FC0-U51 Flashcards

1
Q

Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?

Shortcut

URL

Attachment

FTP

A

Shortcut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?

Chrome OS

Windows 7 Home

Mac OS X

iOS

A

Mac OS X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is trying to access a user’s files and is unable to open any folder or file. Which of the following BEST describes the situation?

The folders contain older versions of the files.

The files are corrupted.

The technician needs to change the file attributes.

The technician does not have permissions.

A

The technician does not have permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select TWO).

Use only public computers to access the website

Create a complex password

Change the default password

Write the password down

Use the original password

A

Create a complex password

Change the default password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following components provides the FASTEST medium for hosting and storing an operating system?

Blu-Ray disc

7200RPM HDD

SSD

DVD-RW

A

SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An RoHS label on hardware indicates which of the following?

The hardware produces EMI when used

The hardware is certified to be energy efficient

The hardware provides battery backup for power outages

The hardware needs to be properly disposed

A

The hardware needs to be properly disposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following settings will a user configure as part of the initial operating system setup wizard? Choose 2

Backup schedule

Accessibility options

Multiple user accounts

Time zone

Computer name

A

Time zone

Computer name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?

The application has to be registered to the user.

The application must be upgraded to a 64-bit version.

The application must be activated.

The application needs to be reinstalled.

A

The application must be activated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following should be performed after a backup has been completed?

Delete the backup

Verify the backup

Save the backup

Schedule the backup

A

Verify the backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following connections provide data with the MOST secure protection from interception?

Wired

WiFi

IR

Cellular

A

Wired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician is configuring a wireless router for a small office and the business owner would like the wireless network to be secured using the strongest encryption possible. Which of the following should the technician choose?

WPA2

WAP

WPA

WEP

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?

Email address

Phone number

Mother’s maiden name

Last name

A

Mother’s maiden name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following operating systems is available for free and can be modified by anyone?

Windows

Linux

Mac OS

Chrome OS

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following BEST describes this type of malware infection?

Ransomware

Adware

Spyware

Virus

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following features of a smartphone controls the screen orientation?

Gyroscope

NFC

Accelerometer

GPS

A

Gyroscope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?

Thermal

Laser

Dot matrix

Inkjet

A

Laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following components are used to store data? (Select TWO).

Motherboard

RAM

CPU

GPU

SSD

A

RAM

SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?

iOS

Windows

Mac OS

Chrome OS

A

Mac OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following operating systems is very lightweight and relies heavily on Internet applications?

Chrome OS

Windows

Linux

Blackberry OS

A

Chrome OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website, She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem?

The company has configured a policy on her computer that forces her to stay on their website.

Her computer is infected with adware and is redirecting her browser to another site.

The memory of the browser is corrupt and she needs to have the browser reinstalled.

She did not reboot her computer after clearing the temporary files.

A

Her computer is infected with adware and is redirecting her browser to another site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Ann, a user, wishes to free space in her documents folders. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files?

Date modified

File path

Size

Extension

A

Size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A user has finished setting up a new computer. Now the operating system requires activation, but the user discovers the computer has no Internet connection, Which of the following should the user do FIRST?

Contact technical support.

Reboot the computer.

Check the Ethernet cable.

Review the manufacturer’s website.

A

Check the Ethernet cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following will allow a user to move a file from one folder to another using the LEAST number of steps, while ensuring that the file is removed from its original location?

Open the file from its original location, save it to the new location, and delete it from the original location.

Cut the file from its original location and paste it to the new location.

Rename the file in its original location to a name that is not already taken in the new location.

Copy the file from its original location and paste it to the new location.

A

Cut the file from its original location and paste it to the new location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following software package types is designed to accept input from multiple users?

Utility

Operating system

Specialized

Collaborative

A

Collaborative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?

The monitor power cable is unplugged.

The video cable has become disconnected.

The operating system has encountered a stop error.

The screen saver has activated.

A

The video cable has become disconnected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following are examples of keyboard connectors? (Select TWO).

USB

RJ-11

Serial

Firewire

PS/2

A

USB

PS/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard. The user can install the games by performing which of the following?

Schedule automatic updates.

Enable installed OS features.

Update hardware drivers.

Reinstall productivity applications.

A

Enable installed OS features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A user is at the office and has a cellular phone that previously functioned properly. The phone is powered on with a fully charged battery. However, the phone does not have connectivity. Which of the following describes the problem?

