Practice test #6 Flashcards

Mixed questions

1
Q
QUESTION NO: 119
A user has finished running the initial operating system setup wizard. Which of the following would
be BEST for the user to do next?
A.
Verify Internet connectivity
B.
Install productivity software
C.
Install security software
D.
Add other user accounts
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
QUESTION NO: 120
Which of the following technologies would allow a user to run multiple operating systems at the
same time on a single computer?
A.
Telepresence
B.
Cloud-based software
C.
Virtualization software
D.
Productivity software
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION NO: 121
A user wants to update a driver for additional features. Where would the user find a current
version of the driver from an official source?
A.
Manufacturer’s CD/DVD that came with the computer
B.
Manufacturer’s web site
C.
Internet community support forums
D.
Third-party support web sites

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QUESTION NO: 122
Which of the following should be done to reduce physical safety hazards around a newly installed
computer?
A.
Verify all connections are seated properly.
B.
Avoid placing other computers nearby.
C.
Bundle loose cables with zip ties or Velcro straps.
D.
Attach all peripherals to the computer

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QUESTION NO: 123
A user with an outdated operating system is consistently browsing sensitive websites such as
banking, email, and corporate intranets. The Internet browser of choice is one that has already lost
patch support and is not updated anymore. Which of the following actions will remedy this
situation?
A.
Uninstall all unused browser extensions and toolbars to help reduce risks.
B.
Convert the user’s account to an admin level account, to provide better overall security.
C.
Move to an alternate browser that still has consistent security update support.
D.
Install multiple anti-malware and firewall products to harden the computing experience.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
QUESTION NO: 124
Which of the following connectors is MOST often used to connect a computer to a network?
A.
RJ-45
B.
RJ-11
C.
IDE
D.
eSATA
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
QUESTION NO: 125
A user is installing a new scanner on a computer. Which of the following MOST likely needs to be
installed in order for this equipment to work?
A.
License key
B.
OS update
C.
Firmware
D.
Driver
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
QUESTION NO: 126
Which of the following software is used to reduce the size of a file or folder?
A.
Desktop publishing
B.
Basic database
C.
Compression
D.
Anti-malware
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
QUESTION NO: 127
Which of the following is used with a touch screen to increase accuracy?
A.
Touchpad
B.
Stylus pen
C.
Joystick
D.
Trackball
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
QUESTION NO: 128
Which of the following internal components is used for temporary data storage in a workstation?
A.
Power supply
B.
CPU
C.
RAM
D.
Hard drive
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
QUESTION NO: 129
Which of the following is used for temporary storage of program data that is cleared when the
computer is turned off?
A.
CPU
B.
SSD
C.
Hard drive
D.
System memory
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
QUESTION NO: 130
Which of the following connectors supports both high definition video and audio?
A.
S-video
B.
Component
C.
HDMI
D.
DVI
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
QUESTION NO: 131
Which of the following BEST describes malicious software that demands the end-user pay a fee or
face the destruction of their files?
A.
Trojan
B.
Virus
C.
Spyware
D.
Ransomware
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

QUESTION NO: 132
Which of the following should be done to reduce the risk of having sensitive passwords
compromised while browsing the Internet?
A.
Enable software firewalls to block unknown ports
B.
Disable autofill of forms and passwords
C.
Enable screensavers and time-outs on the computer
D.
Use ad-blocking software on the computer

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
QUESTION NO: 133
Which of the following would be the MOST efficient way to transport a file from one location on a
local hard drive to a different location on the same hard drive?
A.
Rename
B.
Cut
C.
Move
D.
Save
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QUESTION NO: 134
A student wishes to share contacts with another student’s mobile device. Which of the following

would be the easiest method to use?
A.
Network attached storage
B.
Bluetooth sharing
C.
Local hard drive
D.
Peer-to-Peer network
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
QUESTION NO: 135
When setting up a new desktop, which of the following should be performed FIRST?
A.
Configure user accounts
B.
Plug in cables
C.
Install security software
D.
Configure wireless network settings
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

QUESTION NO: 136
A user, Joe, wants to install an application on his computer. Which of the following factors should
he be aware of before beginning?

