Practice Exam Questions Flashcards
CRTL-V is an example of what?
Hot keys
Launch keys
Functions keys
System keys
Hot keys
How can a single DVD hold more than 4.7GB of data? (Choose all that apply)
High density recording
Multiple actuator arms
Multiple layers
Multiple sides
Multiple layers
Multiple sides
Which of the following is a valid recommendation for a strong antivirus/anti malware protection plan?
Set monthly updates
Run full system scans if a major virus or malware outbreak is reported
Disable real time protection to stop threats as they enter your system
Set up automatic quick scans to run at least quarterly
Run full system scans if a major virus or malware outbreak is reported
You purchased a laptop sold as surplus from your company. Its wireless adapter runs at up to 54Mbps but cannot connect to your 802.11n 2.4GHz router. Why?
The network adapter is 802.11a
The network adapter is 802.11g
The router cannot support 54Mbps devices
You must enable the 54Mbps settings in the router
The network adapter is 802.11a
Which of these is an external storage connection?
SATA
PATA
eSATA
ePATA
eSATA
Which of these ports are physically identical?
USB type A and USB type B
DVI and VGA
thunderbolt and mini DisplayPort
DisplayPort and FireWire
Thunderbolt and mini DisplayPort
A receipt printer on a cash register is likely to be what kind of printer?
Thermal
Laser
Inkjet
LED
Thermal
In a flowchart, which symbol is used to represent a process?
Capsule
Cylinder
Parallelogram
Rectangle
Rectangle
An IPv6 address contains how many bits?
32
128
256
64
128
You need to record audio from a cassette deck so you can turn the sound into an MP3 audio file. Which of the following connectors on your computer do you use?
S/PDIF
Light blue mini jack
Pink mini jack
Black mini jack
Light blue mini jack
Which of these is an ad hoc network?
Direct link with crossover cable
NAS
PATA
RAID
Direct link with crossover cable
What kind of drive reads CompactFlash storage?
SSD
Card reader
USB flash drive
HDD
Card reader
Which kind of device stores data in patterns of magnetic polarity?
DVD
USB flash drive
CD
HDD
HDD
Your client is using a cordless phone that uses the 2.4GHz frequency band. Which of the following wireless standards will not have interference problems caused by this phone?
Wireless B
Wireless AC
Wireless G
Wireless N
Wireless AC
Martha has a printer attached to her workstation with a USB cable. Monday morning she calls in sick and her computer is off. Which of the following is true?
Other users should map it as a network printer, and then they can print with no problems.
Other users need to turn the printer in, and then they can print with no problems
Other users will not be able to print
Other users will be able to print to the printer with no problems
Other users will not be able to print
You clean off an existing hard disk in Windows using a command line program. Which of the following will you use?
fdisk
chkdsk
diskpart
ps
diskpart
Which type of printer uses a fused that gets hot and melts the image into the paper?
Inkjet
Thermal
Laser
Fusing
Laser
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions best improve the signal strength?
Ensure sources of EMI are removed
Update from 802.11b to 802.11g
Use WiFi protected setup
Enable WPA2-Enterprise
Ensure sources of EMI are removed
What type of connector do you plug into a modem?
RJ-15
RJ-11
RJ-41
RJ-45
RJ-11
You have run into problems uninstalling an app in Windows. Which of the following tasks might you need to perform to finish the job?
Run Regedit
Run device manager
Disable UAC
Open the Microsoft store
Run Regedit
Which of the following statements is true about software updates for Linux?
All distributions have a GUI based update manager
All Debian based distributions have a GUI based update manager
All distributions use sudo apt-get update to update their software repository
All Debian-based distributions use sudo apt-get upgrade to to upgrade their software
All Debian-based distributions use sudo apt-get upgrade to to upgrade their software
How do you check voltage levels while the computer is running?
VBA macro
Surge suppressor
PC health screen BIOS
Outlet tester
PC health screen in BIOS
Multiparty fading happens when
Two SSIDs use the same channel
A router supports more than one wireless standard
A wireless router has two or more antennas
Signal reflections off objects are received at different times
Signal reflections off objects are received at different times
Which of the following best describes an application running in a typical operating system?
Thread
Process
Function
Task
Process
Google Docs is an example of which type of cloud computing?
GaaS
PaaS
SaaS
IaaS
SaaS
Your friend discovered a joystick in a box of his brother’s items in the attic. What type of connector might this joystick have? (Choose two)
USB
PS/2
RS-232
DA15
USB
DA15
You need to set up firewalls for various Linux distros. Which of the following is the basic Linux firewall?
iptables
ipconfig
Gufw
sudo apt-get
iptables
What type of network model is also called a domain?
