP address
User’s password
Computer’s name
Subnet mask
HTTP port
Fax number
IP address
Subnet mask
Which of the following is a reason that a user might upgrade a video card driver? (Select TWO).
To decrease the screen resolution
To access monitor standby mode
To fix an error message
To use additional features
To adjust the brightness/contrast
To fix an error message
To use additional features
Before purchasing a new video card for a PC, which of the following should be checked to ensure there will be enough electricity for the video card to function properly?
GPU
CPU
GUI
PSU
PSU
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue?
The computer does not have current antivirus software installed
The computer needs to have its components upgraded
The downloaded toolbars filing the browser screen
The owner was not using complex passwords
The downloaded toolbars filing the browser screen
Which of the following are considered input devices for a computer? (Select TWO).
Mouse
Printer
Speakers
Microphone
Monitor
Mouse
Microphone
While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website?
It stores data in cache or cookiees, but not both.
It requires login credentials for some sections.
It contains both secure and non-secure parts.
It is best viewed with a different browser.
It contains both secure and non-secure parts.
By default, which of the following types of operating systems can automatically detect a users location while the user is traveling in a bus.
Server
Desktop workstation
Virual server
Mobile
Mobile
A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?
Dumpster diving
Shoulder surfing
Phishing
Social enigeering
Shoulder surfing
Which of the following is the function of a CPU?
Encrypts data for remote transmission
Performs data computation
Supplies electricity to components
Provides storage location for files
Performs data computation
A technician is setting up a computer that was shipped. After everything is plugged in, the computer will not turn on. Which of the following should the technician do FIRST to identify the issue?
Check for physical damage on the computer.
Search for a solution on the Internet.
Reference the manufacturer’s documentation.
Ensure the power supply is set at the current voltage.
Ensure the power supply is set at the current voltage.
A user installing a printer can connect it to which of the following ports? (Select FOUR).
PS/2
VGA
DVI
USB
FireWire
Serial
RJ-11
Parallel
USB
FireWire
Serial
Parellel
When operating under optimal network conditions, which of the following has the HIGHEST reliability?
Bluetooth
Wired
Cellular
WiFi
Wired
When setting up a new workstation, which of the following should be configured during the initial OS setup wizard?
Additional software
Data and time settings
Peripheral devices
Security software
Date and time settings
When applying ergonomics to a workstation area, which of the following are the MOST important to consider? (Select TWO).
Proper sitting position
Amount of time computer will be used
Clarity of the display
Proper keyboard and mouse height
Number of speakers in sound system
Brightness and contrast of the display
Proper sitting position
Proper keyboard and mouse height
Which of the following allows for the FASTEST printer connections?
Bluetooth
USB
Parallel
Serial
USB
A user has purchased some new software from a vendor and wants to install it on all of the Windows computers in the house. Which of the following will help the user accomplish the task and ensure compliance with the software vendor?
Copy and paste the program between computers.
Purchase a multi-user license.
Purchase a single-user license.
Use remote desktop to share the program between computers.
Purchase a multi-user license.
An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access. Which of the following BEST protects against data theft in this instance?
Security software
Full disk encryption
Cable lock
Username and password
Patching the OS and third party software
Full disk encryption
Which of the following printers requires a special type of paper in order to print?
Impact
Thermal
Inkjet
Laser
Thermal
Which of the following is a common characteristic of open source software?
Update cycles are dictated by the manufacturer
Modifications to core funtionalities are made by the manufacturer
Can only run on certain manufacturer processors
Can be fully modified by the user
Can be fully modified by the user
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?
The browser is incompatible with the website
The workstation has been infected with malware
The website is not secured by SSL
The certificate of the website has expired
The workstation has been infected with malware
Which of the following components is required to send faxes via POTS?
NIC
Power supply
Modem
Wireless adapter
Modem
Which of the following file formats contain other files within them? (Select TWO).
.tiff
.dmg
.png
.mp3
.iso
.flac
.dmg
.iso
A user working on a laptop notices the mouse cursor frequently moves to random locations in a document while typing. Which of the following should the user do FIRST to help resolve this issue?
Ask tech support for help
Reboot the laptop
Turn off the touchpad
Reconnect the mouse
Turn off the touchpad
A users laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another users laptop. How could the user have prevented this breach?
Disable file and print sharing on the laptop.
Delete unused drives from the network.
Remove shared keys from the key ring.
Set the read-only attribute on the files.
Disable file and print sharing on the laptop.
Which of the following is the BEST reason to backup data?
To ensure data encryption
To ensure data stability
To ensure data security
To ensure data availability
To ensure data availability
A users operating system is set to automatically update as updates are released. However, last weeks updates failed to download. Which of the following should the user do FIRST to install the updates?
