Practice test #6 Flashcards
Mixed questions
QUESTION NO: 119 A user has finished running the initial operating system setup wizard. Which of the following would be BEST for the user to do next? A. Verify Internet connectivity B. Install productivity software C. Install security software D. Add other user accounts
Answer: C
QUESTION NO: 120 Which of the following technologies would allow a user to run multiple operating systems at the same time on a single computer? A. Telepresence B. Cloud-based software C. Virtualization software D. Productivity software
Answer: C
QUESTION NO: 121
A user wants to update a driver for additional features. Where would the user find a current
version of the driver from an official source?
A.
Manufacturer’s CD/DVD that came with the computer
B.
Manufacturer’s web site
C.
Internet community support forums
D.
Third-party support web sites
Answer: B
QUESTION NO: 122
Which of the following should be done to reduce physical safety hazards around a newly installed
computer?
A.
Verify all connections are seated properly.
B.
Avoid placing other computers nearby.
C.
Bundle loose cables with zip ties or Velcro straps.
D.
Attach all peripherals to the computer
Answer: C
QUESTION NO: 123
A user with an outdated operating system is consistently browsing sensitive websites such as
banking, email, and corporate intranets. The Internet browser of choice is one that has already lost
patch support and is not updated anymore. Which of the following actions will remedy this
situation?
A.
Uninstall all unused browser extensions and toolbars to help reduce risks.
B.
Convert the user’s account to an admin level account, to provide better overall security.
C.
Move to an alternate browser that still has consistent security update support.
D.
Install multiple anti-malware and firewall products to harden the computing experience.
Answer: C
QUESTION NO: 124 Which of the following connectors is MOST often used to connect a computer to a network? A. RJ-45 B. RJ-11 C. IDE D. eSATA
Answer: A
QUESTION NO: 125 A user is installing a new scanner on a computer. Which of the following MOST likely needs to be installed in order for this equipment to work? A. License key B. OS update C. Firmware D. Driver
Answer: D
QUESTION NO: 126 Which of the following software is used to reduce the size of a file or folder? A. Desktop publishing B. Basic database C. Compression D. Anti-malware
Answer: C
QUESTION NO: 127 Which of the following is used with a touch screen to increase accuracy? A. Touchpad B. Stylus pen C. Joystick D. Trackball
Answer: B
QUESTION NO: 128 Which of the following internal components is used for temporary data storage in a workstation? A. Power supply B. CPU C. RAM D. Hard drive
Answer: C
QUESTION NO: 129 Which of the following is used for temporary storage of program data that is cleared when the computer is turned off? A. CPU B. SSD C. Hard drive D. System memory
Answer: D
QUESTION NO: 130 Which of the following connectors supports both high definition video and audio? A. S-video B. Component C. HDMI D. DVI
Answer: C
QUESTION NO: 131 Which of the following BEST describes malicious software that demands the end-user pay a fee or face the destruction of their files? A. Trojan B. Virus C. Spyware D. Ransomware
Answer: D
QUESTION NO: 132
Which of the following should be done to reduce the risk of having sensitive passwords
compromised while browsing the Internet?
A.
Enable software firewalls to block unknown ports
B.
Disable autofill of forms and passwords
C.
Enable screensavers and time-outs on the computer
D.
Use ad-blocking software on the computer
Answer: B
QUESTION NO: 133 Which of the following would be the MOST efficient way to transport a file from one location on a local hard drive to a different location on the same hard drive? A. Rename B. Cut C. Move D. Save
Answer: C
QUESTION NO: 134
A student wishes to share contacts with another student’s mobile device. Which of the following
would be the easiest method to use? A. Network attached storage B. Bluetooth sharing C. Local hard drive D. Peer-to-Peer network
Answer: B
QUESTION NO: 135 When setting up a new desktop, which of the following should be performed FIRST? A. Configure user accounts B. Plug in cables C. Install security software D. Configure wireless network settings
Answer: B
QUESTION NO: 136
A user, Joe, wants to install an application on his computer. Which of the following factors should
he be aware of before beginning?
A.
The computer has the proper hard drive drivers installed.
B.
The computer is connected to a secure wireless network.
C.
Check for any updates for the application.
D.
