Practice Exam Questions Flashcards

1
Q

CRTL-V is an example of what?

Hot keys
Launch keys
Functions keys
System keys

A

Hot keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can a single DVD hold more than 4.7GB of data? (Choose all that apply)

High density recording
Multiple actuator arms
Multiple layers
Multiple sides

A

Multiple layers
Multiple sides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a valid recommendation for a strong antivirus/anti malware protection plan?

Set monthly updates
Run full system scans if a major virus or malware outbreak is reported
Disable real time protection to stop threats as they enter your system
Set up automatic quick scans to run at least quarterly

A

Run full system scans if a major virus or malware outbreak is reported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You purchased a laptop sold as surplus from your company. Its wireless adapter runs at up to 54Mbps but cannot connect to your 802.11n 2.4GHz router. Why?

The network adapter is 802.11a
The network adapter is 802.11g
The router cannot support 54Mbps devices
You must enable the 54Mbps settings in the router

A

The network adapter is 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is an external storage connection?

SATA
PATA
eSATA
ePATA

A

eSATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these ports are physically identical?

USB type A and USB type B
DVI and VGA
thunderbolt and mini DisplayPort
DisplayPort and FireWire

A

Thunderbolt and mini DisplayPort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A receipt printer on a cash register is likely to be what kind of printer?

Thermal
Laser
Inkjet
LED

A

Thermal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a flowchart, which symbol is used to represent a process?

Capsule
Cylinder
Parallelogram
Rectangle

A

Rectangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An IPv6 address contains how many bits?

32
128
256
64

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to record audio from a cassette deck so you can turn the sound into an MP3 audio file. Which of the following connectors on your computer do you use?

S/PDIF
Light blue mini jack
Pink mini jack
Black mini jack

A

Light blue mini jack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these is an ad hoc network?

Direct link with crossover cable
NAS
PATA
RAID

A

Direct link with crossover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of drive reads CompactFlash storage?

SSD
Card reader
USB flash drive
HDD

A

Card reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which kind of device stores data in patterns of magnetic polarity?

DVD
USB flash drive
CD
HDD

A

HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your client is using a cordless phone that uses the 2.4GHz frequency band. Which of the following wireless standards will not have interference problems caused by this phone?

Wireless B
Wireless AC
Wireless G
Wireless N

A

Wireless AC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Martha has a printer attached to her workstation with a USB cable. Monday morning she calls in sick and her computer is off. Which of the following is true?

Other users should map it as a network printer, and then they can print with no problems.
Other users need to turn the printer in, and then they can print with no problems
Other users will not be able to print
Other users will be able to print to the printer with no problems

A

Other users will not be able to print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You clean off an existing hard disk in Windows using a command line program. Which of the following will you use?

fdisk
chkdsk
diskpart
ps

A

diskpart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which type of printer uses a fused that gets hot and melts the image into the paper?

Inkjet
Thermal
Laser
Fusing

A

Laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions best improve the signal strength?

Ensure sources of EMI are removed
Update from 802.11b to 802.11g
Use WiFi protected setup
Enable WPA2-Enterprise

A

Ensure sources of EMI are removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of connector do you plug into a modem?

RJ-15
RJ-11
RJ-41
RJ-45

A

RJ-11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You have run into problems uninstalling an app in Windows. Which of the following tasks might you need to perform to finish the job?

Run Regedit
Run device manager
Disable UAC
Open the Microsoft store

A

Run Regedit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following statements is true about software updates for Linux?

All distributions have a GUI based update manager
All Debian based distributions have a GUI based update manager
All distributions use sudo apt-get update to update their software repository
All Debian-based distributions use sudo apt-get upgrade to to upgrade their software

A

All Debian-based distributions use sudo apt-get upgrade to to upgrade their software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do you check voltage levels while the computer is running?

VBA macro
Surge suppressor
PC health screen BIOS
Outlet tester

A

PC health screen in BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Multiparty fading happens when

Two SSIDs use the same channel
A router supports more than one wireless standard
A wireless router has two or more antennas
Signal reflections off objects are received at different times

A

Signal reflections off objects are received at different times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following best describes an application running in a typical operating system?

