Practice Exam Questions Flashcards

1
Q

CRTL-V is an example of what?

Hot keys
Launch keys
Functions keys
System keys

A

Hot keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can a single DVD hold more than 4.7GB of data? (Choose all that apply)

High density recording
Multiple actuator arms
Multiple layers
Multiple sides

A

Multiple layers
Multiple sides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a valid recommendation for a strong antivirus/anti malware protection plan?

Set monthly updates
Run full system scans if a major virus or malware outbreak is reported
Disable real time protection to stop threats as they enter your system
Set up automatic quick scans to run at least quarterly

A

Run full system scans if a major virus or malware outbreak is reported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You purchased a laptop sold as surplus from your company. Its wireless adapter runs at up to 54Mbps but cannot connect to your 802.11n 2.4GHz router. Why?

The network adapter is 802.11a
The network adapter is 802.11g
The router cannot support 54Mbps devices
You must enable the 54Mbps settings in the router

A

The network adapter is 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is an external storage connection?

SATA
PATA
eSATA
ePATA

A

eSATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these ports are physically identical?

USB type A and USB type B
DVI and VGA
thunderbolt and mini DisplayPort
DisplayPort and FireWire

A

Thunderbolt and mini DisplayPort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A receipt printer on a cash register is likely to be what kind of printer?

Thermal
Laser
Inkjet
LED

A

Thermal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a flowchart, which symbol is used to represent a process?

Capsule
Cylinder
Parallelogram
Rectangle

A

Rectangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An IPv6 address contains how many bits?

32
128
256
64

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to record audio from a cassette deck so you can turn the sound into an MP3 audio file. Which of the following connectors on your computer do you use?

S/PDIF
Light blue mini jack
Pink mini jack
Black mini jack

A

Light blue mini jack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these is an ad hoc network?

Direct link with crossover cable
NAS
PATA
RAID

A

Direct link with crossover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of drive reads CompactFlash storage?

SSD
Card reader
USB flash drive
HDD

A

Card reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which kind of device stores data in patterns of magnetic polarity?

DVD
USB flash drive
CD
HDD

A

HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your client is using a cordless phone that uses the 2.4GHz frequency band. Which of the following wireless standards will not have interference problems caused by this phone?

Wireless B
Wireless AC
Wireless G
Wireless N

A

Wireless AC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Martha has a printer attached to her workstation with a USB cable. Monday morning she calls in sick and her computer is off. Which of the following is true?

Other users should map it as a network printer, and then they can print with no problems.
Other users need to turn the printer in, and then they can print with no problems
Other users will not be able to print
Other users will be able to print to the printer with no problems

A

Other users will not be able to print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You clean off an existing hard disk in Windows using a command line program. Which of the following will you use?

fdisk
chkdsk
diskpart
ps

A

diskpart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which type of printer uses a fused that gets hot and melts the image into the paper?

Inkjet
Thermal
Laser
Fusing

A

Laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions best improve the signal strength?

Ensure sources of EMI are removed
Update from 802.11b to 802.11g
Use WiFi protected setup
Enable WPA2-Enterprise

A

Ensure sources of EMI are removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of connector do you plug into a modem?

RJ-15
RJ-11
RJ-41
RJ-45

A

RJ-11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You have run into problems uninstalling an app in Windows. Which of the following tasks might you need to perform to finish the job?

Run Regedit
Run device manager
Disable UAC
Open the Microsoft store

A

Run Regedit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following statements is true about software updates for Linux?

All distributions have a GUI based update manager
All Debian based distributions have a GUI based update manager
All distributions use sudo apt-get update to update their software repository
All Debian-based distributions use sudo apt-get upgrade to to upgrade their software

A

All Debian-based distributions use sudo apt-get upgrade to to upgrade their software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do you check voltage levels while the computer is running?