The computer meets the application’s minimum requirements
Answer: D
QUESTION NO: 137 Which of the following applications would a user employ to write a business letter? A. Spreadsheet software B. Word processor C. Desktop publishing D. Presentation software
Answer: B
QUESTION NO: 138 Which of the following devices transmits and receives printed images over a telephone line? A. Monitor B. Fax C. Scanner D. Webcam
Answer: B
QUESTION NO: 139 Which of the following video connections provides the highest resolution? A. USB B. S-video C. HDMI D. VGA
Answer: C
QUESTION NO: 140
A user receives an email containing a link. When they hover the mouse over the link, the actual
URL does not match the text in the body of the email and appears to be a string of random
characters. Which of the following is the BEST course of action?
A.
Forward the email to a friend to ask for advice.
B.
Reply to the sender asking for confirmation that it is safe to open.
C.
Delete the email without clicking on the link.
D.
Click the link because malware protection software is installed on the computer.
Answer: C
QUESTION NO: 141 Which of the following is the BEST reason to change a wireless router’s default SSID? A. To make it easier to identify in a location with several routers. B. To make the network feel more personal. C. To make it more difficult to join. D. To make the network secure.
Answer: A
QUESTION NO: 142 A user, Joe, is concerned about the safety of his personal information on a website. Which of the following can Joe look for to ensure that his personal information is not at risk? (Select TWO). A. HTTP on the browser address bar B. Suspicious ads in the browser C. HTTPS on the browser address bar D. A lock symbol on the browser address bar E. The word secure in the browser address bar
Answer: C,D
QUESTION NO: 143 Which of the following data connection types provides the HIGHEST mobility? A. WiFi B. Cellular C. Direct link D. Wired
Answer: B
QUESTION NO: 144 Which of the following items require ESD precautions? A. Upgrading to a new touch screen monitor B. Adding a micro SD card to a smartphone C. Installing an compact flash card into a laptop D. Replacing RAM in a personal computer
Answer: D
QUESTION NO: 145
Which of the following are reasons to verify backups? (Select TWO).
A.
To create a system image for easy restore
B.
To confirm all selected data was backed up
C.
To diagnose any backup media hardware failure
D.
To determine if backup software needs to be patched
E.
To ensure files can be restored
Answer: B,E
QUESTION NO: 146 A user has just removed a new desktop PC from the box and has plugged in several new peripheral devices. During which of the following steps will the plug and play peripheral devices be installed on the new PC? A. Installing security software B. Powering on for the first time C. Booting the operating system D. Adding additional user accounts
Answer: C
QUESTION NO: 147 Which of the following is the BEST method of sharing files within a department? A. Email B. Flash drive C. Network drive D. Instant messaging E. NFC
Answer: C
QUESTION NO: 148 When storing a document in the cloud, a user needs to be: A. On a shared drive. B. Using a USB cable. C. Connected to the Internet. D. In airplane mode.
Answer: C
QUESTION NO: 149 Which of the following device types is needed within a computer to read information on a CDROM? A. Network card B. Optical drive C. Video card D. Solid state drive
Answer: B
QUESTION NO: 150 Which of the following ports can be used to connect an external hard drive to a computer? (Select TWO). A. MIDI B. PS/2 C. eSATA D. RJ-45 E. USB F. RJ-11
Answer: C,E
QUESTION NO: 151 Which of the following is considered an open-source operating system? A. Windows B. Chrome OS C. Mac OS X D. Linux
Answer: D
QUESTION NO: 152 A technician wants to keep a router up to date. Which of the following MUST be updated regularly? A. SSID B. Administrator password C. Wireless encryption D. Firmware
Answer: D
QUESTION NO: 153 The extension .rtf is an example of which of the following file types? A. Document B. Executable C. Audio D. Speadsheet
Answer: A
QUESTION NO: 154 Which of the following are examples of video connectors? (Select TWO). A. VGA B. Serial C. HDMI D. eSATA E. PS/2
Answer: A,C
QUESTION NO: 155 When setting up a new computer, where does a user change the date and time? A. Peripheral configuration B. Localization settings C. Screen resolution D. eSATA settings
Answer: B
QUESTION NO: 156 A user wants to have the latest security patches and bug fixes installed on a computer. Which of the following is the BEST method to achieve this? A. Configure anti-malware updates B. Manually update before each use C. Update every six months D. Schedule automatic updates Answer: D
Answer: D
QUESTION NO: 157 A user is accessing an online bank account for the first time via an Internet browser. Which of the following should the user check? (Select TWO). A. HTTPS before the URL B. Exclamation point on the status bar C. Lock symbol in the address bar D. HTTP before the URL E. Skull/crossbones symbol in the corner
Answer: A,C
QUESTION NO: 158 Which of the following CPU cooling types is BEST in a dusty environment? A. Liquid cooling B. Open case C. Case fan D. Heat sink fan
Answer: A
QUESTION NO: 159
To reduce the risk of installing unapproved or possibly malicious apps on a smartphone, a user
should:
A.
