Practice Test Flashcards
A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?
- Settings/Devices
- Device Drivers
3.Devices and Printers
4.Device Manager
In Windows 10 version 1803 and newer, the location for the basic user-configurable settings for peripheral devices is the Devices page within the Settings app. In Windows 7, Windows 8, and early versions of Windows 10, Devices and Printers is the location for the basic user-configurable settings for peripheral devices attached to the computer.
Device Manager is the page used to perform functions such as updating device drivers or uninstalling devices, not setting a device to be the default.
Device Drivers is not a page in Windows. Drivers are accessed from the Device Manager page.
Settings/Devices
Which of the following declarations represents a 2-dimensional array?
declare Animal(9,9) as String
declare Animal(2) as String
declare Animal(1) as String
declare Animal(2,2,2) as String
declare Animal(9,9) as String
The Animal(9,9) array is a 2-dimensional array, with up to 10 elements in each dimension (elements in the array are counted from zero). The elements are similar to rows and columns, with the first dimension serving as the row, and the second dimension serving as columns for each row. The Animal(9,9) array can have up to 100 total elements, in 10 rows by 10 columns.
The Animal(1) array is a 1-dimensional array with up to 2 elements.
The Animal(2) array is a 1-dimensional array with up to 3 elements.
The Animal(2,2,2) array is a 3-dimensional array with up to 3 elements in each dimension.
A web application needs to make changes to the contents of a table in a database, in response to a user’s input. What method contains the command to do that?
DCL (Data Control Language)
DDL (Data Definition Language)
XML (eXtensible Markup Language)
DML (Data Manipulation Language)
DML (Data Manipulation Language)
DML (Data Manipulation Language) commands refer to SQL (Structured Query Language) commands that access or modify the contents of the database. DML commands include UPDATE, which changes the value of one or more table columns, for a specified set of rows.
DDL (Data Definition Language) commands refer to SQL commands that add to or modify the structure of the database.
DCL (Data Control Language) mainly deals with the rights, permissions, and other controls of the database system, with commands such as GRANT and REVOKE.
XML (eXtensible Markup Language) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
What are the properties of a file “Books/CoverPhoto.js”?
It’s a document file named “Books/CoverPhoto.js”.
It’s an executable file named “CoverPhoto.js” in folder “Books”.
It’s an image file named “CoverPhoto.js” in folder “Books”.
It’s an image file named “Books/CoverPhoto.js”.
It’s an executable file named “CoverPhoto.js” in folder “Books”.
An executable file contains program code, and can make changes to the computer system. Executable file extensions include “exe”, “bat”, “cmd”, and “js”. The slash symbol (/) is reserved for listing folders or directories in all operating systems, and the back-slash symbol () is also used for this on some systems.
Image file extensions include “jpg” and “jpeg”, but not “js” which stands for JavaScript code, a script file that runs within an interpreter.
File names cannot contain the reserved symbol “/”, so the entire name is not the file name. “Books” is the folder, and “CoverPhoto.js” is the file.
Document file formats are used by word processing software, with extensions such as “txt”, “rtf”, “doc”, and “docx”.
If a worm propagates over a network, which of the following is the first action to take, to prevent further infection?
Escalate the problem to a support professional.
Disconnect the network link.
Enable on-access scanning.
Use antivirus software to try to remove the infection.
Disconnect the network link.
Malware such as worms propagate over networks. Therefore, one of the first actions should be to disconnect the network link.
If a file is infected with a virus, the antivirus software should detect it and take the appropriate action. You can use antivirus software to try to remove the infection.
After you have determined you cannot clean a file or if the antivirus software does not detect it, and allows the virus to infect the computer, then you should get help by escalating the problem to a support professional.
With on-access scanning, when a file is accessed, the antivirus software scans the file and blocks access if it detects anything suspicious. If a worm propagates, on-access scanning has failed.
Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode?
USB 2.0
USB 3.0
USB 1.1
USB 3.1
USB 3.0
The USB 3.0 standard introduced a SuperSpeed mode, which improved the bus bandwidth to 5 Gbps (Gigabits per second) and made the link full duplex, so a device can send and receive at up to 5 Gbps simultaneously. USB 3.x receptacles and connectors often have a blue connector tab or housing to distinguish them.