VBA macro
Surge suppressor
PC health screen BIOS
Outlet tester

A

PC health screen in BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Multiparty fading happens when

Two SSIDs use the same channel
A router supports more than one wireless standard
A wireless router has two or more antennas
Signal reflections off objects are received at different times

A

Signal reflections off objects are received at different times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following best describes an application running in a typical operating system?

Thread
Process
Function
Task

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Google Docs is an example of which type of cloud computing?

GaaS
PaaS
SaaS
IaaS

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Your friend discovered a joystick in a box of his brother’s items in the attic. What type of connector might this joystick have? (Choose two)

USB
PS/2
RS-232
DA15

A

USB
DA15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You need to set up firewalls for various Linux distros. Which of the following is the basic Linux firewall?

iptables
ipconfig
Gufw
sudo apt-get

A

iptables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of network model is also called a domain?

Peer-to-peer
WAN
Client-server
LAN

A

Client-server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Your client has decided to add wireless support to an existing Ethernet network that already has a router to provide Internet access. What should the client connect to the network?

Wireless adapter
Wireless access point
Wireless switch
Wireless router

A

Wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following features an ARM 32-bit or 64-bit processor?

Laptop
Smartphone
Workstation
Server

A

Smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

You are inventorying a group of computers using Linux. Which command can you use to determine the hardware installed in each computer?

Device manager
showall
sudo lshw
system Report

A

sudo lshw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

You are connecting to a wireless network that does not use an encryption key but asks you to agree to terms before you can use it. This network specifically uses which of the following settings?

Open network with captive portal
Channel bonding
Hidden network
Default SSID

A

Open network with captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

One of your friends asks you if you have any SuperSpeed devices. What type of device is she talking about?

SSD
eSATA
USB
CRT

A

USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A wireless router is configured to use AES encryption. Which of the following options is enabled?

WPA
Open
WPA2
WEP

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following statements is true about DVI connectors?

They are digital and analog
They are analog only
They support hybrid video technology
They are digital only

A

They are digital and analog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You want to use the WiFi hotspot feature I. Your new car. Which of the following do you need to do first?

Measure the distance from your phones to your car
Upgrade your phones
Buy a data plan
Pair your phones to the hotspot

A

Buy a data plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following types of monitors is most likely to have a Degauss button in it!

CRT
Projector
Flat screen
touchscreen

A

CRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Your wireless network was originally set up with 802.11b hardware. It has been upgraded with an 802.11g router and some 802.11g wireless adapters. The original security standard was not changed since the network was first set up. What is it?

WPA
Wireless-B
WEP
WPA2

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

You have just been hired as a Certified Information Privacy Technologist. Before you start your new job, you have been asked to sign a document stipulating constraints and practices that you must agree to before accessing the corporate network. What is this document called?

AUP
PIIA
EULA
NDA

A

AUP

40
Q

Which of the following allows wireless devices to communicate to a wired network?

Access point
Firewall
Modem
Switch

A

Access point

41
Q

Which of the following is a network protocol that establishes a secure tunnel allowing remote users to log in securely?

SST
MDM
One time pad (OTP)
HTTP

A

SST

42
Q

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

A type 1 hypervisor
An embedded OS
Network attached storage
A storage area network

A

A type 1 hypervisor

43
Q

Which of the following commands can be used to find new versions of the apps and operating system on a Debian-based Linux distro?

sudo apt-get catalog
sudo apt-get update
sudo apt-get upgrade
sudo apt-get newfiles

A

sudo apt-get update

44
Q

When considering application interaction, an example of programmatic access can be best defined as what?

Administrators might use an administrative tool, such as phpMyAdmin, to connect and sign in to an RDBMS

Providing a GUI for users to select actions to perform on the database, which then converts those selections to the SQL statements that will be executed.

An application might use a database “in the background” without the user really being aware of its presence.

A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.

A

A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.

45
Q

Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?

Accessibility
Confidentiality
Integrity
Availability

A

Integrity

46
Q

With which method could an attacker use sniffing?

