fundamentals Flashcards

1
Q

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

A. Host-based firewall
B. Strong administrator password
C. Anti-malware software
D. Full disk encryption

A

full disk enecryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In which of the following situations should there be an expectation of privacy?

A. Posting a comment on a friend’s social media page
B. Submitting personal information on a school enrollment site
C. Posting a comment on a video sharing site
D. Sending email and pictures to a close relative

A

Submitting personal information on a school enrollment site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following data types should a developer use when creating a variable to hold a postal code?

A. Integer
B. String
C. Float
D. Boolean

A

String

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the closest to machine language?

A. Scripted languages
B. Compiled languages
C. Query languages
D. Assembly languages

A

Assembly languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A function is BEST used for enabling programs to:

A. hold a list of numbers.
B. be divided into reusable components.
C. define needed constant values.
D. define variables to hold different values.

A

be divided into reusable components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

A. 1001Kbps
B. 110Mbps
C. 1.22Gbps
D. 123Mbps

A

1.22Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

A. 127.0.0.1
B. 172.16.2.189
C. 192.168.257.1
D. 255.255.255.0

A

172.16.2.189

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?

A. Flat file
B. Word processor
C. Database
D. Network share

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe. Which of the following statements
BEST represents what the x86.exe means in the installation file?

A. x86 only supports an installation on a 32-bit CPU architecture.
B. x86 supports an installation on a 32-bit and a 64-bit CPU architecture.
C. x86 only supports an installation on a 64-bit CPU architecture.
D. x86 supports an installation on a 16-bit CPU architecture.

A

x86 only supports an installation on a 32-bit CPU architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following would be used to send messages using the SMTP protocol?

A. Document sharing software
B. Instant messaging software
C. Conferencing software
D. Email software

A

Email software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

A. Turn on private browsing
B. Delete browsing history on program close.
C. Notify when downloads are complete.
D. Configure prompting before downloading content.

A

Configure prompting before downloading content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

A. Customer date of birth
B. The first and last name of the Chief Executive Officer (CEO)
C. Customer service number
D. Company social media screen name

A

Customer date of birth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

A. Database software
B. Word processing software
C. Conferencing software
D. Presentation software

A

Database software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

A. Renew the IP address.
B. Configure the browser proxy settings.
C. Clear the browser cache.
D. Disable the pop-up blocker

A

Configure the browser proxy settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is primarily a confidentiality concern?

A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?

A. Patent
B. Trademark
C. Watermark
D. Copyright

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

A. Check Knowledge Base.
B. Search local logs.
C. Research possible theories.
D. Question users.

A

Check Knowledge Base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following BEST describes the practice of providing user credentials when logging onto the network?

A. Output
B. Storage
C. Input
D. Processing

A

Input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following allows wireless devices to communicate to a wired network?

A. Modem
B. Switch
C. Firewall
D. Access point

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

A. Laptop
B. Workstation
C. Mobile phone
D. Server

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

For which of the following is a relational database management system MOST commonly used?

A. Building flowcharts
B. Storing information
C. Generating reports
D. Creating diagrams

A

Storing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following BEST describes an application running on a typical operating system?

A. Process
B. Thread
C. Function
D. Task

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

A. Update from 802.11b to 802.11g.
B. Ensure sources of EMI are removed.
C. Enable WPA2-Enterprise.
D. Use WiFi Protected Setup.

A

Ensure sources of EMI are removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

A. Establish a plan of action.
B. Gather information
C. Duplicate the problem.
D. Find the root cause.

A

Duplicate the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

A. Ensure both devices are connected to the LAN.
B. Enable task scheduling.
C. Reset the proxy settings to their default values.
D. Review the fault tolerance configurations.

A

Ensure both devices are connected to the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following relational database constructs is used to ensure valid values are entered for a column?

A. Schema
B. Permissions
C. Constraint
D. Column

A

Constraint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

A. Encryption
B. Compression
C. Permissions
D. Auditing

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

A. a storage area network.
B. an embedded OS.
C. network attached storage.
D. a Type 1 hypervisor.

A

Type 1 Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is a compiled language?

A. Perl
B. JScript
C. Java
D. PowerShell

A

Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

A. Document the solution and cause.
B. Create a new theory of cause.
C. Research the problem online.
D. Implement preventive measures.

A

Document the solution and cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is a value that uniquely identifies a database record?

