fundamentals Flashcards
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
A. Host-based firewall
B. Strong administrator password
C. Anti-malware software
D. Full disk encryption
full disk enecryption
In which of the following situations should there be an expectation of privacy?
A. Posting a comment on a friend’s social media page
B. Submitting personal information on a school enrollment site
C. Posting a comment on a video sharing site
D. Sending email and pictures to a close relative
Submitting personal information on a school enrollment site
Which of the following data types should a developer use when creating a variable to hold a postal code?
A. Integer
B. String
C. Float
D. Boolean
String
Which of the following is the closest to machine language?
A. Scripted languages
B. Compiled languages
C. Query languages
D. Assembly languages
Assembly languages
A function is BEST used for enabling programs to:
A. hold a list of numbers.
B. be divided into reusable components.
C. define needed constant values.
D. define variables to hold different values.
be divided into reusable components.
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A. 1001Kbps
B. 110Mbps
C. 1.22Gbps
D. 123Mbps
1.22Gbps
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
A. 127.0.0.1
B. 172.16.2.189
C. 192.168.257.1
D. 255.255.255.0
172.16.2.189
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
A. Flat file
B. Word processor
C. Database
D. Network share
Database
A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe. Which of the following statements
BEST represents what the x86.exe means in the installation file?
A. x86 only supports an installation on a 32-bit CPU architecture.
B. x86 supports an installation on a 32-bit and a 64-bit CPU architecture.
C. x86 only supports an installation on a 64-bit CPU architecture.
D. x86 supports an installation on a 16-bit CPU architecture.
x86 only supports an installation on a 32-bit CPU architecture.
Which of the following would be used to send messages using the SMTP protocol?
A. Document sharing software
B. Instant messaging software
C. Conferencing software
D. Email software
Email software
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
A. Turn on private browsing
B. Delete browsing history on program close.
C. Notify when downloads are complete.
D. Configure prompting before downloading content.
Configure prompting before downloading content.
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
A. Customer date of birth
B. The first and last name of the Chief Executive Officer (CEO)
C. Customer service number
D. Company social media screen name
Customer date of birth
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
A. Database software
B. Word processing software
C. Conferencing software
D. Presentation software
Database software
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
A. Renew the IP address.
B. Configure the browser proxy settings.
C. Clear the browser cache.
D. Disable the pop-up blocker
Configure the browser proxy settings.
Which of the following is primarily a confidentiality concern?
A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering
Eavesdropping
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
A. Patent
B. Trademark
C. Watermark
D. Copyright
Copyright
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A. Check Knowledge Base.
B. Search local logs.
C. Research possible theories.
D. Question users.
Check Knowledge Base
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
A. Output
B. Storage
C. Input
D. Processing
Input
Which of the following allows wireless devices to communicate to a wired network?
A. Modem
B. Switch
C. Firewall
D. Access point
Access point
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
A. Laptop
B. Workstation
C. Mobile phone
D. Server
Server
For which of the following is a relational database management system MOST commonly used?
A. Building flowcharts
B. Storing information
C. Generating reports
D. Creating diagrams
Storing information
Which of the following BEST describes an application running on a typical operating system?
A. Process
B. Thread
C. Function
D. Task
Process
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
A. Update from 802.11b to 802.11g.
B. Ensure sources of EMI are removed.
C. Enable WPA2-Enterprise.
D. Use WiFi Protected Setup.
Ensure sources of EMI are removed.
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
A. Establish a plan of action.
B. Gather information
C. Duplicate the problem.
D. Find the root cause.
Duplicate the problem.
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
A. Ensure both devices are connected to the LAN.
B. Enable task scheduling.
C. Reset the proxy settings to their default values.
D. Review the fault tolerance configurations.
Ensure both devices are connected to the LAN.
Which of the following relational database constructs is used to ensure valid values are entered for a column?
A. Schema
B. Permissions
C. Constraint
D. Column
Constraint
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
A. Encryption
B. Compression
C. Permissions
D. Auditing
Encryption
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A. a storage area network.
B. an embedded OS.
C. network attached storage.
D. a Type 1 hypervisor.
Type 1 Hypervisor
Which of the following is a compiled language?
A. Perl
B. JScript
C. Java
D. PowerShell
Java
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
A. Document the solution and cause.
B. Create a new theory of cause.
C. Research the problem online.
D. Implement preventive measures.
Document the solution and cause.