Peer-to-peer
WAN
Client-server
LAN
Client-server
Your client has decided to add wireless support to an existing Ethernet network that already has a router to provide Internet access. What should the client connect to the network?
Wireless adapter
Wireless access point
Wireless switch
Wireless router
Wireless access point
Which of the following features an ARM 32-bit or 64-bit processor?
Laptop
Smartphone
Workstation
Server
Smartphone
You are inventorying a group of computers using Linux. Which command can you use to determine the hardware installed in each computer?
Device manager
showall
sudo lshw
system Report
sudo lshw
You are connecting to a wireless network that does not use an encryption key but asks you to agree to terms before you can use it. This network specifically uses which of the following settings?
Open network with captive portal
Channel bonding
Hidden network
Default SSID
Open network with captive portal
One of your friends asks you if you have any SuperSpeed devices. What type of device is she talking about?
SSD
eSATA
USB
CRT
USB
A wireless router is configured to use AES encryption. Which of the following options is enabled?
WPA
Open
WPA2
WEP
WPA2
Which of the following statements is true about DVI connectors?
They are digital and analog
They are analog only
They support hybrid video technology
They are digital only
They are digital and analog
You want to use the WiFi hotspot feature I. Your new car. Which of the following do you need to do first?
Measure the distance from your phones to your car
Upgrade your phones
Buy a data plan
Pair your phones to the hotspot
Buy a data plan
Which of the following types of monitors is most likely to have a Degauss button in it!
CRT
Projector
Flat screen
touchscreen
CRT
Your wireless network was originally set up with 802.11b hardware. It has been upgraded with an 802.11g router and some 802.11g wireless adapters. The original security standard was not changed since the network was first set up. What is it?
WPA
Wireless-B
WEP
WPA2
WEP
You have just been hired as a Certified Information Privacy Technologist. Before you start your new job, you have been asked to sign a document stipulating constraints and practices that you must agree to before accessing the corporate network. What is this document called?
AUP
PIIA
EULA
NDA
AUP
Which of the following allows wireless devices to communicate to a wired network?
Access point
Firewall
Modem
Switch
Access point
Which of the following is a network protocol that establishes a secure tunnel allowing remote users to log in securely?
SST
MDM
One time pad (OTP)
HTTP
SST
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A type 1 hypervisor
An embedded OS
Network attached storage
A storage area network
A type 1 hypervisor
Which of the following commands can be used to find new versions of the apps and operating system on a Debian-based Linux distro?
sudo apt-get catalog
sudo apt-get update
sudo apt-get upgrade
sudo apt-get newfiles
sudo apt-get update
When considering application interaction, an example of programmatic access can be best defined as what?
Administrators might use an administrative tool, such as phpMyAdmin, to connect and sign in to an RDBMS
Providing a GUI for users to select actions to perform on the database, which then converts those selections to the SQL statements that will be executed.
An application might use a database “in the background” without the user really being aware of its presence.
A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.
A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.
Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?
Accessibility
Confidentiality
Integrity
Availability
Integrity
With which method could an attacker use sniffing?
Eavesdropping
Destruction
Availability
Impersonation
Eavesdropping
In terms of file systems, what benefits does exFAT provide over FAT and NTFS?
It has a larger maximum file size than its predecessors and can store file sizes up to 2TB.
It’s developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead.
It provides some additional attributes not provided before—for example, file-level security permissions.
It introduces a 64-bit addressing scheme, which allows for larger partitions than its predecessors.
It’s developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead.
Which of these is a NOT a “generation” of cellular Internet services?
GPRS/EDGE
EV-DO
ARP
HSPA+
ARP
Which Redundant Array of Independent Disks (RAID) has only striping with parity?
RAID 6
RAID 10
RAID 1
RAID 5
RAID 5
In the area of workplace surveillance, what is monitoring data communications and employee’s behavior called?
Security assurance
Eavesdropping/wiretapping
Physical monitoring
Monitoring data
Security assurance
How can you modify your File Explorer options to allow you to view hidden files?
Use the View tab under the File Explorer Options applet.
Modify the properties of the File Explorer window by clicking on the Properties button.
Use the Change Security and Maintenance Settings in the Control Panel.
Select the hidden files in the File Explorer window, right-click, and select view.
Use the View tab under the File Explorer Options applet.
How does a search engine work?
A search engine accesses a collection of web pages and downloads them to your computer for viewing.
A search engine usually works by compiling a group of web pages and bookmarking them in your local cache for quick access.
A search engine usually works by compiling a database of information about web pages.
A search engine usually works by searching a web cache in real-time to get the most current results.
A search engine usually works by compiling a database of information about web pages.