A. Foreign key
B. Public key
C. Primary key
D. Private key

A

Primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?

A. SELECT
B. INSERT
C. DELETE
D. UPDATE

A

SELECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following statements BEST describes binary?

A. A notational system used to represent an on or off state
B. A notational system used to represent media access control
C. A notational system used to represent Internet protocol addressing
D. A notational system used to represent a storage unit of measurement

A

A notational system used to represent an on or off state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

oe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe
MOST likely use to accomplish this?

A. Loop
B. Variable
C. Constant
D. Function

A

Variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

A. Restart the computer.
B. Contact other users.
C. Disconnect the peripherals.
D. Document the findings.

A

Document the findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

A. Non-repudiation
B. Authentication
C. Integrity
D. Accounting

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following is an advantage of installing an application to the cloud?

A. Data is not stored locally.
B. Support is not required.
C. Service is not required.
D. Internet access is not required.

A

Data is not stored locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?

A. The monitor power cable is unplugged.
B. The video cable has become disconnected.
C. The video driver is not installed.
D. The operating system has encountered a stop error.
E. The screen saver has activated.

A

The video cable has become disconnected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?

A. Chrome OS
B. Windows 7 Home
C. Mac OS X
D. iOS

A

Mac OS X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following computer components are used to store data? (Select TWO).

A. GPU
B. HDD
C. RAM
D. NIC
E. CPU
A

HDD and RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?

A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit

A

64 Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following is a reason that a user might upgrade a video card driver? (Select
TWO).

A. To decrease the screen resolution
B. To access monitor standby mode
C. To fix an error message
D. To use additional features
E. To adjust the brightness/contrast
A

C. To fix an error message

D. To use additional features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following protocols is used to secure communications between sender and receiver?

A. SIP
B. SNMP
C. SSL
D. SMTP

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following components is required to send faxes via POTS?

A. NIC
B. Power supply
C. Modem
D. Wireless adapter

A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?

A. Change the SSID
B. Change the router’s address
C. Change the administrator password
D. Change the encryption key

A

Change the administrator password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following is performed during WiFi setup on a mobile device?

A. Configuring bluetooth pairing settings
B. Configuring email settings
C. Configuring screen lock settings
D. Configuring SSID settings

A

Configuring SSID settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?

A. Enabling full disk encryption
B. Requiring screensaver password
C. Disabling Bluetooth adapters
D. Adding multifactor authentication

A

Enabling full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following operating systems is available for free and can be modified by anyone?

A. Windows
B. Linux
C. Mac OS
D. Chrome OS

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following is an example of ransomware?

A. A user is asked to pay a fee for a password to unlock access to their files.
B. A user receives an email demanding payment for a trial application that has stopped working.
C. A user has opened an Internet browser and is taken to a site that is not the normal home page.
D. A user is asked to open an attachment that verifies the price of an item that was not ordered.

A

A user is asked to pay a fee for a password to unlock access to their files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A users operating system is set to automatically update as updates are released.
However, last weeks updates failed to download. Which of the following should the user do
FIRST to install the updates?

A. Reference the OS manufacturer’s website.
B. Run a virus scan to remove viruses.
C. Reinstall the operating system.
D. Change the automatic update schedule.
E. Manually download the updates.
A

Manually download the updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

When setting up a new workstation, which of the following should be configured during the initial OS setup wizard?

A. Additional software
B. Date and time settings
C. Peripheral devices
D. Security software

A

Date and time settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following software types allows for the creation of a single file composed of multiple subfiles, while at the same time reducing the overall size of the combined elements?

A. Database
B. Document sharing
C. Compression
D. Maintenance

A

Compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A home computer that has been in operation for more than five years is now suffering from random shutdowns during the day. The PC is set up in an enclosed cubby built into the home office desk. Which of the following is MOST likely plaguing the PC?

A. The PC was switched over to 240v operation mode
B. Dust accumulation
C. The PC’s BIOS is severely out-of-date, causing PSU issues
D. EMI

A

Dust accumulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

An RoHS label on hardware indicates which of the following?

A. The hardware produces EMI when used.
B. The hardware is certified to be energy efficient.
C. The hardware provides battery backup for power outages.
D. The hardware needs to be properly disposed

A

The hardware needs to be properly disposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following BEST describes the pros and cons of a home wired network?