Thread
Process
Function
Task

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Google Docs is an example of which type of cloud computing? GaaS PaaS SaaS IaaS
SaaS
26
Your friend discovered a joystick in a box of his brother’s items in the attic. What type of connector might this joystick have? (Choose two) USB PS/2 RS-232 DA15
USB DA15
27
You need to set up firewalls for various Linux distros. Which of the following is the basic Linux firewall? iptables ipconfig Gufw sudo apt-get
iptables
28
What type of network model is also called a domain? Peer-to-peer WAN Client-server LAN
Client-server
29
Your client has decided to add wireless support to an existing Ethernet network that already has a router to provide Internet access. What should the client connect to the network? Wireless adapter Wireless access point Wireless switch Wireless router
Wireless access point
30
Which of the following features an ARM 32-bit or 64-bit processor? Laptop Smartphone Workstation Server
Smartphone
31
You are inventorying a group of computers using Linux. Which command can you use to determine the hardware installed in each computer? Device manager showall sudo lshw system Report
sudo lshw
32
You are connecting to a wireless network that does not use an encryption key but asks you to agree to terms before you can use it. This network specifically uses which of the following settings? Open network with captive portal Channel bonding Hidden network Default SSID
Open network with captive portal
33
One of your friends asks you if you have any SuperSpeed devices. What type of device is she talking about? SSD eSATA USB CRT
USB
34
A wireless router is configured to use AES encryption. Which of the following options is enabled? WPA Open WPA2 WEP
WPA2
35
Which of the following statements is true about DVI connectors? They are digital and analog They are analog only They support hybrid video technology They are digital only
They are digital and analog
36
You want to use the WiFi hotspot feature I. Your new car. Which of the following do you need to do first? Measure the distance from your phones to your car Upgrade your phones Buy a data plan Pair your phones to the hotspot
Buy a data plan
37
Which of the following types of monitors is most likely to have a Degauss button in it! CRT Projector Flat screen touchscreen
CRT
38
Your wireless network was originally set up with 802.11b hardware. It has been upgraded with an 802.11g router and some 802.11g wireless adapters. The original security standard was not changed since the network was first set up. What is it? WPA Wireless-B WEP WPA2
WEP
39
You have just been hired as a Certified Information Privacy Technologist. Before you start your new job, you have been asked to sign a document stipulating constraints and practices that you must agree to before accessing the corporate network. What is this document called? AUP PIIA EULA NDA
AUP
40
Which of the following allows wireless devices to communicate to a wired network? Access point Firewall Modem Switch
Access point
41
Which of the following is a network protocol that establishes a secure tunnel allowing remote users to log in securely? SST MDM One time pad (OTP) HTTP
SST
42
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: A type 1 hypervisor An embedded OS Network attached storage A storage area network
A type 1 hypervisor
43
Which of the following commands can be used to find new versions of the apps and operating system on a Debian-based Linux distro? sudo apt-get catalog sudo apt-get update sudo apt-get upgrade sudo apt-get newfiles
sudo apt-get update
44
When considering application interaction, an example of programmatic access can be best defined as what? Administrators might use an administrative tool, such as phpMyAdmin, to connect and sign in to an RDBMS Providing a GUI for users to select actions to perform on the database, which then converts those selections to the SQL statements that will be executed. An application might use a database "in the background" without the user really being aware of its presence. A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.
A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.
45
Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage? Accessibility Confidentiality Integrity Availability
Integrity
46
With which method could an attacker use sniffing? Eavesdropping Destruction Availability Impersonation
Eavesdropping
47
In terms of file systems, what benefits does exFAT provide over FAT and NTFS? It has a larger maximum file size than its predecessors and can store file sizes up to 2TB. It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead. It provides some additional attributes not provided before—for example, file-level security permissions. It introduces a 64-bit addressing scheme, which allows for larger partitions than its predecessors.
It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead.
48
Which of these is a NOT a "generation" of cellular Internet services? GPRS/EDGE EV-DO ARP HSPA+
ARP
49
Which Redundant Array of Independent Disks (RAID) has only striping with parity? RAID 6 RAID 10 RAID 1 RAID 5
RAID 5
50
In the area of workplace surveillance, what is monitoring data communications and employee's behavior called? Security assurance Eavesdropping/wiretapping Physical monitoring Monitoring data
Security assurance
51
How can you modify your File Explorer options to allow you to view hidden files? Use the View tab under the File Explorer Options applet. Modify the properties of the File Explorer window by clicking on the Properties button. Use the Change Security and Maintenance Settings in the Control Panel. Select the hidden files in the File Explorer window, right-click, and select view.
Use the View tab under the File Explorer Options applet.
52