Select the one UNTRUE statement in regard to an expansion bus.
It’s also referred to as the Front Side Bus (FSB) or the local bus.
It’s one of two kinds of bus in the PC system: the expansion bus and the system bus.
It carries four things: data, address information, a timing signal, and power.
Its purpose is to provide the circuitry that connects the various microprocessors and other components on the motherboard.
It’s also referred to as the Front Side Bus (FSB) or the local bus.
What is the main purpose of the Power-On Self-Test (POST)?
The computer performs a Power-On Self-Test (POST) to check that monitor display settings are correct.
The computer performs a Power-On Self-Test (POST) to check that the computer is plugged in and receiving power.
The computer performs a Power-On Self-Test (POST) to ensure the printer powers up correctly.
The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows.
The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows.
Information is being taken from the CEO’s computer on a regular basis, even though passwords are being changed weekly. After checking the computer, you discover a keylogger program. Which of the following attacks was being used to get the data?
Wiretapping
Social engineering
Snooping
DoS
Snooping
David just heard of a program that if installed on your computer gives the attacker administrator‐like access to your machine. What type of software is he talking about?
Rootkit
Trojan horse
Spyware
Ransomware
Rootkit
The same database app can support different amounts of data. Assuming that the storage available to the database app is large enough for any amount of data supported by the app, which of the following affects the amount?
Database design
Row count
Column count
Database engine
Database engine
Which of the following is a typical location for a rootkit?
Boot sector
User folder
Root folder
Windows executable
Boot sector
Which of the following statements is correct about the port cluster?
Port clusters are the same on desktop and laptop computers.
Port clusters enable multiple USB devices to be connected to a computer.
Port clusters always include the same ports.
Port clusters are used for internal storage devices.
Port clusters enable multiple USB devices to be connected to a computer.
A scripting language that includes aliases that help users to reuse existing Windows and Unix/Linux shell scripts is __________. (Fill in the blank.)
VBA
Ruby
PowerShell
Python
PowerShell
The documentation for a new device states that it has a default IP address of 192.168.1.1. This device uses which type of setup?
Web based
Driver based
Plug and play
IP based
Web based
In a three-tier application architecture, which tier is used for data?
N-tier
Tier 2
Tier 1
Tier 3
Tier 3
A friend has lent you an audio cable for use with your older computer. He cautions you not to bend or crease the cable. Which type of cable is it?
S/PDIF coaxial
HDMI
Mini-jack surround
S/PDIF optical
S/PDIF optical
You receive an email claiming to be from the IT security director that asks you to provide the server password. This could be an example of _________. (Fill in the blank.)
Disabling the audit trail
Replay attack
Spear phishing
Whaling
Spear phishing
A USB port marked in red is designed for which of the following standards?
USB 2.0
High-amp charging USB port
USB 3.1 Gen 2
USB 3.0
USB 3.1 Gen 2
You need to connect a display to your laptop so you can extend the desktop. The laptop has an HDMI port and a VGA port, but the display only has a DVI-D port. Which of the following will solve the problem?
Use a DVI-HDMI cable.
Connect a DVI-VGA adapter.
Broadcast the signal wirelessly.
Use only the laptop’s built-in display.
Use a DVI-HDMI cable.
You have two Mac computers running OS X, and you want to connect them into a network. Which two types of connectors can help you accomplish this?
eSATA
RJ-45
RJ-11
FireWire
RJ-45
FireWire
Your co-worker Ryan is setting up email on his director’s new iPad. Ryan does not know the name of the SMTP server, but the iPad needs to be set up in the next 10 minutes. What advice should you give him?
Configure the iPad to send email using IMAP instead.
Enter the same server name as the IMAP server.
Enter smtp.company.com.
Leave it blank.
Enter the same server name as the IMAP server.
Fiber optic is being used as part of the distribution network for several types of Internet connections. Which of the following goes directly to the service location (home or business) to provide the fastest service?
FTTC
FTTN
FTTP
VDSL
FTTP
You are working at an electronics store and a customer asks for a cable modem that supports DOCSIS. Which of the following should be your response?
Ask which version of DOCSIS is needed.
Offer the most expensive cable modem.
Ask which cable service the customer has.
Offer the least expensive cable modem.
Ask which cable service the customer has.
Line numbers were a common feature of early versions of which of the following languages?
BASIC
COBOL
XML
Perl
BASIC
If a virus attacks the boot sector of your hard drive as well as files in the file system, what type of virus is it?
Polymorphic
Multipartite
Companion
Macro
Multipartite
Which of the following devices is an input/output (I/O) device?