The data rate for USB 1.1 is 12 Mbps (Megabits per second).
The USB 2.0 (Hi-Speed) standard has a nominal data rate of 480 Mbps. USB 2.0 uses the same connectors as USB 1.1 but a USB 1.1 device plugged into a USB 2.0 port will operate at the lower speed.
USB 3.1 defines a SuperSpeed+ mode with a data rate of 10 Gbps.
When using web search engines, why should privacy considerations affect a user’s decisions?
A user’s web searches prevent companies from using targeted advertisements.
A user’s web history skews sales and marketing trends amongst consumers
A user’s private data can appear in web searches.
A user’s web searches can reveal very valuable information.
A user’s web searches can reveal very valuable information.
Privacy considerations should affect your choice of Internet Service Provider (ISP) and web search engines. Your browsing and search history reveal an enormous amount of very valuable personal information.
If you make something public accidentally, it can be very difficult to stop people from continuing to publish it elsewhere. Public data can be archived and continue to appear in web searches.
Information about individual consumers gleaned from web search and social media histories allows for personalized advertising.
Large data sets, such as web searches and social media histories, can be used to identify trends, and develop products and services to meet changing demands and interests.
A user installs VirtualBox on a Linux OS (Operating System). Which class of hypervisor is it?
Type I, because VirtualBox manages the virtual machine environment
Type II, because VirtualBox is a software application within a host operating system
Type I, because the Linux OS is installed directly on the computer
Type II, because Linux provides the resources for the virtual environment
Type II, because VirtualBox is a software application within a host operating system
A type II hypervisor runs as a software application within a host operating system. VirtualBox is a third-party virtualization software which can be installed on host systems including Linux.
For both type I and II hypervisors, the physical machine (or host) provides the resources, such as CPU and memory, for the virtual environment.
Both type I and II hypervisors manage the virtual machine environment and facilitate interaction with the host hardware and network.
The Linux OS is installed directly on the computer, but it serves as the host to the type II hypervisor which is the VirtualBox software
What type of software is project management software?
Productivity software
Business software
Networking software
Collaboration softwar
Business software
Project management involves breaking a project into a number of tasks and assigning responsibilities, resources, and timescales to ensure the completion of those tasks. Specialized business software such as Microsoft Project assists with this process by visualizing task timelines and dependencies, and recording information about task properties and progress.
Productivity software refers to applications that help users complete typical office tasks. Project management is a more complex task with many functions, and requires specialized business software.
Collaboration software means that multiple users can work together on the same file or project. Working on a project is very different from managing a project, and requires different type of software.
Networking software is for administrators to deploy, manage, and monitor a network.
What is the end result of the iterative process of establishing and testing a theory while troubleshooting?
Resolve the problem.
Establish a root cause for the problem.
Identify the person responsible for creating the problem.
Ensure that the problem is never repeated.
Establish a root cause for the problem.
The end result of the iterative process of establishing and testing a theory (establish a theory, test it, if it doesn’t work, establish another theory) is to establish a root cause for the problem.
The iterative process of establishing and testing a theory is the combination of Steps 3 and 4 of CompTIA’s troubleshooting model. Resolving the problem is part of Step 6: implement the solution or escalate as necessary.
Ensuring that the problem is never repeated is part of Step 7: verify full system functionality and, if applicable, implement preventive measures.
Many technical problems are not caused by a specific person, but by events and circumstances, such as power or equipment failure, hardware or software malfunction, etc.
Which of the following uses MHz (Megahertz) to measure their speed?
Older PC bus interfaces
Bluetooth
Wireless technologies
Modern computer processors
Older PC bus interfaces
MHz stands for Megahertz, which is 1 million (1,000,000) cycles per second. Older PC bus interfaces work at this slower signaling speed.
Modern computer processors work at much faster speeds of at least 1 GHz (Gigahertz) which is 1 billion (1,000,000,000) cycles per second. The first 1 GHz processors for consumer computers were released in the year 2000.
Wi-Fi (wireless networking) most commonly uses the 2.4 GHz and 5 GHz radio frequencies to provide wireless high-speed Internet and network connections.
To communicate between devices, Bluetooth sends signals over a 2.4 GHz radio frequency.
What type of language has working with datasets as its primary purpose?