Download apps from a user-supported community.
B.
Use a search engine to identify safe apps.
C.
Update the firmware to the latest version.
D.
Utilize the vendor-provided app store.
Answer: D
QUESTION NO: 160 Which of the following computer connector types was designed specifically for allowing high-speed external hard drive transfers? A. DVI B. USB C. eSATA D. HDMI
Answer: C
QUESTION NO: 161
Which of the following is a common way to prevent physical theft of a laptop or workstation?
A.
Shred any sensitive information to prior to disposal.
B.
Avoid storing passwords near the computer.
C.
Practice good awareness skills when entering passwords/PINs.
D.
Cable and lock device securely attached to a solid object
Answer: D
QUESTION NO: 162
Ann, a user, is browsing shopping websites on the Internet when she receives a pop-up message
on her screen indicating a virus has been detected by the antivirus software. Which of the
following actions should be performed NEXT?
A.
Ignore the message because it is likely adware.
B.
Run a scan on the entire local drive.
C.
Clear temporary files and folders.
D.
Minimize the alert and continue browsing the Internet.
Answer: B
QUESTION NO: 163 A technician needs to troubleshoot a user’s computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated? A. Password confidentiality B. Password complexity C. Password reuse D. Password expiration
Answer: A
QUESTION NO: 164 Joe, a user, has many applications on his computer and is trying to use software management best practices. Which of the following should he consider? A. Install a desktop cleanup application. B. Uninstall unneeded applications. C. Load each application one at a time. D. Manage the use of internal memory
Answer: B
QUESTION NO: 165 A user's government identification number, birth date, and current address are considered which of the following? A. IMAP B. HTTP C. PII D. HTTPS
Answer: C
QUESTION NO: 166 A user, Ann, calls the manufacturer of a software product she purchased, but is denied assistance because the product is no longer supported. Which of the following options is a BEST next choice? A. P2P software sharing service B. Original instruction manual C. Online user forum D. PC manufacturer's website
Answer: C
QUESTION NO: 167 Which of the following software types BEST facilitates collaboration? A. Personal information manager B. Video editing software C. Instant messaging software D. CAD software
Answer: C
QUESTION NO: 168 To increase security, which of the following is the BEST feature to disable on a mobile device when not in use? A. Wireless B. GPS C. Network D. NFC
Answer: D
QUESTION NO: 169 Which of the following data connectivity options is the BEST to use when both high availability and reliability are required? A. WiFi B. Bluetooth C. Cellular D. Wired
Answer: D
QUESTION NO: 170 A technician has added an external hard drive to a personal computer. The hard drive is powered on, but the computer does not see the new hard disk. Which of the following is the FIRST thing the technician should check? A. The power cable B. The OS version for compatibility C. The hard drive firmware revision D. The data cable
Answer: D
QUESTION NO: 171 Which of the following is the MOST secure password? A. Have-A-Nice-Day B. HAVE-A-NICE-DAY C. have-a-nice-day12 D. hav3-@-Nic3-D@Y14
Answer: D
QUESTION NO: 172 A user is updating a website. Which of the following protocols will provide the MOST security when uploading the files? A. FTPS B. FTP C. SMTP D. HTTP E. SNMP
Answer: A
QUESTION NO: 173 A website locks a user’s account after three unsuccessful login attempts. This precaution prevents which of the following? A. Shoulder surfing B. Phishing C. Spam D. Password cracking
Answer: D
QUESTION NO: 174 Which of the following commands is used to view the contents of a file? A. Save B. Open C. Copy D. Move
Answer: B
QUESTION NO: 175 Which of the following media has the highest possible availability? A. Wired B. WiFi C. Cellular D. Bluetooth
Answer: A
QUESTION NO: 176 Which of the following extension types are associated with document files? (Select THREE). A. .txt B. .odf C. .msi D. .rtf E. .mp3 F. .tar G. .jpg
Answer: A,B,D
QUESTION NO: 177 A home user wants to share files between two different computers. The user wants the files to be available to either computer, regardless of whether either computer is turned on. Which of the following is the BEST storage method? A. USB storage B. Internal storage C. Direct attached storage D. Network attached storage
Answer: D
QUESTION NO: 178 Which of the following is the component responsible for interconnectivity of internal system devices? A. System case B. Power supply C. Motherboard D. Expansion card
Answer: C
QUESTION NO: 179 Which of the following storage methods provides the HIGHEST redundancy and availability? A. Cloud-based storage B. Storage Area Network C. Locally attached storage D. Network Attached Storage
Answer: A
QUESTION NO: 180
Which of the following is a benefit of setting up a computer to receive automatic updates from the
OS vendor?
