Post Assessment Flashcards

1
Q

which of the following statements are true of laser printers? choose three:

a) uses a dry powdery plastic resin called toner, which is stored in a replaceable toner cartridge
b) sprays ink on the page to form the image
c) receives digitized data from a computer
d) contains a large cylinder known as a drum, which carries a high neg electrical charge

A

a c d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what type of OS would normally be found on a small device such as a watch?

mobile, workstation, embedded, virtual

A

embedded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

for which of the following connectivity options is the hardest to steal the signal?

infrared, cellular, 802.11, bluetooth

A

infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

scarlet has an iphone, which is running iOS 9.3.2. she has set her phone in airplane mode. which of the following services will she NOT be able to use after this?

wifi, music player, cellular data, bluetooth

A

cellular data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

you have a contact list for an online marketing company. it contains names and emails for 3 million people. a team of twenty marketers works with information on the list. which solution should you use to store the data?

relational database
word processing software
non-relational database
spreadsheet

A

relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ronnie is configuring a new ipad to connect to a wifi network. what does he need to locate to do this?

SSID, server, pairing ID, network number

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the number 10101.01 represents which data type?

string, float, boolean, char

A

float

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which of the following IoT devices would most commonly be associated with IP cameras?

home entertainment system
thermostat
home appliance
security system

A

security system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which type of language is most likely to be used to write a web page?

scripted, interpreted, compiled, assembly

A

interpreted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which of the following is considered non-structured data?

text, numbers, pictures, pictures with metadata

A

pictures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which of the following is an incorrect cartridge configuration?

all ink in one cartridge
four cartridges total
one black cartridge and a separate CMY color cartridge
two cartridges, one for cyan, one for magenta, and the other for black

A

two cartridges, one for cyan, one for magenta, and the other for black

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which of the following are high-level languages used to create programs such as games and operating systems? choose two

compiled
query
assembly
interpreted

A

compiled and interpreted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

you want to enable backups of your new iphone. which two options do you have?

icloud, itunes, ibackup, idrive

A

icloud and itunes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which type of expansion slot provides the fastest data transfer speeds?

PCIe x16, PCIe x64, PCI, PCIe x1

A

PCIe x16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a programmer needs to insert a data point into a program, and the data will change over time. what type of data will he be using?

vector, array, constant, variable

A

variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what type of power do internal computer components require?

LVC, HVC, AC, DC

A

DC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

you share a workstation with two other colleagues. which of the folowing settings can you enable to ensure that your colleagues never have access to your files?

file encryption, local permissions, share permissions, file locking

A

file encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which two of the following statements are true regarding single sign on?

it is convenient for users
it can potentially cause security issues
it requires the use of multi factor authentication
it does not work across different operating systems

A

it is convenient for users
it can potentially cause security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

which of the following file systems is default for Windows?

NTFS, ext4, XFS, HFS

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mary, a user, has created a SQL query to access data in her database. which of the following terms best describes the type of access she is using?

programmatic access
database dump
direct/manual access
user interface/utility access

A

programmatic access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

which of the following CIA triads is defined in the statement given below?
β€˜it means that the data is accurate and consistent.’

consistency
availability
integrity
confidentiality

22
Q

you have created a new table with 12 fields. how many foreign keys can the table have?

12, 1, 0, unlimited

23
Q

which tier of the three tier model coordinates between presentation and data?

data tier
presentation tier
business logic tier

A

business logic tier

24
Q

you want to ensure that a project team can only access the files specifically created for them and no other files. which term is most correct in describing this configuration

role based user access
discretionary access control
mandatory access control
least privilege model