Which of the following is a value that uniquely identifies a database record?
A. Foreign key
B. Public key
C. Primary key
D. Private key
Primary key
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
A. SELECT
B. INSERT
C. DELETE
D. UPDATE
SELECT
Which of the following statements BEST describes binary?
A. A notational system used to represent an on or off state
B. A notational system used to represent media access control
C. A notational system used to represent Internet protocol addressing
D. A notational system used to represent a storage unit of measurement
A notational system used to represent an on or off state
oe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe
MOST likely use to accomplish this?
A. Loop
B. Variable
C. Constant
D. Function
Variable
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
A. Restart the computer.
B. Contact other users.
C. Disconnect the peripherals.
D. Document the findings.
Document the findings
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
A. Non-repudiation
B. Authentication
C. Integrity
D. Accounting
Non-repudiation
Which of the following is an advantage of installing an application to the cloud?
A. Data is not stored locally.
B. Support is not required.
C. Service is not required.
D. Internet access is not required.
Data is not stored locally.
Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?
A. The monitor power cable is unplugged.
B. The video cable has become disconnected.
C. The video driver is not installed.
D. The operating system has encountered a stop error.
E. The screen saver has activated.
The video cable has become disconnected.
Which of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?
A. Chrome OS
B. Windows 7 Home
C. Mac OS X
D. iOS
Mac OS X
Which of the following computer components are used to store data? (Select TWO).
A. GPU B. HDD C. RAM D. NIC E. CPU
HDD and RAM
A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?
A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit
64 Bit
Which of the following is a reason that a user might upgrade a video card driver? (Select
TWO).
A. To decrease the screen resolution B. To access monitor standby mode C. To fix an error message D. To use additional features E. To adjust the brightness/contrast
C. To fix an error message
D. To use additional features
Which of the following protocols is used to secure communications between sender and receiver?
A. SIP
B. SNMP
C. SSL
D. SMTP
SSL
Which of the following components is required to send faxes via POTS?
A. NIC
B. Power supply
C. Modem
D. Wireless adapter
Modem
A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?
A. Change the SSID
B. Change the router’s address
C. Change the administrator password
D. Change the encryption key
Change the administrator password
Which of the following is performed during WiFi setup on a mobile device?
A. Configuring bluetooth pairing settings
B. Configuring email settings
C. Configuring screen lock settings
D. Configuring SSID settings
Configuring SSID settings
Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?
A. Enabling full disk encryption
B. Requiring screensaver password
C. Disabling Bluetooth adapters
D. Adding multifactor authentication
Enabling full disk encryption
Which of the following operating systems is available for free and can be modified by anyone?
A. Windows
B. Linux
C. Mac OS
D. Chrome OS
Linux
Which of the following is an example of ransomware?
A. A user is asked to pay a fee for a password to unlock access to their files.
B. A user receives an email demanding payment for a trial application that has stopped working.
C. A user has opened an Internet browser and is taken to a site that is not the normal home page.
D. A user is asked to open an attachment that verifies the price of an item that was not ordered.
A user is asked to pay a fee for a password to unlock access to their files.
A users operating system is set to automatically update as updates are released.
However, last weeks updates failed to download. Which of the following should the user do
FIRST to install the updates?
A. Reference the OS manufacturer’s website. B. Run a virus scan to remove viruses. C. Reinstall the operating system. D. Change the automatic update schedule. E. Manually download the updates.
Manually download the updates.
When setting up a new workstation, which of the following should be configured during the initial OS setup wizard?
A. Additional software
B. Date and time settings
C. Peripheral devices
D. Security software
Date and time settings
Which of the following software types allows for the creation of a single file composed of multiple subfiles, while at the same time reducing the overall size of the combined elements?
A. Database
B. Document sharing
C. Compression
D. Maintenance
Compression
A home computer that has been in operation for more than five years is now suffering from random shutdowns during the day. The PC is set up in an enclosed cubby built into the home office desk. Which of the following is MOST likely plaguing the PC?
A. The PC was switched over to 240v operation mode
B. Dust accumulation
C. The PC’s BIOS is severely out-of-date, causing PSU issues
D. EMI
Dust accumulation
An RoHS label on hardware indicates which of the following?
A. The hardware produces EMI when used.
B. The hardware is certified to be energy efficient.
C. The hardware provides battery backup for power outages.
D. The hardware needs to be properly disposed
The hardware needs to be properly disposed