A.
Arranges the hard drive files in order
B.
Restores missing files that were lost or deleted
C.
Keeps the software current and applies security patches
D.
Provides the latest virus definitions to keep the computer safe
Answer: C
QUESTION NO: 181 Which of the following application types is MOST often used for doing a mail merge? A. PDF software B. Word processor C. Presentation software D. Personal information manager
Answer: B
QUESTION NO: 182 Which of the following security threats includes suspicious activity, such as reviewing someone's screen display without permission? A. Malware B. Shoulder surfing C. Phishing D. Password cracking
Answer: B
QUESTION NO: 183 A user reports an inability to access the Internet on a new SOHO router. On further investigation, a technician notices that the wireless network is not visible. Which of the following is the MOST likely cause? A. SSID broadcast is disabled B. Wireless password has changed C. Firmware update is required D. WPA2 is enabled
Answer: A
QUESTION NO: 184 Which of the following storage methods is MOST likely used in corporate settings to save large amounts of data in a secured manner? A. HTTP B. HTTPS C. FTPS D. FTP
Answer: C
QUESTION NO: 185
Which of the following describes the difference between open source and commercial operating
systems?
A.
Open source operating systems only run on desktop computers, whereas commercial operating
systems run on servers.
B.
Open source operating systems run on standard and non-standard hardware, whereas
commercial operating systems only run on specific hardware.
C.
Open source operating systems can be downloaded and used by everyone, whereas commercial
operating systems can only be used by companies.
D.
Open source operating systems are usually provided free of charge, whereas most commercial
operating systems are usually provided at some cost.
Answer: D
QUESTION NO: 186 Which of the following is MOST important to ensure a computer temperature is maintained within normal limits? A. Maintaining constant power output B. Ensuring sufficient airflow C. Keeping the case open D. Turning the wireless off when not needed
Answer: B
QUESTION NO: 187 An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using? A. LTE B. GSM C. VoIP D. CDMA
Answer: C
QUESTION NO: 188 Which of the following allows for hands-free operation of a wireless device? A. Encryption B. Wireless password C. Bluetooth pairing D. Internet connectivity
Answer: C
QUESTION NO: 189 Joe, a user, is setting up a new computer and wants to minimize the risk of a malicious software infection over the network. Which of the following should be configured on the new computer? (Select THREE). A. Password policies B. Multiple user accounts C. Software firewall D. Driver updates E. Operating system updates F. Anti-malware software
Answer: C,E,F
QUESTION NO: 190
Which of the following is the primary goal in performing a backup verification?
A.
Ensure backup data can be correctly restored
B.
Prove the media has sufficient space for the data
C.
Configure frequency of backups
D.
Adhere to legal backup storage requirements
Answer: A
QUESTION NO: 191 Which of the following file types is used to consolidate a group of files? A. .rtf B. .m3u C. .avi D. .rar
Answer: D
QUESTION NO: 192 Which of the following keys should be pressed to enable access to various menus? A. ALT B. SHIFT C. TAB D. CTRL
Answer: A
QUESTION NO: 193 Ann, a user, has an external monitor that will not turn on. Her laptop has activity lights and is plugged into the same power strip. Which of the following should be checked FIRST to begin troubleshooting this issue? A. The power strip B. The monitor video cable C. The laptop power cable D. The monitor power cable
Answer: D
QUESTION NO: 194 Which of the following methods are MOST likely used to reduce the internal temperature of a computer? A. Install a protective cover B. Reduce display brightness C. Air circulation D. Electronic recycling E. Liquid cooling
Answer: C,E
QUESTION NO: 195 A technician is setting up a router and would like to increase the security level. Which of the following actions will achieve this? A. Installing anti-malware on the router B. Changing the default admin password C. Increasing transmission power D. Configuring multifactor logon authentication
Answer: B
QUESTION NO: 196 Which of the following data connections can span the FARTHEST distance? A. WiFi B. Dial-up C. Satellite D. Cable
Answer: C
QUESTION NO: 197 Which of the following functions can transfer a file between folders and deletes it from the original folder? A. Edit B. Move C. Copy D. Paste
Answer: B
QUESTION NO: 198 An end-user has 16GB of RAM installed on a computer system. Which of the following describes why the OS only uses a maximum of 4GB of RAM? A. The operating system is 16-bit. B. The computer has corrupted RAM. C. The computer has a defective motherboard. D. The operating system is 32-bit. E. The computer has a virus.