A. Low throughput, low mobility, high availability, high latency, high security
B. High throughput, high mobility, low availability, low latency, high security
C. High throughput, low mobility, high availability, low latency, high security
D. Low throughput, high mobility, low availability, high latency, low security

A

High throughput, low mobility, high availability, low latency, high security

56
Q

Which of the following are considered input devices for a computer? (Select TWO).

A. Mouse
B. Printer
C. Speakers
D. Microphone
E. Monitor
A

Mouse and Microphone

57
Q

Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?

A. Thermal
B. Laser
C. Dot matrix
D. Inkjet

A

Laser

58
Q

Which of the following is a common characteristic of open source software?

A. Update cycles are dictated by the manufacturer
B. Modifications to core functionalities are made by the manufacturer
C. Can only run on certain manufacturer processors
D. Can be fully modified by the user

A

Can be fully modified by the user

59
Q

Which of the following would BEST be described as password best practices? (Select
THREE).

A. Use of long passwords
B. Sharing passwords with a trusted source
C. Limiting password reuse
D. Keeping default passwords
E. Use of special characters
F. Writing down difficult passwords
A

Use of long passwords

Limiting password reuse

Use of special characters

60
Q

Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:

A. adware
B. spyware
C. ransomware
D. phishing

A

spyware

61
Q

Which of the following is considered an optical storage medium?

A. SSD
B. Blu-Ray
C. Flash drive
D. Memory card

A

Blu-Ray

62
Q

A user installed a new scanner on a desktop personal computer without any documentation. The scanner powers on, the lamp turns on, and then the unit stops with a failure light lit. Which of the following should the user do FIRST?

A. Go to the scanner manufacturer’s website and download the current installation information.
B. Check the personal computer manufacturer’s support website for information about scanner installation.
C. Find a scanner user group website and ask for help.
D. Update the scanner firmware and drivers, then reinstall the scanner.

A

Go to the scanner manufacturer’s website and download the current installation information.

63
Q

Which of the following is a requirement to connect a smartphone to a wireless network?

A. SSID
B. SATA
C. SMTP
D. gzip

A

SSID

64
Q

A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?

A. Malware
B. Social engineering
C. Spam
D. Physical security

A

Social engineering

65
Q

technician sets up a new computer system and connects the keyboard and mouse to the
PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution?

A. Swap the mouse and keyboard to the other PS/2 ports.
B. Remap the mouse and keyboard in the BIOS.
C. Update the BIOS to recognize the newer keyboard and mouse.
D. Configure the keyboard localization settings.

A

Swap the mouse and keyboard to the other PS/2 ports.

66
Q

A users laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another users laptop. How could the user have prevented this breach?

A. Disable file and print sharing on the laptop.
B. Delete unused drives from network.
C. Remove shared keys from the key ring.
D. Set the read-only attribute on the files.

A

Disable file and print sharing on the laptop.

67
Q

A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?

A. Only browse the Internet on WiFi connections that use WPA2
B. Turn off the guest account in the operating system
C. Disable autofill functionality within the web browser
D. Remove any legacy browsers from the computer

A

Disable autofill functionality within the web browser

68
Q

Which of the following printers requires a special type of paper in order to print?

A. Impact
B. Thermal
C. Inkjet
D. Laser

A

Thermal

69
Q

A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following
BEST describes this type of malware infection?

A. Ransomware
B. Adware
C. Spyware
D. Virus

A

Ransomware

70
Q

A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).

A. Keyboard
B. Speakers
C. Mouse
D. Bluetooth
E. NFC
A

Bluetooth and NFC

71
Q

Which of the following extensions identifies a video file?

A. .msi
B. .tar
C. .img
D. .mp4

A

mp4

72
Q

Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?

A. Hacking
B. Phishing
C. Spam
D. Cracking

A

Phishing

73
Q

When considering backup media, which of the following holds the MOST data?

A. BD-R
B. DVD-R
C. DVD-DL
D. CD-ROM

A

BD-R

74
Q

Which of the following is a feature of a basic power strip?

A. Protects against lightning strikes
B. Provides multiple outlets for power
C. Generates power for devices
D. Provides battery backup for devices

A

Provides multiple outlets for power

75
Q

Which of the following allows for the FASTEST printer connections?

A. Bluetooth
B. USB
C. Parallel
D. Serial

A

USB

76
Q

A user is setting up an older wireless access point that has only WEP for encryption. Which of the following additional steps will help to secure the network? (Select TWO).