A

least privilege model

25
which of the following allows you to physically secure a laptop from theft? LoJack, Docking station, port replicator, cable lock
cable lock
26
which of the following connections would be appropriate for a printer? choose two: HDMI, network, USB, PGA
network, USB
27
what is the name of malware that conceals itself on the host OS, allowing for full control access of the computer at a later date? spyware, Ransomware, trojan horse, rootkit
rootkit
28
jack works as a network admin in an organization. he has been assigned a task of setting up a secured wireless router. for this, he has changed the router's SSID and then changed the admin username and password. what will be the next step which jack should follow? from the clients, select WPA2 enable WPA2 personal with AES encryption choose a high-quality security passphrase enter the security passphrase to connect
enable WPA2 personal with AES encryption
29
which of the following allows an admin to control resources to maintain a certain service level? DHCP, guest access, NAT, QoS
QoS
30
which of the following is NOT a category of device hardening technique? protecting against network threats browsing the internet safely adding and enabling software and services updating devices and using system passwords
adding and enabling software and services
31
which of the following are not examples of authentication factors? choose two: one-time password signature biometrics recipt
signature and receipt
32
lana wants to pair a bluetooth device on her android OS phone with one of her colleagues. firstly, she turned on the bluetooth device on her phone. what will be the next step that lana needs to perform? a) enter the bluetooth device's passcode b) use her mobile device to locate and select the bluetooth device. c) confirm pairing on the bluetooth device by pressing a button or combination of buttons. d) send the files
b) use her mobile device to locate and select the bluetooth device.
33
which of the following statements are true of resolution? choose two: a) it is the measurement between triads on the display. b) it is defined by how many software picture elements (pixels) are used to draw the screen. c) it is described in terms of the visible image's dimensions. d) it is expressed in millimeters or dots per inch
b) it is defined by how many software picture elements (pixels) are used to draw the screen. c) it is described in terms of the visible image's dimensions.
34
what type of connector do you plug into a modem? RJ-41, RJ-15, RJ-11, RJ-45
RJ-11
35
which of the following statements are true about WPA? a) it uses a 128bit dynamic per packet key b) it is a protocol based on the Advanced Encryption Standard (AES) security algorithm c) it encrypts data to provide data security d) it is a standard that was the first to implement temporal key integral protocol
a) it uses a 128bit dynamic per packet key d) it is a standard that was the first to implement temporal key integral protocol
36
which of the following types of monitors is most likely to have a degauss button on it? projector, touchscreen, flat screen, CRT
CRT
37
which of the following ports are required for the Nintendo Switch? a) HDMI, USB-C, SD card, and game card b) HDMI and USB-C c) HDMI, USB 3.1 and 3 d) HDMI, USB 3.0, and infrared
a) HDMI, USB-C, SD card, and game card
38
which of the following is not a basic function of an OS? providing anti virus protection creating a structure for data management monitoring system health and functionality coordinating hardware components
providing anti virus protection
39
which of the following errors often means that a piece of hardware is defective or incompatible with the windows version? blue screen of death win has recovered from a serious error data error reading/writing drive a runtime error has occurred. do you wish to debug?
blue screen of death
40
which of the following executable file extensions is used for installation and removal of software within windows? .scexe, .msi, .exe, .app
.msi
41
an if statement is used by which type of programming logic? boolean, compiling, branching, looping
branching
42
which of the following is not an example of business software? email client accounting software database software project management software
email client
43
which of the following image file extensions is designed as a lossless compression format to replace GIF and is very common on websites? .png, .bmp, .gif, .jpg
.png
44
from the hard drive's perspective, moving a file is analogous to which of the following actions? cut and paste copy and paste renaming deleting
cut and paste
45
maria turns on a computer and it doesn't boot up properly. from inside the case, she hears a series of beeps. which of the following actions will maria perform to resolve this problem? insert POST card use msconfig use the system restore feature use a STOP error
insert the POST card device
46
if your computer runs low on RAM, what will it use instead? SSD Cache virtual memory optical drive
virtual memory
47
which of the following threats intercepts data and then sends the info back and forth as if nothing was wrong? replay, man in the middle, unauthorized info alteration, impersonation
man in the middle
48
which of the following commands can be used to see the hops the message takes from the router to across the internet? tracert, ipconfig, ping, arp
tracert
49
which of the following wireless specs provides the greatest data throughput? 802.11n, 802.11ac, 802.11g, bluetooth
802.11ac
50
which of the following actions is not considered a web browsing best practice? limiting the use of PII disabling autofill closing untrusted source warnings updating plugins and toolbars
closing untrusted source warnings
51
which of the following commands best describes the function of the DELETE command in a relational database? deletes a field from a table deletes a record from a table deletes a database or table deletes a schema from a table
deletes a record from a table
52
what does a website need to be secure? certificate, license, cookie, proxy server
certificate