Reference the OS manufacturer’s website.
Run a virus scan to remove viruses.
Reinstall the operating system.
Change the automatic update schedule.
Manually download the updates.
Manually download the updates.
Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?
Micro SD card
Bluetooth
USB connection
Infrared
Bluetooth
An employee’s new computer came with a free 30-day trial version of antivirus software. The employee’s company provides enterprise antivirus software from a different vendor. Which of the following should the employee do in order to use a full version of antivirus software?
Enter the company product key for the antivirus software, enabling the full version.
Uninstall the current version antivirus software and install the company version.
Verify internet connectivity and run only scanning software.
Update the trial antivirus software to the latest version.
Uninstall the current version antivirus software and install the company version.
An employee’s new computer came with a free 30-day trial version of antivirus software. The employee’s company provides enterprise antivirus software from a different vendor. Which of the following should the employee do in order to use a full version of antivirus software?
Enter the company product key for the antivirus software, enabling the full version.
Uninstall the current version antivirus software and install the company version.
Verify internet connectivity and run only scanning software.
Update the trial antivirus software to the latest version.
Uninstall the current version antivirus software and install the company version.
Which of the following can a user configure on an operating system so that an audible sound is made when an error message is displayed?
Encryption
Hot keys
Accessibility options
Screen captures
Accessibility options
A user is setting up an older wireless access point that has only WEP for encryption. Which of the following additional
steps will help to secure the network? (Select TWO).
Disable SSID broadcast.
Refresh the MAC address.
Filter the MAC address.
Refresh the IP address.
Use CAT6 cables.
Disable SSID broadcast
Filter the MAC address
Which of the following extensions identifies a video file?
.msi
.tar
.img
.mp4
.mp4
Which of the following is the BEST example of productivity software?
Word processing software
Entertainment software
Image editing software
Anti-malware software
Word processing software
A technician has just finished setting up a SOHO wireless router but the client does not want the PC on the wireless network for security reasons. The technician connects an RJ-45 cable to the computer and the router but does not receive network connectivity. Which of the following is the NEXT step to diagnose the problem?
Change the IP address on the computer to match the router.
Reseat the power cable on the computer and reboot.
Check for link light activity on the computer and the router.
Change the hostname of the router to match the computer’s network.
Check for link light activity on the computer and the router.
Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?
Enabling full disk encryption
Requiring screensaver password
Disabling Bluetooth adapters
Adding multi-factor authentication
Enabling full disk encryption
A user is configuring a SOHO wireless router. The user should change the routers default administrator password for which of the following reasons?
To prevent improper data transmission encryption
To prevent unauthorized configuration changes
To prevent social engineering attacks
To increase wireless signal strength
To prevent unauthorized configuration changes
A user will be travelling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).
Keyboard
Speakers
Mouse
Bluetooth
NFC
Bluetooth
NFC
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
Hacking
Phishing
Spam
Cracking
Phishing
An attacker cracks a user’s password for all social media, email, and bank accounts. The user needs to change passwords for all these accounts. Which of the following should the user do in the future to prevent this from happening?
Disable unused browser toolbars.
Clear the browser cache.
Avoid credential reuse.
Delete tracking cookies.
Avoid credential reuse
After installing the OS on a workstation, a technician notices that everything is displayed in large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?
Color depth
Orientation
DPI settings
Resolution
Resolution
Joe, a user, needs to store a large amount of data but does not have enough space on his local computer. Which of the following are the BEST options for him to use? (Select TWO).
Network-attached storage
External hard drive
Optical drive
USB thumb drive
Another computer
Network-attached storage
External hard drive
Which of the following computer components are used to store data? (Select TWO).
GPU
HDD
RAM
NIC
CPU
HDD
RAM
Which of the following could be described as both an input and output device?
Flat-screen monitor
Multi-function printer
Microphone
Scanner
Multi-function printer
A technician has been tasked with changing the settings for a used SOHO router, but does not have the administrator password because the previous owner changed it. Which of the following actions will resolve this issue?
Click “Forgot password”
Use a password cracker
Hold the reset button
Use the password: password
Hold the reset button
A user learns of an operating system vulnerability that would allow a hacker to access the computer. The user would like to keep the operating system up to date to prevent such vulnerabilities from occurring. Which of the following should the user configure?
Additional OS features
Automatic updates
Software firewall
Anti-malware software
Automatic updates
A technician sets up a new computer system and connects the keyboard and mouse to the PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution?