A.
The computer has the proper hard drive drivers installed.
B.
The computer is connected to a secure wireless network.
C.
Check for any updates for the application.
D.
The computer meets the application’s minimum requirements

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
QUESTION NO: 137
Which of the following applications would a user employ to write a business letter?
A.
Spreadsheet software
B.
Word processor
C.
Desktop publishing
D.
Presentation software
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
QUESTION NO: 138
Which of the following devices transmits and receives printed images over a telephone line?
A.
Monitor
B.
Fax
C.
Scanner
D.
Webcam
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
QUESTION NO: 139
Which of the following video connections provides the highest resolution?
A.
USB
B.
S-video
C.
HDMI
D.
VGA
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

QUESTION NO: 140
A user receives an email containing a link. When they hover the mouse over the link, the actual
URL does not match the text in the body of the email and appears to be a string of random
characters. Which of the following is the BEST course of action?
A.
Forward the email to a friend to ask for advice.
B.
Reply to the sender asking for confirmation that it is safe to open.
C.
Delete the email without clicking on the link.
D.
Click the link because malware protection software is installed on the computer.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
QUESTION NO: 141
Which of the following is the BEST reason to change a wireless router’s default SSID?
A.
To make it easier to identify in a location with several routers.
B.
To make the network feel more personal.
C.
To make it more difficult to join.
D.
To make the network secure.
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
QUESTION NO: 142
A user, Joe, is concerned about the safety of his personal information on a website. Which of the
following can Joe look for to ensure that his personal information is not at risk? (Select TWO).
A.
HTTP on the browser address bar
B.
Suspicious ads in the browser
C.
HTTPS on the browser address bar
D.
A lock symbol on the browser address bar
E.
The word secure in the browser address bar
A

Answer: C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
QUESTION NO: 143
Which of the following data connection types provides the HIGHEST mobility?
A.
WiFi
B.
Cellular
C.
Direct link
D.
Wired
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
QUESTION NO: 144
Which of the following items require ESD precautions?
A.
Upgrading to a new touch screen monitor
B.
Adding a micro SD card to a smartphone
C.
Installing an compact flash card into a laptop
D.
Replacing RAM in a personal computer
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

QUESTION NO: 145
Which of the following are reasons to verify backups? (Select TWO).
A.
To create a system image for easy restore
B.
To confirm all selected data was backed up
C.
To diagnose any backup media hardware failure
D.
To determine if backup software needs to be patched
E.
To ensure files can be restored

A

Answer: B,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
QUESTION NO: 146
A user has just removed a new desktop PC from the box and has plugged in several new
peripheral devices. During which of the following steps will the plug and play peripheral devices be
installed on the new PC?
A.
Installing security software
B.
Powering on for the first time
C.
Booting the operating system
D.
Adding additional user accounts
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
QUESTION NO: 147
Which of the following is the BEST method of sharing files within a department?
A.
Email
B.
Flash drive
C.
Network drive
D.
Instant messaging
E.
NFC
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
QUESTION NO: 148
When storing a document in the cloud, a user needs to be:
A.
On a shared drive.
B.
Using a USB cable.
C.
Connected to the Internet.
D.
In airplane mode.
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
QUESTION NO: 149
Which of the following device types is needed within a computer to read information on a CDROM?
A.
Network card
B.
Optical drive
C.
Video card
D.
Solid state drive
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
QUESTION NO: 150
Which of the following ports can be used to connect an external hard drive to a computer? (Select
TWO).
A.
MIDI
B.
PS/2
C.
eSATA
D.
RJ-45
E.
USB
F.
RJ-11
A

Answer: C,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
QUESTION NO: 151
Which of the following is considered an open-source operating system?
A.
Windows
B.
Chrome OS
C.
Mac OS X
D.
Linux
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
QUESTION NO: 152
A technician wants to keep a router up to date. Which of the following MUST be updated
regularly?
A.
SSID
B.
Administrator password
C.
Wireless encryption
D.
Firmware
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
QUESTION NO: 153
The extension .rtf is an example of which of the following file types?
A.
Document
B.
Executable
C.
Audio
D.
Speadsheet
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
QUESTION NO: 154
Which of the following are examples of video connectors? (Select TWO).
A.
VGA
B.
Serial
C.
HDMI
D.
eSATA
E.
PS/2
A