Phone is disconnected from WiFi

Provider is conducting system testing

MAC address is bas

Phone is in airplane mode

A

Phone is in airplane mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following alternative technologies allows a computer to run multiple operating systems with partitioning the hard drive?

Web applications

Dual boot

Telepresence

Virtualization

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is a 15-pin video connection?

DVI

S-video

Component

HDMI

VGA

A

VGA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is considered an optical storage medium?

SSD

Blu-Ray

Flash drive

Memory card

A

Blu-Ray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following are best practices when it comes to using a computer in a public location?
(Select TWO).

Notify the administrator when finished.

Use strong passwords.

Turn off the computer when finished.

Disable the save password function on web pages.

Make sure to clean the keyboard when finished.

Make sure to log out of websites when done.

A

Disable the save password function on web pages.

Make sure to log out of websites when done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is a feature of a basic power strip?

Protects against lightning strikes

Provides multiple outlets for power

Generates power for devices

Provides battery backup for devices

A

Provides multiple outlets for power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following connectors consists of three separate plugs for video?

Display port

S-video

Thunderbolt

Component

A

Component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following technologies allows people to communicate all over the world inexpensively?

Virtualization

SSID

Kinetics

VoIP

A

VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?

Large USB flash drive connected to a PC

Medium capacity SATA hard drive

Network-attached storage appliance

Firewall with security management

A

Network-attached storage appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following would BEST be describe as password best practices? (Select THREE).

Use a long passwords

Sharing passwords with a trusted source

Limiting password resuse

Keeping default passwords

Use of special characters

Writing down difficult passwords

A

Use a long passwords

Limiting password reuse

Use of special characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following is MOST likely required during installation in order to legally install software?

Automatic updates

Service level agreement

License key

Antivirus software

A

License key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A user wants to purchase a CAD appliaction that requires 8GB of RAM to operate. Which of the following operating system types is required?

8-bit

16-bit

32-bit

64-bit

A

64-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following BEST describes the pros and cons of a home wired network?

Low throughput, low mobility, high availability, high latency, high security

High throughput, high mobility, low availability, low latency, hight security

High throughput, low mobility, high availability, low latency, high security

Low throughput, high mobility, low availiability, high latency, low security

A

High throughput, low mobility, high availability, low latency, high security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?

Standard

Guest

Administrator

Power user

A

Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?

Malware

Social engineering

Spam

Physical security

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Where can a user find the latest updates, upgrades, or firmware or an electronic device that the vendor supports?

Internet search engine

Internet forum

Technical community groups

OEM website

A

OEM website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the users browser?

HTTP

HTTPS

SFTP

FTP

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO).

IP address

User’s password

Computer’s name

Subnet mask

HTTP port

Fax number

A

IP address

Subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following is a reason that a user might upgrade a video card driver? (Select TWO).

To decrease the screen resolution

To access monitor standby mode

To fix an error message

To use additional features

To adjust the brightness/contrast

A

To fix an error message

To use additional features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Before purchasing a new video card for a PC, which of the following should be checked to ensure there will be enough electricity for the video card to function properly?

GPU

CPU

GUI

PSU

A

PSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A laptop owner, Ann, can no longer see web pages when she opens her browser, and she only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue?

The computer does not have current antivirus software installed

The computer needs to have its components upgraded

The downloaded toolbars filing the browser screen

The owner was not using complex passwords

A

The downloaded toolbars filing the browser screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following are considered input devices for a computer? (Select TWO).

Mouse

Printer

Speakers

Microphone

Monitor

A

Mouse

Microphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website?

It stores data in cache or cookiees, but not both.

It requires login credentials for some sections.

It contains both secure and non-secure parts.

It is best viewed with a different browser.

A

It contains both secure and non-secure parts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

By default, which of the following types of operating systems can automatically detect a users location while the user is traveling in a bus.

Server

Desktop workstation

Virual server

Mobile

A

Mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?

Dumpster diving

Shoulder surfing

Phishing

Social enigeering

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following is the function of a CPU?

Encrypts data for remote transmission

Performs data computation

Supplies electricity to components

Provides storage location for files

A

Performs data computation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A technician is setting up a computer that was shipped. After everything is plugged in, the computer will not turn on. Which of the following should the technician do FIRST to identify the issue?

Check for physical damage on the computer.

Search for a solution on the Internet.

Reference the manufacturer’s documentation.

Ensure the power supply is set at the current voltage.