How does a search engine work? A search engine accesses a collection of web pages and downloads them to your computer for viewing. A search engine usually works by compiling a group of web pages and bookmarking them in your local cache for quick access. A search engine usually works by compiling a database of information about web pages. A search engine usually works by searching a web cache in real-time to get the most current results.
A search engine usually works by compiling a database of information about web pages.
53
Select the one UNTRUE statement in regard to an expansion bus. It's also referred to as the Front Side Bus (FSB) or the local bus. It's one of two kinds of bus in the PC system: the expansion bus and the system bus. It carries four things: data, address information, a timing signal, and power. Its purpose is to provide the circuitry that connects the various microprocessors and other components on the motherboard.
It's also referred to as the Front Side Bus (FSB) or the local bus.
54
What is the main purpose of the Power-On Self-Test (POST)? The computer performs a Power-On Self-Test (POST) to check that monitor display settings are correct. The computer performs a Power-On Self-Test (POST) to check that the computer is plugged in and receiving power. The computer performs a Power-On Self-Test (POST) to ensure the printer powers up correctly. The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows.
The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows.
55
Information is being taken from the CEO’s computer on a regular basis, even though passwords are being changed weekly. After checking the computer, you discover a keylogger program. Which of the following attacks was being used to get the data? Wiretapping Social engineering Snooping DoS
Snooping
56
David just heard of a program that if installed on your computer gives the attacker administrator‐like access to your machine. What type of software is he talking about? Rootkit Trojan horse Spyware Ransomware
Rootkit
57
The same database app can support different amounts of data. Assuming that the storage available to the database app is large enough for any amount of data supported by the app, which of the following affects the amount? Database design Row count Column count Database engine
Database engine
58
Which of the following is a typical location for a rootkit? Boot sector User folder Root folder Windows executable
Boot sector
59
Which of the following statements is correct about the port cluster? Port clusters are the same on desktop and laptop computers. Port clusters enable multiple USB devices to be connected to a computer. Port clusters always include the same ports. Port clusters are used for internal storage devices.
Port clusters enable multiple USB devices to be connected to a computer.
60
A scripting language that includes aliases that help users to reuse existing Windows and Unix/Linux shell scripts is __________. (Fill in the blank.) VBA Ruby PowerShell Python
PowerShell
61
The documentation for a new device states that it has a default IP address of 192.168.1.1. This device uses which type of setup? Web based Driver based Plug and play IP based
Web based
62
In a three-tier application architecture, which tier is used for data? N-tier Tier 2 Tier 1 Tier 3
Tier 3
63
A friend has lent you an audio cable for use with your older computer. He cautions you not to bend or crease the cable. Which type of cable is it? S/PDIF coaxial HDMI Mini-jack surround S/PDIF optical
S/PDIF optical
64
You receive an email claiming to be from the IT security director that asks you to provide the server password. This could be an example of _________. (Fill in the blank.) Disabling the audit trail Replay attack Spear phishing Whaling
Spear phishing
65
A USB port marked in red is designed for which of the following standards? USB 2.0 High-amp charging USB port USB 3.1 Gen 2 USB 3.0
USB 3.1 Gen 2
66
You need to connect a display to your laptop so you can extend the desktop. The laptop has an HDMI port and a VGA port, but the display only has a DVI-D port. Which of the following will solve the problem? Use a DVI-HDMI cable. Connect a DVI-VGA adapter. Broadcast the signal wirelessly. Use only the laptop’s built-in display.
Use a DVI-HDMI cable.
67
You have two Mac computers running OS X, and you want to connect them into a network. Which two types of connectors can help you accomplish this? eSATA RJ-45 RJ-11 FireWire
RJ-45 FireWire
68
Your co-worker Ryan is setting up email on his director’s new iPad. Ryan does not know the name of the SMTP server, but the iPad needs to be set up in the next 10 minutes. What advice should you give him? Configure the iPad to send email using IMAP instead. Enter the same server name as the IMAP server. Enter smtp.company.com. Leave it blank.
Enter the same server name as the IMAP server.
69
Fiber optic is being used as part of the distribution network for several types of Internet connections. Which of the following goes directly to the service location (home or business) to provide the fastest service? FTTC FTTN FTTP VDSL
FTTP
70
You are working at an electronics store and a customer asks for a cable modem that supports DOCSIS. Which of the following should be your response? Ask which version of DOCSIS is needed. Offer the most expensive cable modem. Ask which cable service the customer has. Offer the least expensive cable modem.
Ask which cable service the customer has.
71
Line numbers were a common feature of early versions of which of the following languages? BASIC COBOL XML Perl
BASIC
72
If a virus attacks the boot sector of your hard drive as well as files in the file system, what type of virus is it? Polymorphic Multipartite Companion Macro
Multipartite
73
Which of the following devices is an input/output (I/O) device? Scanner Multifunction device Barcode reader Projector
Multifunction device
74