Answer: D
QUESTION NO: 199
A technician just installed a new computer. Which of the following is the BEST way to manage the
cables?
A.
Line the cables up neatly and wrap them together with cable ties.
B.
Leave the cables loose to prevent interference between wires.
C.
Nail the cables to the wall.
D.
Tuck the cables neatly underneath the carpet.
Answer: A
QUESTION NO: 200 A printer is migrated between offices. All the wires are connected properly, but the new workstation cannot find the printer. Which of the following should the technician install? A. OS B. Updates C. Drivers D. Application
Answer: C
QUESTION NO: 201 A user wants to run a major update on a laptop. Which of the following should be considered before running any major updates? A. Restore folders from back up B. Change administrator account password C. Back up important folders D. Print all personal documents
Answer: C
QUESTION NO: 202 Which of the following adds a basic security measure to a wireless device? A. Hands-free headset B. Screen lock feature C. Airplane mode D. Clip-on case
Answer: B
QUESTION NO: 203 Which of the following system utilities allows a user to configure multiple monitors in the OS? A. Color management B. Device manager C. GPU driver D. Display
Answer: D
QUESTION NO: 204
Joe, a user, reports that his neck and back are hurting after being at his desk for the whole day.
Which of the following are the possible causes of the problem? (Select TWO).
A.
The keyboard is not ergonomic.
B.
The monitor does not have a screen protector.
C.
The monitor height is not adjusted to Joe’s needs.
D.
Joe is not using a wrist rest with the keyboard.
E.
The chair is not properly adjusted to Joe’s needs
Answer: C,E
QUESTION NO: 205 Which of the following are core peripherals needed to use a desktop PC? (Select THREE). A. Monitor B. Keyboard C. Printer D. Mouse E. Speakers F. Mouse pad G. Webcam
Answer: A,B,D
QUESTION NO: 206 A user purchases a new desktop computer and requires assistance setting it up. Which of the following describes the BEST resource the user should reference? A. Technical community group B. Local retail store technical support C. Internet search engine D. Manufacturer documentation
Answer: D
QUESTION NO: 207 Which of the following is used for telepresence? A. VoIP telephone B. Webcam C. Remote desktop D. Touchscreen
Answer: B
QUESTION NO: 208 Which of the following storage media provides the FASTEST speeds when backing up large data files? A. Offsite storage B. Network attached storage C. Locally attached storage D. Cloud-based storage
Answer: C
QUESTION NO: 209 Which of the following security threats is classified as license theft? A. Entering the neighbor’s software key B. Using software to reveal a password C. Searching through the trash for passwords D. Watching what a user types on screen
Answer: A
QUESTION NO: 210 The manufacturer of a SOHO router has released a security fix for the router. Which of the following methods should be used to apply the fix? A. Change the admin password. B. Apply new WEP key. C. Update the firmware. D. Hold the reset button.
Answer: C
QUESTION NO: 211 A user receives an email from the bank stating that the user needs to follow a link and re-enter login credentials due to recent security breaches. Based on best practices, which of the following actions should the user take? (Select TWO). A. Inform the ISP. B. Follow the instructions. C. Delete the message. D. Reply to the email. E. Contact the bank.
Answer: C,E
QUESTION NO: 212 A technician is creating a WiFi network to which anyone can connect without entering a key. With which of the following should the technician configure the wireless network? A. Shared B. Open C. WPS D. WPA
Answer: B
QUESTION NO: 213 A user needs to establish an initial password for an email account. Which of the following is the BEST example of a complex password? A. 01#iWant!2686612338 B. iWantobeaCosmonau# C. 01c234n56789v9876x21 D. 012iWanttobe210
Answer: A