Assembly
Markup
Query
Compiled
Query
Code written in a query language, such as SQL (Structured Query Language), is designed to retrieve specific records from a dataset.
An assembly language is any low-level programming language, designed to perform many functions.
A markup language is a means of making data in a document accessible to a program, via a series of nested tags that describe the structure and/or meaning of the tag contents. A markup document represents a dataset, and the program that reads it is the one that works with it.
Compiled languages can perform any programming task, including working with datasets, usually via a markup document or embedded queries. That is a small part of their designed functionality.
What does this pseudocode declare?
declare MinutesPerHour as Number = 60
A primary key
A constant
An array
A variable
A constant
A constant is a specific identifier that contains a value that does not change within the program. In this example, the value of MinutesPerHour is always 60 and will not change.
A variable contains a value that can change during the execution of the program. There is no reason to ever change the MinutesPerHour identifier after its declaration.
An array is a type of identifier that can reference multiple values; it’s a set of elements. MinutesPerHour is a single identifier.
A primary key is an element of a database, not a pseudocode identifier.
A table in a relational database receives imported data from a text document. In what format does the table store the new data?
In a semi-structured way
As key/value pairs
In a structured way
In an unstructured way
In a structured way
Relational databases store information in a structured way, regardless of how that data gets into the database. This structure provides easy access to the information, along with flexibility over which data to access.
Unstructured data is information that does not have a pre-defined data model or is not organized in a pre-defined manner. Unstructured data provides no rigid formatting of the data, but when a relational database imports unstructured data, it becomes structured data within the database.
Semi-structured databases lack the structure of formal database architecture, but they have metadata: associated information helps identify the raw unstructured data.
A key/value pair database is a means of storing the properties of objects without predetermining the fields used to define an object.
Which backup storage type best helps mitigate against critical data loss in the risk of fire or theft?
System backup
Cloud-based storage backup
Locally attached storage
Test restore
Cloud-based storage backup
Offsite/cloud-based is backing up data over the Internet to cloud-based storage. Keeping offsite copies of data is very important in mitigating against the risk of fire or theft.
Locally attached storage uses hard disks or flash drives attached to a local PC or server. Hard disks or flash drives can be stolen or destroyed.
A system backup is an operating system (OS) backup that makes a copy of the OS and installed applications so that a workstation or server can be recovered without having to manually reinstall software and reconfigure settings.
A test restore is important when using new backup software, to test old backup media, to check a new job, and to carry out random spot checks.
What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?
100
6400
800
1600
800
SDRAM has a 64-bit data bus, meaning that in each clock cycle, 64 bits of information can be delivered to the CPU. If the bus is running at 100 MHz, the bandwidth available to the memory controller is 100*64 or 6400 megabits per second. To calculate the bandwidth in MBps, this number is divided by 8 and equals 800 MBps.
The calculation is 6400 Mbps (megabits per second), which needs to be divided by 8 to determine MBps (megabytes per second).
100 MHz is the speed at which the bus is running, not the available bandwidth in MBps.
1600 would be the correct answer if the question was about DDR SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory).
A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?
Device Manager
Command Prompt
Programs and Features
Driver Manager
Driver Manager
There is no page or window called “Driver Manager”. Drivers are installed for specific devices, and can be managed from the Device Manager page.
A good way to uninstall a driver is by uninstalling the software package used to install the driver in the first place, on the Programs and Features page from Control Panel.
A user can locate the device and uninstall it on the Device Manager page. Uninstalling the device usually comes with the option to uninstall the related drivers as well.
A user can delete drivers using command-line syntax from the Command Prompt window.
A user runs Microsoft Edge on a Windows 10 desktop. For more secure browsing, the user tries to disable scripting, but cannot deactivate it. What should the user do?
Install a script blocker add-on.
Refrain from using Microsoft Edge.
Continue browsing with enabled scripting.
Switch to a different operating system.
Install a script blocker add-on.
Script blocker add-ons prevent unauthorized websites from running JavaScript, and provide control over which websites are allowed to run scripts. Browsers that do not allow the user to disable scripts can have add-ons.
If Microsoft Edge is the user’s preferred browser, then using a different browser is not as desirable as installing a script blocker add-on, and continuing to use the preferred browser.