Eavesdropping
Destruction
Availability
Impersonation

A

Eavesdropping

47
Q

In terms of file systems, what benefits does exFAT provide over FAT and NTFS?

It has a larger maximum file size than its predecessors and can store file sizes up to 2TB.
It’s developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead.
It provides some additional attributes not provided before—for example, file-level security permissions.
It introduces a 64-bit addressing scheme, which allows for larger partitions than its predecessors.

A

It’s developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead.

48
Q

Which of these is a NOT a “generation” of cellular Internet services?

GPRS/EDGE
EV-DO
ARP
HSPA+

A

ARP

49
Q

Which Redundant Array of Independent Disks (RAID) has only striping with parity?

RAID 6
RAID 10
RAID 1
RAID 5

A

RAID 5

50
Q

In the area of workplace surveillance, what is monitoring data communications and employee’s behavior called?

Security assurance
Eavesdropping/wiretapping
Physical monitoring
Monitoring data

A

Security assurance

51
Q

How can you modify your File Explorer options to allow you to view hidden files?

Use the View tab under the File Explorer Options applet.
Modify the properties of the File Explorer window by clicking on the Properties button.
Use the Change Security and Maintenance Settings in the Control Panel.
Select the hidden files in the File Explorer window, right-click, and select view.

A

Use the View tab under the File Explorer Options applet.

52
Q

How does a search engine work?

A search engine accesses a collection of web pages and downloads them to your computer for viewing.

A search engine usually works by compiling a group of web pages and bookmarking them in your local cache for quick access.

A search engine usually works by compiling a database of information about web pages.

A search engine usually works by searching a web cache in real-time to get the most current results.

A

A search engine usually works by compiling a database of information about web pages.

53
Q

Select the one UNTRUE statement in regard to an expansion bus.

It’s also referred to as the Front Side Bus (FSB) or the local bus.

It’s one of two kinds of bus in the PC system: the expansion bus and the system bus.

It carries four things: data, address information, a timing signal, and power.

Its purpose is to provide the circuitry that connects the various microprocessors and other components on the motherboard.

A

It’s also referred to as the Front Side Bus (FSB) or the local bus.

54
Q

What is the main purpose of the Power-On Self-Test (POST)?

The computer performs a Power-On Self-Test (POST) to check that monitor display settings are correct.

The computer performs a Power-On Self-Test (POST) to check that the computer is plugged in and receiving power.

The computer performs a Power-On Self-Test (POST) to ensure the printer powers up correctly.

The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows.

A

The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows.

55
Q

Information is being taken from the CEO’s computer on a regular basis, even though passwords are being changed weekly. After checking the computer, you discover a keylogger program. Which of the following attacks was being used to get the data?

Wiretapping
Social engineering
Snooping
DoS

A

Snooping

56
Q

David just heard of a program that if installed on your computer gives the attacker administrator‐like access to your machine. What type of software is he talking about?

Rootkit
Trojan horse
Spyware
Ransomware

A

Rootkit

57
Q

The same database app can support different amounts of data. Assuming that the storage available to the database app is large enough for any amount of data supported by the app, which of the following affects the amount?

Database design
Row count
Column count
Database engine

A

Database engine

58
Q

Which of the following is a typical location for a rootkit?

Boot sector
User folder
Root folder
Windows executable

A

Boot sector

59
Q

Which of the following statements is correct about the port cluster?

Port clusters are the same on desktop and laptop computers.

Port clusters enable multiple USB devices to be connected to a computer.

Port clusters always include the same ports.

Port clusters are used for internal storage devices.

A

Port clusters enable multiple USB devices to be connected to a computer.

60
Q

A scripting language that includes aliases that help users to reuse existing Windows and Unix/Linux shell scripts is __________. (Fill in the blank.)

VBA
Ruby
PowerShell
Python

A

PowerShell

61
Q

The documentation for a new device states that it has a default IP address of 192.168.1.1. This device uses which type of setup?