A. Disable SSID broadcast.
B. Refresh the MAC address.
C. Filter the MAC address.
D. Refresh the IP address.
E. Use CAT6 cables.
A

Disable SSID broadcast and Filter MAC addresses

77
Q

Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?

A. Large USB flash drive connected to a PC
B. Medium capacity SATA hard drive
C. Network attached storage appliance
D. Firewall with security management

A

Network attached storage appliance

78
Q

Which of the following should be performed after a backup has been completed?

A. Delete the backup
B. Verify the backup
C. Save the backup
D. Schedule the backup

A

Verify the backup

79
Q

A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?

A. Dumpster diving
B. Shoulder surfing
C. Phishing
D. Social engineering

A

Shoulder surfing

80
Q

Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?

A. Standard
B. Guest
C. Administrator
D. Power user

A

Guest

81
Q

After installing the OS on a workstation, a technician notices that everything is displayed in large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?

A. Color depth
B. Orientation
C. DPI settings
D. Resolution

A

Resolution

82
Q

Which of the following is a 15-pin video connection?

A. DVI
B. S-video
C. Component
D. HDMI
E. VGA
A

VGA

83
Q

user is configuring a SOHO wireless router. The user should change the routers default administrator password for which of the following reasons?

A. To prevent improper data transmission encryption
B. To prevent unauthorized configuration changes
C. To prevent social engineering attacks
D. To increase wireless signal strength

A

To prevent unauthorized configuration changes

84
Q

When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO).

A. IP address
B. User's password
C. Computer’s name
D. Subnet mask
E. HTTP port
F. Fax number
A

IP address and subnet mask

85
Q

After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?

A. The application has to be registered to the user.
B. The application must be upgraded to a 64-bit version.
C. The application must be activated.
D. The application needs to be reinstalled.

A

The application must be activated.

86
Q

A technician is trying to access a users files and is unable to open any folder or file. Which of the following BEST describes the situation?

A. The folders contain older versions of the files.
B. The files are corrupted.
C. The technician needs to change the file attributes.
D. The technician does not have permissions.

A

The technician does not have permissions.

87
Q

A user installing a printer can connect it to which of the following ports? (Select FOUR).

A. PS/2
B. VGA
C. DVI
D. USB
E. FireWire
F. Serial
G. RJ-11
H. Parallel
A

USB
Serial
Parallel
FireWire

88
Q

When operating under optimal network conditions, which of the following has the HIGHEST reliability?

A. Bluetooth
B. Wired
C. Cellular
D. WiFi

A

Wired

89
Q

While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website?

A. It stores data in cache or cookies, but not both.
B. It requires login credentials for some sections.
C. It contains both secure and non-secure parts.
D. It is best viewed with a different browser.

A

It contains both secure and non-secure parts.

90
Q

An employees new computer came with a free 30-day trial version of antivirus software.
The employees company provides enterprise antivirus software from a different vendor.
Which of the following should the employee do in order to use a full version of antivirus software?

A. Enter the company product key for the antivirus software, enabling the full version.
B. Uninstall the current version antivirus software and install the company version.
C. Verify Internet connectivity and run online virus scanning software.
D. Update the trial antivirus software to the latest version.

A

Uninstall the current version antivirus software and install the company version.

91
Q

When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

A. Social engineering
B. Phishing
C. Virus attack
D. License theft

A

License theft

92
Q

Which of the following is the BEST reason to backup data?

A. To ensure data encryption
B. To ensure data stability
C. To ensure data security
D. To ensure data availability

A

To ensure data availability

93
Q

Before purchasing a new video card for a PC, which of the following should be checked to ensure there will be enough electricity for the video card to function properly?

A. GPU
B. CPU
C. GUI
D. PSU

A

PSU

94
Q

A technician has been tasked with changing the settings for a used SOHO router, but does not have the administrator password because the previous owner changed it. Which of the following actions will resolve this issue?

A. Click “Forgot password.”
B. Use a password cracker.
C. Hold the reset button.
D. Use the password: password.

A

Hold the reset button.

95
Q

Which of the following components are used to store data? (Select TWO).

A. Motherboard
B. RAM
C. CPU
D. GPU
E. SSD
A

RAM and SSD

96
Q

A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?

A. iOS
B. Windows
C. Mac OS
D. Chrome OS

A

Mac OS

97
Q

Which of the following terms refers to an anti-virus software file that is updated from time to time to protect a computer from new viruses?