Answer: A,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
QUESTION NO: 155
When setting up a new computer, where does a user change the date and time?
A.
Peripheral configuration
B.
Localization settings
C.
Screen resolution
D.
eSATA settings
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
QUESTION NO: 156
A user wants to have the latest security patches and bug fixes installed on a computer. Which of
the following is the BEST method to achieve this?
A.
Configure anti-malware updates
B.
Manually update before each use
C.
Update every six months
D.
Schedule automatic updates
Answer: D
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
QUESTION NO: 157
A user is accessing an online bank account for the first time via an Internet browser. Which of the
following should the user check? (Select TWO).
A.
HTTPS before the URL
B.
Exclamation point on the status bar
C.
Lock symbol in the address bar
D.
HTTP before the URL
E.
Skull/crossbones symbol in the corner
A

Answer: A,C

40
Q
QUESTION NO: 158
Which of the following CPU cooling types is BEST in a dusty environment?
A.
Liquid cooling
B.
Open case
C.
Case fan
D.
Heat sink fan
A

Answer: A

41
Q

QUESTION NO: 159
To reduce the risk of installing unapproved or possibly malicious apps on a smartphone, a user
should:
A.
Download apps from a user-supported community.
B.
Use a search engine to identify safe apps.
C.
Update the firmware to the latest version.
D.
Utilize the vendor-provided app store.

A

Answer: D

42
Q
QUESTION NO: 160
Which of the following computer connector types was designed specifically for allowing high-speed
external hard drive transfers?
A.
DVI
B.
USB
C.
eSATA
D.
HDMI
A

Answer: C

43
Q

QUESTION NO: 161
Which of the following is a common way to prevent physical theft of a laptop or workstation?
A.
Shred any sensitive information to prior to disposal.
B.
Avoid storing passwords near the computer.
C.
Practice good awareness skills when entering passwords/PINs.
D.
Cable and lock device securely attached to a solid object

A

Answer: D

44
Q

QUESTION NO: 162
Ann, a user, is browsing shopping websites on the Internet when she receives a pop-up message
on her screen indicating a virus has been detected by the antivirus software. Which of the
following actions should be performed NEXT?
A.
Ignore the message because it is likely adware.
B.
Run a scan on the entire local drive.
C.
Clear temporary files and folders.
D.
Minimize the alert and continue browsing the Internet.

A

Answer: B

45
Q
QUESTION NO: 163
A technician needs to troubleshoot a user’s computer. The user leaves personal credentials
written on a piece of paper for the technician. Which of the following principles has the user
violated?
A.
Password confidentiality
B.
Password complexity
C.
Password reuse
D.
Password expiration
A

Answer: A

46
Q
QUESTION NO: 164
Joe, a user, has many applications on his computer and is trying to use software management
best practices. Which of the following should he consider?
A.
Install a desktop cleanup application.
B.
Uninstall unneeded applications.
C.
Load each application one at a time.
D.
Manage the use of internal memory
A

Answer: B

47
Q
QUESTION NO: 165
A user's government identification number, birth date, and current address are considered which
of the following?
A.
IMAP
B.
HTTP
C.
PII
D.
HTTPS
A

Answer: C

48
Q
QUESTION NO: 166
A user, Ann, calls the manufacturer of a software product she purchased, but is denied assistance
because the product is no longer supported. Which of the following options is a BEST next
choice?
A.
P2P software sharing service
B.
Original instruction manual
C.
Online user forum
D.
PC manufacturer's website
A

Answer: C

49
Q
QUESTION NO: 167
Which of the following software types BEST facilitates collaboration?
A.
Personal information manager
B.
Video editing software
C.
Instant messaging software
D.
CAD software
A

Answer: C

50
Q
QUESTION NO: 168
To increase security, which of the following is the BEST feature to disable on a mobile device
when not in use?
A.
Wireless
B.
GPS
C.
Network
D.
NFC
A

