Post Assessment Flashcards

1
Q

which of the following statements are true of laser printers? choose three:

a) uses a dry powdery plastic resin called toner, which is stored in a replaceable toner cartridge
b) sprays ink on the page to form the image
c) receives digitized data from a computer
d) contains a large cylinder known as a drum, which carries a high neg electrical charge

A

a c d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what type of OS would normally be found on a small device such as a watch?

mobile, workstation, embedded, virtual

A

embedded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

for which of the following connectivity options is the hardest to steal the signal?

infrared, cellular, 802.11, bluetooth

A

infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

scarlet has an iphone, which is running iOS 9.3.2. she has set her phone in airplane mode. which of the following services will she NOT be able to use after this?

wifi, music player, cellular data, bluetooth

A

cellular data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

you have a contact list for an online marketing company. it contains names and emails for 3 million people. a team of twenty marketers works with information on the list. which solution should you use to store the data?

relational database
word processing software
non-relational database
spreadsheet

A

relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ronnie is configuring a new ipad to connect to a wifi network. what does he need to locate to do this?

SSID, server, pairing ID, network number

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the number 10101.01 represents which data type?

string, float, boolean, char

A

float

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which of the following IoT devices would most commonly be associated with IP cameras?

home entertainment system
thermostat
home appliance
security system

A

security system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which type of language is most likely to be used to write a web page?

scripted, interpreted, compiled, assembly

A

interpreted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which of the following is considered non-structured data?

text, numbers, pictures, pictures with metadata

A

pictures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which of the following is an incorrect cartridge configuration?

all ink in one cartridge
four cartridges total
one black cartridge and a separate CMY color cartridge
two cartridges, one for cyan, one for magenta, and the other for black

A

two cartridges, one for cyan, one for magenta, and the other for black

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which of the following are high-level languages used to create programs such as games and operating systems? choose two

compiled
query
assembly
interpreted

A

compiled and interpreted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

you want to enable backups of your new iphone. which two options do you have?

icloud, itunes, ibackup, idrive

A

icloud and itunes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which type of expansion slot provides the fastest data transfer speeds?

PCIe x16, PCIe x64, PCI, PCIe x1

A

PCIe x16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a programmer needs to insert a data point into a program, and the data will change over time. what type of data will he be using?

vector, array, constant, variable

A

variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what type of power do internal computer components require?

LVC, HVC, AC, DC

A

DC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

you share a workstation with two other colleagues. which of the folowing settings can you enable to ensure that your colleagues never have access to your files?

file encryption, local permissions, share permissions, file locking

A

file encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which two of the following statements are true regarding single sign on?

it is convenient for users
it can potentially cause security issues
it requires the use of multi factor authentication
it does not work across different operating systems

A

it is convenient for users
it can potentially cause security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

which of the following file systems is default for Windows?

NTFS, ext4, XFS, HFS

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mary, a user, has created a SQL query to access data in her database. which of the following terms best describes the type of access she is using?

programmatic access
database dump
direct/manual access
user interface/utility access

A

programmatic access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

which of the following CIA triads is defined in the statement given below?
‘it means that the data is accurate and consistent.’

consistency
availability
integrity
confidentiality

A

integrity

22
Q

you have created a new table with 12 fields. how many foreign keys can the table have?

12, 1, 0, unlimited

A

unlimited

23
Q

which tier of the three tier model coordinates between presentation and data?

data tier
presentation tier
business logic tier

A

business logic tier

24
Q

you want to ensure that a project team can only access the files specifically created for them and no other files. which term is most correct in describing this configuration

role based user access
discretionary access control
mandatory access control
least privilege model

A

least privilege model

25
Q

which of the following allows you to physically secure a laptop from theft?

LoJack, Docking station, port replicator, cable lock

A

cable lock

26
Q

which of the following connections would be appropriate for a printer? choose two:

HDMI, network, USB, PGA

A

network, USB

27
Q

what is the name of malware that conceals itself on the host OS, allowing for full control access of the computer at a later date?

spyware, Ransomware, trojan horse, rootkit

A

rootkit

28
Q

jack works as a network admin in an organization. he has been assigned a task of setting up a secured wireless router. for this, he has changed the router’s SSID and then changed the admin username and password. what will be the next step which jack should follow?

from the clients, select WPA2
enable WPA2 personal with AES encryption
choose a high-quality security passphrase
enter the security passphrase to connect

A

enable WPA2 personal with AES encryption

29
Q

which of the following allows an admin to control resources to maintain a certain service level?