A. Definition
B. Modules
C. Service pack
D. Hotfix

A

Definition

98
Q

Which of the following software displays advertisements, whether or not the user has consented?

A. Trojan horse
B. Honeypot
C. Spyware
D. Adware

A

Adware

99
Q

Which of the following stores user preferences related to a Web site?

A. Cookie
B. SSID
C. Local User profile
D. MAC address

A

Cookie

100
Q

You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?

A. WEP
B. WPA
C. TKIP
D. WPA 2

A

WPA 2

101
Q

Which of the following devices is used for accessing the data on Secure Digital (SD) card,
MMC card, and CompactFlash (CF)?

A. E-book reader
B. Memory card reader
C. Smart card reader
D. Barcode reader

A

Memory card reader

102
Q

Which of the following can be installed in an AGP slot?

A. Video card
B. RAM
C. Microprocessor
D. Modem card

A

Video card

103
Q

Which of the following are the most likely causes of a virus attack?
Each correct answer represents a complete solution. Choose all that apply.

A. Installing an application from an unreliable source
B. Downloading a file from an unknown Website
C. Installing a .DLL file from an unreliable source
D. Using a floppy, a compact disk, or a pen drive from an unreliable source

A

All of them

104
Q

Which of the following protocols handles the reliable delivery of data?

A. TCP
B. ARP
C. IPX
D. UDP

A

TCP

105
Q
What is the maximum data transmission speed of IEEE 802.11b wireless networks?
A. 54 Mbps
B. 600 Mbps
C. 600 Gbps
D. 11 Mbps
A

11 Mbps

106
Q

Which of the following can be used to accomplish authentication?
Each correct answer represents a complete solution. Choose all that apply.

A. Biometrics
B. Encryption
C. Password
D. Token

A

Biometrics

Password

Token

107
Q

Which of the following devices contains no moving parts and stores data in a digital format?

A. Solid-state drive
B. tape drive
C. Floppy disk drive
D. Hard disk drive

A

Solid-state drive

108
Q

You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

A. RamBus
B. Non Parity RAM
C. ECC RAM
D. Logic Parity RAM

A

ECC RAM

109
Q

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee’s computer?

A. Man-in-the-middle attack
B. Denial-of-Service (DoS) attack
C. Buffer-overflow attack
D. Shoulder surfing attack

A

Shoulder surfing

110
Q

Which of the following Interfaces has the ability to support digital audio as well as video through a single cable?

A. VGA
B. HDMI
C. SVGA
D. DVI

A

HDMI

111
Q

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

A. Hashing
B. Symmetric
C. Asymmetric
D. Numeric

A

Asymmetric

112
Q

Which of the following are types of social engineering attacks?
Each correct Answer represents a complete solution. Choose two.

A. An unauthorized person gains entrance to the building where the company’s database server resides and accesses the server by pretending to be an employee.
B. An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts.
C. An unauthorized person calls a user and pretends to be a system administrator in order to get the user’s password.
D. An unauthorized person modifies packet headers by using someone else’s IP address to his identity.

A

An unauthorized person calls a user and pretends to be a system administrator in order to get the user’s password.

An unauthorized person gains entrance to the building where the company’s database server resides and accesses the server by pretending to be an employee.

113
Q

Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

A. Bluetooth
B. 802.11
C. 802.11b
D. Infrared

A

Bluetooth

114
Q

A technician has connected a laptop to a television via HDMI cable. The entire display cannot be seen on the television. Which of the following settings should the technician modify?

A. Keystone
B. Resolution
C. Privacy filter
D. Frame rate

A

Resolution

115
Q

A small workgroup inherits a second-hand printer without networking capabilities. Which of the following is the BEST method of sharing this resource among the workgroup?

A. Connect the printer to a Bluetooth adapter in order for the users to print
B. Connect the printer by using the onboard Infrared port
C. Connect the printer to a user’s workstation and share the device
D. Connect the printer to a parallel switch box

A

Connect the printer to a user’s workstation and share the device

116
Q

Which of the following display technologies provides the BEST range of visible colors?

A. CRT
B. LCD
C. Plasma
D. OLED

A

OLED

117
Q

Which of the following adapters converts an analog signal to a digital signal?