Answer: D

51
Q
QUESTION NO: 169
Which of the following data connectivity options is the BEST to use when both high availability and
reliability are required?
A.
WiFi
B.
Bluetooth
C.
Cellular
D.
Wired
A

Answer: D

52
Q
QUESTION NO: 170
A technician has added an external hard drive to a personal computer. The hard drive is powered
on, but the computer does not see the new hard disk. Which of the following is the FIRST thing the
technician should check?
A.
The power cable
B.
The OS version for compatibility
C.
The hard drive firmware revision
D.
The data cable
A

Answer: D

53
Q
QUESTION NO: 171
Which of the following is the MOST secure password?
A.
Have-A-Nice-Day
B.
HAVE-A-NICE-DAY
C.
have-a-nice-day12
D.
hav3-@-Nic3-D@Y14
A

Answer: D

54
Q
QUESTION NO: 172
A user is updating a website. Which of the following protocols will provide the MOST security when
uploading the files?
A.
FTPS
B.
FTP
C.
SMTP
D.
HTTP
E.
SNMP
A

Answer: A

55
Q
QUESTION NO: 173
A website locks a user’s account after three unsuccessful login attempts. This precaution prevents
which of the following?
A.
Shoulder surfing
B.
Phishing
C.
Spam
D.
Password cracking
A

Answer: D

56
Q
QUESTION NO: 174
Which of the following commands is used to view the contents of a file?
A.
Save
B.
Open
C.
Copy
D.
Move
A

Answer: B

57
Q
QUESTION NO: 175
Which of the following media has the highest possible availability?
A.
Wired
B.
WiFi
C.
Cellular
D.
Bluetooth
A

Answer: A

58
Q
QUESTION NO: 176
Which of the following extension types are associated with document files? (Select THREE).
A.
.txt
B.
.odf
C.
.msi
D.
.rtf
E.
.mp3
F.
.tar
G.
.jpg
A

Answer: A,B,D

59
Q
QUESTION NO: 177
A home user wants to share files between two different computers. The user wants the files to be
available to either computer, regardless of whether either computer is turned on. Which of the
following is the BEST storage method?
A.
USB storage
B.
Internal storage
C.
Direct attached storage
D.
Network attached storage
A

Answer: D

60
Q
QUESTION NO: 178
Which of the following is the component responsible for interconnectivity of internal system
devices?
A.
System case
B.
Power supply
C.
Motherboard
D.
Expansion card
A

Answer: C

61
Q
QUESTION NO: 179
Which of the following storage methods provides the HIGHEST redundancy and availability?
A.
Cloud-based storage
B.
Storage Area Network
C.
Locally attached storage
D.
Network Attached Storage
A

Answer: A

62
Q

QUESTION NO: 180
Which of the following is a benefit of setting up a computer to receive automatic updates from the
OS vendor?
A.
Arranges the hard drive files in order
B.
Restores missing files that were lost or deleted
C.
Keeps the software current and applies security patches
D.
Provides the latest virus definitions to keep the computer safe

A

Answer: C

63
Q
QUESTION NO: 181
Which of the following application types is MOST often used for doing a mail merge?
A.
PDF software
B.
Word processor
C.
Presentation software
D.
Personal information manager
A

Answer: B

64
Q
QUESTION NO: 182
Which of the following security threats includes suspicious activity, such as reviewing someone's
screen display without permission?
A.
Malware
B.
Shoulder surfing
C.
Phishing
D.
Password cracking
A

Answer: B

65
Q
QUESTION NO: 183
A user reports an inability to access the Internet on a new SOHO router. On further investigation, a
technician notices that the wireless network is not visible. Which of the following is the MOST likely
cause?
A.
SSID broadcast is disabled
B.
Wireless password has changed
C.
Firmware update is required
D.
WPA2 is enabled
A

Answer: A

66
Q
QUESTION NO: 184
Which of the following storage methods is MOST likely used in corporate settings to save large
amounts of data in a secured manner?
A.
HTTP
B.
HTTPS
C.
FTPS
D.
FTP
A

Answer: C

67
Q

QUESTION NO: 185
Which of the following describes the difference between open source and commercial operating
systems?
A.
Open source operating systems only run on desktop computers, whereas commercial operating
systems run on servers.
B.
Open source operating systems run on standard and non-standard hardware, whereas
commercial operating systems only run on specific hardware.
C.
Open source operating systems can be downloaded and used by everyone, whereas commercial
operating systems can only be used by companies.
D.
Open source operating systems are usually provided free of charge, whereas most commercial
operating systems are usually provided at some cost.