Swap the mouse and keyboard to the other PS/2 ports
Remap the mouse and keyboard in the BIOS
Update the BIOS to recognize the new keyboard and mouse
Configure the keyboard localization settings
Swap the mouse and keyboard to the other PS/2 ports
Which of the following is an advantage of using cloud-based collaborative applications and storage, rather than local applications and storage?
Decreased software licensing costs
Higher security encryption
Limited storage space for files
Increased accessibility
Increased accessibility
Which of the following is a requirement to connect a smartphone to a wireless network?
SSID
SATA
SMTP
gzip
SSID
Which of the following protocols is used to secure communications between sender and receiver?
SIP
SNMP
SSL
SMTP
SSL
Which of the following software types allows for the creation of a single file composed of multiple subfiles, while at the same time reducing the overall size of combined elements?
Database
Document sharing
Compression
Maintenance
Compression
Which of the following are secure network protocols? (Select TWO).
IMAP
FTPS
SMTP
HTTPS
DNS
FTPS
HTTPS
Which of the following data connections would provide a user the BEST Internet availability while traveling?
Workstation with only RJ-45 connectors
Smartphone with cellular service
Laptop with Bluetooth wireless connectivity
Tablet connected to a SOHO wireless network
Smartphone with cellular service
A user receives an email formatted to appear as if the bank sent it. The email explains that the user must confirm the name, address, and social security number listed on the bank account. Which of the following BEST describes the security threat taking place?
Should surfing
Social engineering
Spam
Phishing
Phishing
A user installed a new scanner on a desktop personal computer without any documentation. The scanner powers on, the lamp turns on, and then the unit stops with a failure light lit. Which of the following should the user do FIRST?
Go to the scanner manufacturer’s website and download the current installation information
Check the personal computer manufacturer’s support website for information about scanner installation
Find a scanner user group website and ask for help
Update the scanner firmware and drivers, then reinstall the scanner
Go to the scanner manufacturer’s website and download the current installation information
Which of the following is performed during WiFi setup on a mobile device?
Configuring a Bluetooth pairing settings
Configuring email settings
Configuring screen lock settings
Configuring SSID settings
Configuring SSID settings
When considering backup media, which of the following holds the MOST data?
BD-R
DVD-R
DVD-DL
CD-ROM
BD-R
Which of the following is an example of ransomware?
A user is asked to pay a fee for a password to unlock access to their files
A user receives an email demanding payment for a trial application that has stopped working
A user has opened an Internet browser and is taken to a site that is not the normal home page
A user is asked to open an attachment that verifies the price of an item that was not ordered
A user is asked to pay a fee for a password to unlock access to their files
A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?
Change the SSID
Change the router’s address
Change the administrator password
Change the encryption key
Change the administrator password
When setting up a new device, there are multiple features available that will never be used. Which of the following should the user do to make the new device more secure?
Make all users adminstrators
Remove or disable the unnecessary features
Install a password manager on the device
Make all users guests
Remove or disable the unnecessary features
Which of the following is a safety feature of cloud-based backups?
Incremental copy of data
Local copy of data
Offsite storage of data
Full backup of PC data
Offsite storage of data
After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?
The application has to be registered to the user?
The application must be upgraded to a 64-bit version
The application must be activated
The application needs to be reinstalled
The application must be activated
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:
adware
spyware
ransomware
phishing
spyware
Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?
The monitor power cable is unplugged
The video cable has become disconnected
The video driver is not installed
The operating system has encountered a stop error
The screen save has activated
The video cable has become disconnected
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?
Change the router administrator username
Change the router’s broadcasting channel
Update the unit’s firmware
Use a complex administrator password
Update the unit’s firmware
Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).
Network connection
Microphone
Modem
Firewall
Webcam
Cable connection
Network connection
Microphone
Webcam
Joe, a user, saves a document to a flash drive on his computer in order to print the document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive. Which of the following is the MOST likely cause of the infection?
The flash drive was infected by a driving hacker on the way to the public kiosk.
The public workstation was infected by Joe’s flash drive.
The public workstation was infected and passed the virus to the flash drive.
The flash drive was already infected by the user’s computer.
The public workstation was infected and passed the virus to the flash drive.
A home computer that has been in operation for more than five years is now suffering from random shutdowns during the day. The PC is set up in an enclosed cubby built into the home office desk. Which of the following is MOST likely plaguing the PC?
The PC was switched over to 240v operation mode
Dust accumulation
The PC’s BIOS is severely out-of-date, causing PSU issues
EMI
Dust accumulation
Which of the following has the lowest latency?
SSD
NAS
Blu-Ray
DVD
SSD
Which of the following is the BEST security practice to use when configuring the management options of a wireless router?
Disable DHCP
Change the admin password
Enable SSID
Enable remote administation
Change the admin password