If there was a good reason for the user to decide to disable scripting, then keeping it enabled is not the ideal solution.
Switching to a different operating system is a complicated process that takes a lot of time to do, while installing a script blocker add-on can take less than a minute.
How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express?
10
256
128
26
128
ASCII was designed in 1963 using seven bits, which was a significant cost saving over using eight bits. Seven bits of binary can express 128 different values (0 through 127).
Modern systems use eight bits instead of seven, giving rise to extended ASCII which can express 256 values, but the original non-extended ASCII can only express 128 values.
While the English language has 26 letters, ASCII contains much more, including 2 sets of the English alphabet (uppercase and lowercase), 10 digits (0 to 9), and special characters.
Decimal notation contains 10 values (0 to 9), which is included in ASCII, as are letters (uppercase and lowercase) and special characters.
What is an example of a cloud hosted application?
Microsoft Excel
Adobe Photoshop
Google mail
Windows Media Player
Google mail
Google mail, or Gmail, is a cloud hosted application which is accessed from a web browser. There are locally installed applications, such as Microsoft Outlook, which can access the data (by downloading emails into the client) but all data is stored on the server.
Microsoft Excel is a locally installed application for working with spreadsheets.
Adobe Photoshop is a locally installed graphics editor, with a bundled suite of image-processing software applications.
Windows Media Player is a locally installed media library application, used for playing audio and video, as well as viewing images.
A program is a sequence of what?
Functions
Instructions
Flow charts
Attributes
Instructions
A program is a sequence of instructions which the computer performs. The sequence can consist of just one instruction, such as the popular example “print ‘Hello World’”, or thousands, even millions of instructions in a single program.
Functions are elements of programs, and can be something that the programmer creates, or internal system functions. But a program is not a sequence of functions.
A graphical flow chart helps to visualize the program sequence and understand the processes. It’s a tool that programmers use, not a component of a program.
An attribute is a term of OOP (Object-Oriented Programming) to define objects.
What is true regarding a 32-bit vs. a 64-bit CPU (Central Processing Unit)?
A 64-bit CPU can run a 32-bit OS.
A 32-bit CPU can run a 64-bit OS.
All smartphones use a 32-bit CPU.
All tablets use a 64-bit CPU.
A 64-bit CPU can run a 32-bit OS.
A 64-bit CPU can run a 64-bit or 32-bit OS. 32-bit systems are limited to addressing 4 Gigabytes of system memory, whereas 64-bit systems can address 256 Terabytes (or more), meaning that 64-bit systems run more efficiently, since memory blocks are more easily allocated. They support 64-bit instructions, so they process more data at once than 32-bit systems.
64-bit applications include 64-bit instructions that will not be recognized by a 32-bit processor, so a 32-bit CPU cannot run 64-bit software, only 32-bit.
Not all smartphones use 32-bit CPU. 64-bit CPU dominates the premium sector, while 32-bit is still prevalent on budget and midrange models.
Like smartphones, premium tablets mostly use 64-bit CPU, and budget and midrange models usually run 32-bit.
What’s a true statement about the assembly language?
Assembly languages are not programming languages.
Only specialists use assembly code.
Each assembly language can run on any platform.
Assembly code is not human-readable.
Only specialists use assembly code
An assembly language is any low-level programming language in which there is a very strong correspondence between the program’s statements and the architecture’s machine code instructions. Assembly code is very difficult to follow and is only really used by specialists trying to solve a very particular problem with an application.
The assembly language represents machine code in human-readable text.
Assembly languages are the first generation of programming languages. They rate at slightly higher level than machine code.
An assembly language is typically specific to a particular hardware architecture. Different assembly languages can run on different platforms.
A laptop built a year ago is likely to have which CPU (Central Processing Unit)?
16-bit
128-bit
64-bit
32-bit
64-bit
Most modern workstations and laptops use 64-bit CPUs.
Some budget laptop models might come with a 32-bit chip, though this is increasingly unusual.
16-bit CPUs were used several decades ago and were replaced by 32-bit CPUs. The first 32-bit CPU was introduced in 1985.
There are currently no mainstream general-purpose processors built to operate on 128-bit technology. Most modern CPUs feature Single-Instruction Multiple-Data (SIMD) instruction sets where 128-bit vector registers are used to store several smaller numbers, such as four 32-bit floating-point numbers. In other words, 128-bit processing is emulated with 32-bit or 64-bit architecture.