Web based
Driver based
Plug and play
IP based

A

Web based

62
Q

In a three-tier application architecture, which tier is used for data?

N-tier
Tier 2
Tier 1
Tier 3

A

Tier 3

63
Q

A friend has lent you an audio cable for use with your older computer. He cautions you not to bend or crease the cable. Which type of cable is it?

S/PDIF coaxial
HDMI
Mini-jack surround
S/PDIF optical

A

S/PDIF optical

64
Q

You receive an email claiming to be from the IT security director that asks you to provide the server password. This could be an example of _________. (Fill in the blank.)

Disabling the audit trail
Replay attack
Spear phishing
Whaling

A

Spear phishing

65
Q

A USB port marked in red is designed for which of the following standards?

USB 2.0
High-amp charging USB port
USB 3.1 Gen 2
USB 3.0

A

USB 3.1 Gen 2

66
Q

You need to connect a display to your laptop so you can extend the desktop. The laptop has an HDMI port and a VGA port, but the display only has a DVI-D port. Which of the following will solve the problem?

Use a DVI-HDMI cable.
Connect a DVI-VGA adapter.
Broadcast the signal wirelessly.
Use only the laptop’s built-in display.

A

Use a DVI-HDMI cable.

67
Q

You have two Mac computers running OS X, and you want to connect them into a network. Which two types of connectors can help you accomplish this?

eSATA
RJ-45
RJ-11
FireWire

A

RJ-45
FireWire

68
Q

Your co-worker Ryan is setting up email on his director’s new iPad. Ryan does not know the name of the SMTP server, but the iPad needs to be set up in the next 10 minutes. What advice should you give him?

Configure the iPad to send email using IMAP instead.
Enter the same server name as the IMAP server.
Enter smtp.company.com.
Leave it blank.

A

Enter the same server name as the IMAP server.

69
Q

Fiber optic is being used as part of the distribution network for several types of Internet connections. Which of the following goes directly to the service location (home or business) to provide the fastest service?

FTTC
FTTN
FTTP
VDSL

A

FTTP

70
Q

You are working at an electronics store and a customer asks for a cable modem that supports DOCSIS. Which of the following should be your response?

Ask which version of DOCSIS is needed.
Offer the most expensive cable modem.
Ask which cable service the customer has.
Offer the least expensive cable modem.

A

Ask which cable service the customer has.

71
Q

Line numbers were a common feature of early versions of which of the following languages?

BASIC
COBOL
XML
Perl

A

BASIC

72
Q

If a virus attacks the boot sector of your hard drive as well as files in the file system, what type of virus is it?

Polymorphic
Multipartite
Companion
Macro

A

Multipartite

73
Q

Which of the following devices is an input/output (I/O) device?

Scanner
Multifunction device
Barcode reader
Projector

A

Multifunction device

74
Q

Which of the following is not a function of an operating system?

Monitor system health
Interface between the user and the machine
Coordinate hardware components
Coordinate software applications

A

Coordinate software applications

75
Q

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?

WLAN card
Bluetooth module
Thunderbolt cable
Infrared port

A

WLAN card

76
Q

The contents of the field Social in the table CustomerName and the contents of the field SSN in the table ShippingAddress are identical and unique. To be able to query data from both tables, you need to set which of the following between these fields?

JOIN
SELECT
Relation
SQL

A

Relation

77
Q

You enabled file encryption on your local computer. While you were on vacation, one of your co-workers managed to get on your computer and share your important files with other users. How did they do this?

They used the Disk Recovery tool to access the encrypted files.
They logged on with your username and password.
They logged on and disabled encryption.
All users logging into the system have access to encrypted files.

A

They logged on with your username and password.

78
Q

Which of the following statements is correct about the motherboard (system board)?

Some motherboards include video outputs.
The motherboard includes the power supply.
All motherboards include video outputs.
Storage devices are not connected to the motherboard.

A

Some motherboards include video outputs.