DHCP, guest access, NAT, QoS

A

QoS

30
Q

which of the following is NOT a category of device hardening technique?

protecting against network threats
browsing the internet safely
adding and enabling software and services
updating devices and using system passwords

A

adding and enabling software and services

31
Q

which of the following are not examples of authentication factors? choose two:

one-time password
signature
biometrics
recipt

A

signature and receipt

32
Q

lana wants to pair a bluetooth device on her android OS phone with one of her colleagues. firstly, she turned on the bluetooth device on her phone. what will be the next step that lana needs to perform?

a) enter the bluetooth device’s passcode
b) use her mobile device to locate and select the bluetooth device.
c) confirm pairing on the bluetooth device by pressing a button or combination of buttons.
d) send the files

A

b) use her mobile device to locate and select the bluetooth device.

33
Q

which of the following statements are true of resolution? choose two:

a) it is the measurement between triads on the display.
b) it is defined by how many software picture elements (pixels) are used to draw the screen.
c) it is described in terms of the visible image’s dimensions.
d) it is expressed in millimeters or dots per inch

A

b) it is defined by how many software picture elements (pixels) are used to draw the screen.
c) it is described in terms of the visible image’s dimensions.

34
Q

what type of connector do you plug into a modem?
RJ-41, RJ-15, RJ-11, RJ-45

A

RJ-11

35
Q

which of the following statements are true about WPA?

a) it uses a 128bit dynamic per packet key
b) it is a protocol based on the Advanced Encryption Standard (AES) security algorithm
c) it encrypts data to provide data security
d) it is a standard that was the first to implement temporal key integral protocol

A

a) it uses a 128bit dynamic per packet key

d) it is a standard that was the first to implement temporal key integral protocol

36
Q

which of the following types of monitors is most likely to have a degauss button on it?

projector, touchscreen, flat screen, CRT

A

CRT

37
Q

which of the following ports are required for the Nintendo Switch?

a) HDMI, USB-C, SD card, and game card
b) HDMI and USB-C
c) HDMI, USB 3.1 and 3
d) HDMI, USB 3.0, and infrared

A

a) HDMI, USB-C, SD card, and game card

38
Q

which of the following is not a basic function of an OS?

providing anti virus protection
creating a structure for data management
monitoring system health and functionality
coordinating hardware components

A

providing anti virus protection

39
Q

which of the following errors often means that a piece of hardware is defective or incompatible with the windows version?

blue screen of death
win has recovered from a serious error
data error reading/writing drive
a runtime error has occurred. do you wish to debug?

A

blue screen of death

40
Q

which of the following executable file extensions is used for installation and removal of software within windows?

.scexe, .msi, .exe, .app

A

.msi

41
Q

an if statement is used by which type of programming logic?

boolean, compiling, branching, looping

A

branching

42
Q

which of the following is not an example of business software?

email client
accounting software
database software
project management software

A

email client

43
Q

which of the following image file extensions is designed as a lossless compression format to replace GIF and is very common on websites?

.png, .bmp, .gif, .jpg

A

.png

44
Q

from the hard drive’s perspective, moving a file is analogous to which of the following actions?

cut and paste
copy and paste
renaming
deleting

A

cut and paste

45
Q

maria turns on a computer and it doesn’t boot up properly. from inside the case, she hears a series of beeps. which of the following actions will maria perform to resolve this problem?

insert POST card
use msconfig
use the system restore feature
use a STOP error

A

insert the POST card device

46
Q

if your computer runs low on RAM, what will it use instead?

SSD
Cache
virtual memory
optical drive

A

virtual memory

47
Q

which of the following threats intercepts data and then sends the info back and forth as if nothing was wrong?

replay, man in the middle, unauthorized info alteration, impersonation

A

man in the middle

48
Q

which of the following commands can be used to see the hops the message takes from the router to across the internet?

tracert, ipconfig, ping, arp

A

tracert

49
Q

which of the following wireless specs provides the greatest data throughput?

802.11n, 802.11ac, 802.11g, bluetooth

A

802.11ac

50
Q

which of the following actions is not considered a web browsing best practice?

limiting the use of PII
disabling autofill
closing untrusted source warnings
updating plugins and toolbars

A

closing untrusted source warnings

51
Q

which of the following commands best describes the function of the DELETE command in a relational database?

deletes a field from a table
deletes a record from a table
deletes a database or table
deletes a schema from a table

A

deletes a record from a table

52
Q

what does a website need to be secure?

certificate, license, cookie, proxy server

A

certificate