A

Answer: D

68
Q
QUESTION NO: 186
Which of the following is MOST important to ensure a computer temperature is maintained within
normal limits?
A.
Maintaining constant power output
B.
Ensuring sufficient airflow
C.
Keeping the case open
D.
Turning the wireless off when not needed
A

Answer: B

69
Q
QUESTION NO: 187
An employee is using a desk phone that is connected only via a network cable. Which of the
following technologies is the phone using?
A.
LTE
B.
GSM
C.
VoIP
D.
CDMA
A

Answer: C

70
Q
QUESTION NO: 188
Which of the following allows for hands-free operation of a wireless device?
A.
Encryption
B.
Wireless password
C.
Bluetooth pairing
D.
Internet connectivity
A

Answer: C

71
Q
QUESTION NO: 189
Joe, a user, is setting up a new computer and wants to minimize the risk of a malicious software
infection over the network. Which of the following should be configured on the new computer?
(Select THREE).
A.
Password policies
B.
Multiple user accounts
C.
Software firewall
D.
Driver updates
E.
Operating system updates
F.
Anti-malware software
A

Answer: C,E,F

72
Q

QUESTION NO: 190
Which of the following is the primary goal in performing a backup verification?
A.
Ensure backup data can be correctly restored
B.
Prove the media has sufficient space for the data
C.
Configure frequency of backups
D.
Adhere to legal backup storage requirements

A

Answer: A

73
Q
QUESTION NO: 191
Which of the following file types is used to consolidate a group of files?
A.
.rtf
B.
.m3u
C.
.avi
D.
.rar
A

Answer: D

74
Q
QUESTION NO: 192
Which of the following keys should be pressed to enable access to various menus?
A.
ALT
B.
SHIFT
C.
TAB
D.
CTRL
A

Answer: A

75
Q
QUESTION NO: 193
Ann, a user, has an external monitor that will not turn on. Her laptop has activity lights and is
plugged into the same power strip. Which of the following should be checked FIRST to begin
troubleshooting this issue?
A.
The power strip
B.
The monitor video cable
C.
The laptop power cable
D.
The monitor power cable
A

Answer: D

76
Q
QUESTION NO: 194
Which of the following methods are MOST likely used to reduce the internal temperature of a
computer?
A.
Install a protective cover
B.
Reduce display brightness
C.
Air circulation
D.
Electronic recycling
E.
Liquid cooling
A

Answer: C,E

77
Q
QUESTION NO: 195
A technician is setting up a router and would like to increase the security level. Which of the
following actions will achieve this?
A.
Installing anti-malware on the router
B.
Changing the default admin password
C.
Increasing transmission power
D.
Configuring multifactor logon authentication
A

Answer: B

78
Q
QUESTION NO: 196
Which of the following data connections can span the FARTHEST distance?
A.
WiFi
B.
Dial-up
C.
Satellite
D.
Cable
A

Answer: C

79
Q
QUESTION NO: 197
Which of the following functions can transfer a file between folders and deletes it from the original
folder?
A.
Edit
B.
Move
C.
Copy
D.
Paste
A

Answer: B

80
Q
QUESTION NO: 198
An end-user has 16GB of RAM installed on a computer system. Which of the following describes
why the OS only uses a maximum of 4GB of RAM?
A.
The operating system is 16-bit.
B.
The computer has corrupted RAM.
C.
The computer has a defective motherboard.
D.
The operating system is 32-bit.
E.
The computer has a virus.
A

Answer: D

81
Q

QUESTION NO: 199
A technician just installed a new computer. Which of the following is the BEST way to manage the
cables?
A.
Line the cables up neatly and wrap them together with cable ties.
B.
Leave the cables loose to prevent interference between wires.
C.
Nail the cables to the wall.
D.
Tuck the cables neatly underneath the carpet.