79
Q

What is the secure file transfer protocol that uses SSH for security?

HTTPS
FTPS
SFTP
SHTTP

A

SFTP

80
Q

To represent a decision in a flowchart, the usual symbol is a:

Cylinder
Rectangle
Diamond
Capsule

A

Diamond

81
Q

What type of malware is best known for carrying other malware as a payload?

Trojan horse
Worm
Rootkit
Virus

A

Worm

82
Q

As part of your disaster recovery planning, you have purchased replacement servers to run essential operations. Unfortunately, you were unable to purchase exact replacements. The new servers have different motherboards and processors. Which of the following steps might need to be taken during the OS backup process to ensure that the backups can be restored?

Configure the dissimilar hardware options
Determine if motherboards and processors from the old servers work in the new servers
Set up virtual machines
Run emulation

A

Configure the dissimilar hardware options

83
Q

Which of the following costs more than a cold site, and would require ongoing maintenance or hardware and possibly software, but can be made ready in hours, rather than days, compared to a cold site?

Redundant site
Mirrors site
Hot site
Warm site

A

Warm site

84
Q

You want to upgrade the graphics on a system with a discrete GPU. Which of the following describes the process?

Replace the motherboard
Remove the GPU from the card and replace it
Replace the CPU
Replace the graphics card

A

Replace the graphics card

85
Q

Which type of database backup uses operating system commands or third party apps?

Supplemental backup
Physical backup
Relational backup
Logical backup

A

Physical backup

86
Q

John purchases a single user software license for an application and installs it on his desktop. Then he installs it on his laptop computer. In this scenario, which of the following statements is true?

John can share the application with his friends to install on their computers

John can use the application on only one of the computers

John can use the application on both computers at the same time

John can use the application on both computers but only one at a time

A

John can use the application on only one of the computers

87
Q

Your organization has set up two routers, each connected to a different Internet Service Provider. This is an example of which of the following?

RAID
Network redundancy
High availability
Network backup

A

Network redundancy

88
Q

Which of the following provides data mirroring and striping using four drives?

RAID 0
RAID 10
RAID 5
RAID 4

A

RAID 10

89
Q

A client is complaining about slow network speeds after upgrading to Gigabit Ethernet. The network cable is marked CAT 5. Which of the following is likely solution?

The wiring is adequate for Gigabit Ethernet; Check elsewhere for the problem
Recommended adding a second cable and configure the network to use two cables in parallel
Recommend replacing the cable with CAT 6
Recommend adding a second cable and configure the network to use two cables in parallel

A

Recommend replacing the cable with CAT 6

90
Q

How can you tell if a file is encrypted in Windows 10?

Padlock and green filename
Padlock and red filenamr
Key with magenta filename
Key with blue filename

A

Padlock and green filename

91
Q

You are responsible for planning the backup strategy needed for disaster recovery. You have already identified the need to back up the database and transactions. In case the server crashes and the drive must be replaced, you also need which of the following?

OS backup
RAID
HSM
Redundant power supply

A

RAID

92
Q

A sequence chart is an example of:

Flowchart
UML
Do.. while
Pseudocode

A

UML

93
Q

Which of the following has a duplicate of your primary IT functions, with hardware apps, and data ready to run in minutes or less in the event of a disaster?

Identical site
Disaster recovery site
RAID 10
Hot site

A

Hot site

94
Q

You are making a presentation to a potential client who has the following needs: real time team access to tasks, calendars, email, and file storage. The team members live in various locations. You are going to recommend which solution?

Instant messaging
Online workspace
Office suite
Document sharing

A

Online workspace

95
Q

Windows Server enables a user to log in to any computer on a network. This is referred to as which of the following?

Wireless
Domain
Embedded
Workgroup

A

Domain

96
Q

You need to map your R drive to a local server. What is the proper context to map a shared drive?

\servername\sharename
>servername>sharename
\servername\sharename
::servername\sharename

A

\servername\sharename