Scanner
Multifunction device
Barcode reader
Projector
Multifunction device
Which of the following is not a function of an operating system?
Monitor system health
Interface between the user and the machine
Coordinate hardware components
Coordinate software applications
Coordinate software applications
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?
WLAN card
Bluetooth module
Thunderbolt cable
Infrared port
WLAN card
The contents of the field Social in the table CustomerName and the contents of the field SSN in the table ShippingAddress are identical and unique. To be able to query data from both tables, you need to set which of the following between these fields?
JOIN
SELECT
Relation
SQL
Relation
You enabled file encryption on your local computer. While you were on vacation, one of your co-workers managed to get on your computer and share your important files with other users. How did they do this?
They used the Disk Recovery tool to access the encrypted files.
They logged on with your username and password.
They logged on and disabled encryption.
All users logging into the system have access to encrypted files.
They logged on with your username and password.
Which of the following statements is correct about the motherboard (system board)?
Some motherboards include video outputs.
The motherboard includes the power supply.
All motherboards include video outputs.
Storage devices are not connected to the motherboard.
Some motherboards include video outputs.
What is the secure file transfer protocol that uses SSH for security?
HTTPS
FTPS
SFTP
SHTTP
SFTP
To represent a decision in a flowchart, the usual symbol is a:
Cylinder
Rectangle
Diamond
Capsule
Diamond
What type of malware is best known for carrying other malware as a payload?
Trojan horse
Worm
Rootkit
Virus
Worm
As part of your disaster recovery planning, you have purchased replacement servers to run essential operations. Unfortunately, you were unable to purchase exact replacements. The new servers have different motherboards and processors. Which of the following steps might need to be taken during the OS backup process to ensure that the backups can be restored?
Configure the dissimilar hardware options
Determine if motherboards and processors from the old servers work in the new servers
Set up virtual machines
Run emulation
Configure the dissimilar hardware options
Which of the following costs more than a cold site, and would require ongoing maintenance or hardware and possibly software, but can be made ready in hours, rather than days, compared to a cold site?
Redundant site
Mirrors site
Hot site
Warm site
Warm site
You want to upgrade the graphics on a system with a discrete GPU. Which of the following describes the process?
Replace the motherboard
Remove the GPU from the card and replace it
Replace the CPU
Replace the graphics card
Replace the graphics card
Which type of database backup uses operating system commands or third party apps?
Supplemental backup
Physical backup
Relational backup
Logical backup
Physical backup
John purchases a single user software license for an application and installs it on his desktop. Then he installs it on his laptop computer. In this scenario, which of the following statements is true?
John can share the application with his friends to install on their computers
John can use the application on only one of the computers
John can use the application on both computers at the same time
John can use the application on both computers but only one at a time
John can use the application on only one of the computers
Your organization has set up two routers, each connected to a different Internet Service Provider. This is an example of which of the following?
RAID
Network redundancy
High availability
Network backup
Network redundancy
Which of the following provides data mirroring and striping using four drives?
RAID 0
RAID 10
RAID 5
RAID 4
RAID 10
A client is complaining about slow network speeds after upgrading to Gigabit Ethernet. The network cable is marked CAT 5. Which of the following is likely solution?
The wiring is adequate for Gigabit Ethernet; Check elsewhere for the problem
Recommended adding a second cable and configure the network to use two cables in parallel
Recommend replacing the cable with CAT 6
Recommend adding a second cable and configure the network to use two cables in parallel
Recommend replacing the cable with CAT 6
How can you tell if a file is encrypted in Windows 10?
Padlock and green filename
Padlock and red filenamr
Key with magenta filename
Key with blue filename
Padlock and green filename
You are responsible for planning the backup strategy needed for disaster recovery. You have already identified the need to back up the database and transactions. In case the server crashes and the drive must be replaced, you also need which of the following?
OS backup
RAID
HSM
Redundant power supply
RAID
A sequence chart is an example of:
Flowchart
UML
Do.. while
Pseudocode
UML
Which of the following has a duplicate of your primary IT functions, with hardware apps, and data ready to run in minutes or less in the event of a disaster?
Identical site
Disaster recovery site
RAID 10
Hot site
Hot site
You are making a presentation to a potential client who has the following needs: real time team access to tasks, calendars, email, and file storage. The team members live in various locations. You are going to recommend which solution?
Instant messaging
Online workspace
Office suite
Document sharing
Online workspace
Windows Server enables a user to log in to any computer on a network. This is referred to as which of the following?
Wireless
Domain
Embedded
Workgroup
Domain
You need to map your R drive to a local server. What is the proper context to map a shared drive?
\servername\sharename
>servername>sharename
\servername\sharename
::servername\sharename
\servername\sharename