Which of the following exposes a user to a Man-in-the-Middle (MitM) attack?
Plain text
A cryptographic hash
Cipher text
Encryption
Plain text
Plain text is also known as clear text and is an unencrypted message. To secure transmissions from eavesdropping, sniffing and MitM attacks, data should be encrypted.
Cipher text is an encrypted document or message that can travel across a public network, such as the Internet, and remain private.
With encryption, even if an eavesdropper could intercept and examine the data packets, the content would be unreadable.
Cryptographic hashing is a type of encryption that can be used to prove that a message has not been tampered with and for secure storage of data where the original meaning does not have to be recovered (e.g., passwords).
A table contains information about the company’s customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What’s the best way to set up a primary key for this table?
Use the Email field as the primary key.
Create a new field called Id.
Use the Phone field as the primary key.
Use the combination of the First Name and Last Name fields as the primary key.
Create a new field called Id.
A primary key is a unique identifier of every record in the table. When there is no natural key, the custom is to create a new field, which can be a sequential number, or a free-form field which rejects duplicates.
The Phone field might not be unique. For example, two customers might share a phone number. Also, the Phone field could be empty, and a primary key needs to have a value.
Similar to the Phone field, the Email field might not be unique, or it could be empty.
The combination of the First Name and Last Name fields has a higher chance of being non-empty than the Phone and the Email fields, but there is no guarantee of uniqueness.
An attacker captures password packets to figure out a user’s password to gain access to a host on a corporate network, and masquerades as that user. Which of the following is a threat to integrity that describes this attack?
Snooping
Wiretapping
Impersonation
Social engineering
Impersonation
Impersonation is an attack where a person will attempt to figure out a password or other credentials to gain access to a host. An obvious way to perform an impersonation attack is to capture password packets in transit and work out which bit is the password.
Snooping is a confidentiality concern and is any attempt to get access to information on a host or storage device (data at rest) that you are not authorized to view.
Eavesdropping/wiretapping/sniffing is a confidentiality concern and is essentially snooping on data or telephone conversations as they pass over the network.
Social engineering is a confidentiality concern and refers to getting users to reveal confidential and personally identifiable information.
Data encryption, firewalls, and backups are examples of what?
Security controls
Intellectual property
Data capture
Data breach
Security controls
Security controls are designed to prevent, deter, detect, and/or recover from attempts to view or modify data without authorization. Typical examples of security controls include backups, access control, data encryption, and firewalls.
Data breach is when private data is exposed publicly without authorization. Preventing data breach is one of the reasons for having security controls in place.
Data capture refers to collection of data points from many different sources as part of data analytics.
Intellectual property refers to information assets, such as patents, which need to be protected from theft.
A systems administrator is installing a new wireless access point (AP). During installation, the administrator should make sure to complete which of the following?
Change the SSID to something that helps identify the administrator.
Enable all services on the wireless AP.
Store a hardcopy of a complex password of at least 12 characters.
Change the default password.
Change the default password.
You must always change the default password (typically “default,” “password,” or “admin”) for any new device to prevent unauthorized access to it.
It is best practice not to enable services you do not need, especially on a multifunction device such as a wireless access point.
You must choose a strong password that cannot be cracked by password-guessing software. Use a long, memorable phrase of at least 12 characters. However, to maintain confidentiality, you should never write down a password.
It is a good idea to change the SSID from the default to something unique to your network. Remember that the SSID is easily visible to other wireless devices, so do not use one that identifies you personally or your address.
What’s a true statement about variables?
A variable can have any data type that the programming language supports.
A program has to declare all variables before using them.
Each procedure must assign an initial value, when declaring variables.
A variable contains a value that must change during the execution of the program.
A variable can have any data type that the programming language supports.
A variable is used in a program to access a program element. Its value can be a text string, a number, or any other data type if the programming language supports it.
It’s good practice to declare all variables in a program before using them, but not all programming languages require it. It is often possible to use undeclared variables, although this can make code harder to read and more prone to errors.
A variable contains a value that can change during the execution of the program, but it can also remain unchanged.
Variables can have initial value assignments, but it is not mandatory.