Which of the following is not a function of an operating system? Monitor system health Interface between the user and the machine Coordinate hardware components Coordinate software applications
Coordinate software applications
75
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task? WLAN card Bluetooth module Thunderbolt cable Infrared port
WLAN card
76
The contents of the field Social in the table CustomerName and the contents of the field SSN in the table ShippingAddress are identical and unique. To be able to query data from both tables, you need to set which of the following between these fields? JOIN SELECT Relation SQL
Relation
77
You enabled file encryption on your local computer. While you were on vacation, one of your co-workers managed to get on your computer and share your important files with other users. How did they do this? They used the Disk Recovery tool to access the encrypted files. They logged on with your username and password. They logged on and disabled encryption. All users logging into the system have access to encrypted files.
They logged on with your username and password.
78
Which of the following statements is correct about the motherboard (system board)? Some motherboards include video outputs. The motherboard includes the power supply. All motherboards include video outputs. Storage devices are not connected to the motherboard.
Some motherboards include video outputs.
79
What is the secure file transfer protocol that uses SSH for security? HTTPS FTPS SFTP SHTTP
SFTP
80
To represent a decision in a flowchart, the usual symbol is a: Cylinder Rectangle Diamond Capsule
Diamond
81
What type of malware is best known for carrying other malware as a payload? Trojan horse Worm Rootkit Virus
Worm
82
As part of your disaster recovery planning, you have purchased replacement servers to run essential operations. Unfortunately, you were unable to purchase exact replacements. The new servers have different motherboards and processors. Which of the following steps might need to be taken during the OS backup process to ensure that the backups can be restored? Configure the dissimilar hardware options Determine if motherboards and processors from the old servers work in the new servers Set up virtual machines Run emulation
Configure the dissimilar hardware options
83
Which of the following costs more than a cold site, and would require ongoing maintenance or hardware and possibly software, but can be made ready in hours, rather than days, compared to a cold site? Redundant site Mirrors site Hot site Warm site
Warm site
84
You want to upgrade the graphics on a system with a discrete GPU. Which of the following describes the process? Replace the motherboard Remove the GPU from the card and replace it Replace the CPU Replace the graphics card
Replace the graphics card
85
Which type of database backup uses operating system commands or third party apps? Supplemental backup Physical backup Relational backup Logical backup
Physical backup
86
John purchases a single user software license for an application and installs it on his desktop. Then he installs it on his laptop computer. In this scenario, which of the following statements is true? John can share the application with his friends to install on their computers John can use the application on only one of the computers John can use the application on both computers at the same time John can use the application on both computers but only one at a time
John can use the application on only one of the computers
87
Your organization has set up two routers, each connected to a different Internet Service Provider. This is an example of which of the following? RAID Network redundancy High availability Network backup
Network redundancy
88
Which of the following provides data mirroring and striping using four drives? RAID 0 RAID 10 RAID 5 RAID 4
RAID 10
89
A client is complaining about slow network speeds after upgrading to Gigabit Ethernet. The network cable is marked CAT 5. Which of the following is likely solution? The wiring is adequate for Gigabit Ethernet; Check elsewhere for the problem Recommended adding a second cable and configure the network to use two cables in parallel Recommend replacing the cable with CAT 6 Recommend adding a second cable and configure the network to use two cables in parallel
Recommend replacing the cable with CAT 6
90
How can you tell if a file is encrypted in Windows 10? Padlock and green filename Padlock and red filenamr Key with magenta filename Key with blue filename
Padlock and green filename
91
You are responsible for planning the backup strategy needed for disaster recovery. You have already identified the need to back up the database and transactions. In case the server crashes and the drive must be replaced, you also need which of the following? OS backup RAID HSM Redundant power supply
RAID
92
A sequence chart is an example of: Flowchart UML Do.. while Pseudocode
UML
93
Which of the following has a duplicate of your primary IT functions, with hardware apps, and data ready to run in minutes or less in the event of a disaster? Identical site Disaster recovery site RAID 10 Hot site
Hot site
94
You are making a presentation to a potential client who has the following needs: real time team access to tasks, calendars, email, and file storage. The team members live in various locations. You are going to recommend which solution? Instant messaging Online workspace Office suite Document sharing
Online workspace
95
Windows Server enables a user to log in to any computer on a network. This is referred to as which of the following? Wireless Domain Embedded Workgroup
Domain
96
You need to map your R drive to a local server. What is the proper context to map a shared drive? \servername\sharename >servername>sharename \\servername\sharename ::servername\sharename
\\servername\sharename