A

Answer: A

82
Q
QUESTION NO: 200
A printer is migrated between offices. All the wires are connected properly, but the new
workstation cannot find the printer. Which of the following should the technician install?
A.
OS
B.
Updates
C.
Drivers
D.
Application
A

Answer: C

83
Q
QUESTION NO: 201
A user wants to run a major update on a laptop. Which of the following should be considered
before running any major updates?
A.
Restore folders from back up
B.
Change administrator account password
C.
Back up important folders
D.
Print all personal documents
A

Answer: C

84
Q
QUESTION NO: 202
Which of the following adds a basic security measure to a wireless device?
A.
Hands-free headset
B.
Screen lock feature
C.
Airplane mode
D.
Clip-on case
A

Answer: B

85
Q
QUESTION NO: 203
Which of the following system utilities allows a user to configure multiple monitors in the OS?
A.
Color management
B.
Device manager
C.
GPU driver
D.
Display
A

Answer: D

86
Q

QUESTION NO: 204
Joe, a user, reports that his neck and back are hurting after being at his desk for the whole day.
Which of the following are the possible causes of the problem? (Select TWO).
A.
The keyboard is not ergonomic.
B.
The monitor does not have a screen protector.
C.
The monitor height is not adjusted to Joe’s needs.
D.
Joe is not using a wrist rest with the keyboard.
E.
The chair is not properly adjusted to Joe’s needs

A

Answer: C,E

87
Q
QUESTION NO: 205
Which of the following are core peripherals needed to use a desktop PC? (Select THREE).
A.
Monitor
B.
Keyboard
C.
Printer
D.
Mouse
E.
Speakers
F.
Mouse pad
G.
Webcam
A

Answer: A,B,D

88
Q
QUESTION NO: 206
A user purchases a new desktop computer and requires assistance setting it up. Which of the
following describes the BEST resource the user should reference?
A.
Technical community group
B.
Local retail store technical support
C.
Internet search engine
D.
Manufacturer documentation
A

Answer: D

89
Q
QUESTION NO: 207
Which of the following is used for telepresence?
A.
VoIP telephone
B.
Webcam
C.
Remote desktop
D.
Touchscreen
A

Answer: B

90
Q
QUESTION NO: 208
Which of the following storage media provides the FASTEST speeds when backing up large data
files?
A.
Offsite storage
B.
Network attached storage
C.
Locally attached storage
D.
Cloud-based storage
A

Answer: C

91
Q
QUESTION NO: 209
Which of the following security threats is classified as license theft?
A.
Entering the neighbor’s software key
B.
Using software to reveal a password
C.
Searching through the trash for passwords
D.
Watching what a user types on screen
A

Answer: A

92
Q
QUESTION NO: 210
The manufacturer of a SOHO router has released a security fix for the router. Which of the
following methods should be used to apply the fix?
A.
Change the admin password.
B.
Apply new WEP key.
C.
Update the firmware.
D.
Hold the reset button.
A

Answer: C

93
Q
QUESTION NO: 211
A user receives an email from the bank stating that the user needs to follow a link and re-enter
login credentials due to recent security breaches. Based on best practices, which of the following
actions should the user take? (Select TWO).
A.
Inform the ISP.
B.
Follow the instructions.
C.
Delete the message.
D.
Reply to the email.
E.
Contact the bank.
A

Answer: C,E

94
Q
QUESTION NO: 212
A technician is creating a WiFi network to which anyone can connect without entering a key. With
which of the following should the technician configure the wireless network?
A.
Shared
B.
Open
C.
WPS
D.
WPA
A

Answer: B

95
Q
QUESTION NO: 213
A user needs to establish an initial password for an email account. Which of the following is the
BEST example of a complex password?
A.
01#iWant!2686612338
B.
iWantobeaCosmonau#
C.
01c234n56789v9876x21
D.
012iWanttobe210
A

Answer: A