A. S-Video to RCA
B. HDMI to VGA
C. VGA to DVI-D
D. DVI-D to HDMI

A

VGA to DVI-D

118
Q

Under normal circumstances, which of the following wireless standards provides the slowest transfer speed at 2.4GHz?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

A

802.11b

119
Q

A technician connects a second monitor to a desktop. It is physically located to the right of the existing monitor, but the mouse pointer can only get to the second monitor by moving to the left edge of the screen of the first monitor. Which of following display settings needs to be adjusted to get the pointer to move with the physical placement of the monitor?

A. Scaling
B. Rotation
C. Position
D. Resolution

A

Position

120
Q

A technician upgrades an older computer to Windows 8. The computer is running unusually slow, but the hardware has no problems and is adequate for the OS. Which of the following is the MOST likely solution?

A. Change the boot sequence
B. Switch the BIOS to UEFI
C. Defragment the hard drive
D. Enable virtualization

A

Defragment the hard drive

121
Q

For which of the following types of printers should a technician obtain a maintenance kit containing a fuser, transfer roller, and pickup rollers?

A. Thermal
B. Impact
C. Inkjet
D. Laser

A

Laser

122
Q

A technician is building a new PC and notices that it has 8 DIMM sockets labeled 0 through
7. Four are white and four are blue. Which of the following should the technician do FIRST?

A. Install the memory in the four white slots
B. Install the memory in the four blue slots
C. Consult the motherboard documentation
D. Install the memory in slots 0 through 3
E. Fill all slots with memory

A

Consult the motherboard documentation

123
Q

A technician is installing Hyper-V and is getting an error that the software is not able to be installed. Which of the following processor characteristics should be checked?

A. Cache size
B. Virtualization support
C. Number of cores
D. Hyperthreading

A

Virtualization support

124
Q

A technician is troubleshooting an expansion card in a computer that allows the computer to receive faxes over a VoIP line. The line connected to the expansion card is MOST likely which of the following cable types?

A. Coaxial
B. CAT3
C. CAT6
D. Multi-mode fiber
E. Single-mode fiber
A

CAT6

125
Q

A user wants to reduce the amount of paper consumed on a multi-function printer. Which of the following settings should be configured to achieve this outcome?

A. Orientation
B. Duplex
C. Collate
D. Economy ink

A

Duplex

126
Q

An IT Director wants to increase security on the company website to prevent man-in-the- middle attacks. Which of the following Internet protocols should be implemented to meet the requirement?

A. HTTPS
B. IMAP
C. TELNET
D. SMTP

A

HTTPS

127
Q

Which of the following Internet connection types is known to have a significantly higher latency than the others?

A. Cable
B. Satellite
C. DSL
D. Fiber

A

Satellite

128
Q

Which of the following is required during the installation of a digitizer?

A. Must be connected to the Internet
B. Must be cleaned
C. Must have the latest software installed
D. Must be calibrated

A

Must be calibrated

129
Q

A small company needs to print several color copies of the same contract to go to various departments and customers. Which of the following printers will be the QUICKEST?

A. 3D printing
B. Thermal printing
C. Impact printing
D. Laser printing

A

Laser printing

130
Q

Which of the following types of cables are MOST likely to be used to connect to an external hard drive? (Select TWO).

A. Molex
B. SPDIF
C. eSATA
D. HDMI
E. USB 3.0
F. CAT6e
A

eSATA and USB 3

131
Q

Which of the following memory types is primarily used in laptops?

A. SDRAM
B. DDR2
C. ECC
D. SODIMM

A

SODIMM

132
Q

Which of the following Internet connection types is a digital form that runs over standard telephone wiring?

A. Fiber
B. Dial-up
C. Cable
D. DSL

A

DSL

133
Q

There are 20 laptops in a room and they all need to connect wirelessly to the network.
Which of the following would be the BEST device to use?

A. Switch
B. Router
C. Access point
D. Hub

A

Access point

134
Q

A user wants to implement a wireless router that will have the fastest data speeds and operate over the 5GHz frequency. Which of the following standards should the user select?

A. 802.11a
B. 802.11ac
C. 802.11g
D. 802.11n

A

802.11ac

135
Q

Which of the following connectors are commonly used for fiber optic cables?

A. RJ-11 and RJ-45
B. ST and LC
C. F-connectors
D. BNC

A

ST and LC

136
Q

Which of the following devices is BEST to use when designing a SOHO network to ensure the least amount of collisions?

A. Switch
B. Bridge
C. Hub
D. Access point

A

Switch