A

Ensure the power supply is set at the current voltage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A user installing a printer can connect it to which of the following ports? (Select FOUR).

PS/2

VGA

DVI

USB

FireWire

Serial

RJ-11

Parallel

A

USB

FireWire

Serial

Parellel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

When operating under optimal network conditions, which of the following has the HIGHEST reliability?

Bluetooth

Wired

Cellular

WiFi

A

Wired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

When setting up a new workstation, which of the following should be configured during the initial OS setup wizard?

Additional software

Data and time settings

Peripheral devices

Security software

A

Date and time settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

When applying ergonomics to a workstation area, which of the following are the MOST important to consider? (Select TWO).

Proper sitting position

Amount of time computer will be used

Clarity of the display

Proper keyboard and mouse height

Number of speakers in sound system

Brightness and contrast of the display

A

Proper sitting position

Proper keyboard and mouse height

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following allows for the FASTEST printer connections?

Bluetooth

USB

Parallel

Serial

A

USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A user has purchased some new software from a vendor and wants to install it on all of the Windows computers in the house. Which of the following will help the user accomplish the task and ensure compliance with the software vendor?

Copy and paste the program between computers.

Purchase a multi-user license.

Purchase a single-user license.

Use remote desktop to share the program between computers.

A

Purchase a multi-user license.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access. Which of the following BEST protects against data theft in this instance?

Security software

Full disk encryption

Cable lock

Username and password

Patching the OS and third party software

A

Full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which of the following printers requires a special type of paper in order to print?

Impact

Thermal

Inkjet

Laser

A

Thermal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following is a common characteristic of open source software?

Update cycles are dictated by the manufacturer

Modifications to core funtionalities are made by the manufacturer

Can only run on certain manufacturer processors

Can be fully modified by the user

A

Can be fully modified by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?

The browser is incompatible with the website

The workstation has been infected with malware

The website is not secured by SSL

The certificate of the website has expired

A

The workstation has been infected with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which of the following components is required to send faxes via POTS?

NIC

Power supply

Modem

Wireless adapter

A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which of the following file formats contain other files within them? (Select TWO).

.tiff

.dmg

.png

.mp3

.iso

.flac

A

.dmg

.iso

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A user working on a laptop notices the mouse cursor frequently moves to random locations in a document while typing. Which of the following should the user do FIRST to help resolve this issue?

Ask tech support for help

Reboot the laptop

Turn off the touchpad

Reconnect the mouse

A

Turn off the touchpad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A users laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another users laptop. How could the user have prevented this breach?

Disable file and print sharing on the laptop.

Delete unused drives from the network.

Remove shared keys from the key ring.

Set the read-only attribute on the files.

A

Disable file and print sharing on the laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which of the following is the BEST reason to backup data?

To ensure data encryption

To ensure data stability

To ensure data security

To ensure data availability

A

To ensure data availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A users operating system is set to automatically update as updates are released. However, last weeks updates failed to download. Which of the following should the user do FIRST to install the updates?

Reference the OS manufacturer’s website.

Run a virus scan to remove viruses.

Reinstall the operating system.

Change the automatic update schedule.

Manually download the updates.

A

Manually download the updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?

Micro SD card

Bluetooth

USB connection

Infrared

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

An employee’s new computer came with a free 30-day trial version of antivirus software. The employee’s company provides enterprise antivirus software from a different vendor. Which of the following should the employee do in order to use a full version of antivirus software?

Enter the company product key for the antivirus software, enabling the full version.

Uninstall the current version antivirus software and install the company version.

Verify internet connectivity and run only scanning software.

Update the trial antivirus software to the latest version.

A

Uninstall the current version antivirus software and install the company version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

An employee’s new computer came with a free 30-day trial version of antivirus software. The employee’s company provides enterprise antivirus software from a different vendor. Which of the following should the employee do in order to use a full version of antivirus software?

Enter the company product key for the antivirus software, enabling the full version.

Uninstall the current version antivirus software and install the company version.

Verify internet connectivity and run only scanning software.

Update the trial antivirus software to the latest version.

A

Uninstall the current version antivirus software and install the company version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following can a user configure on an operating system so that an audible sound is made when an error message is displayed?

Encryption

Hot keys

Accessibility options

Screen captures

A

Accessibility options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A user is setting up an older wireless access point that has only WEP for encryption. Which of the following additional
steps will help to secure the network? (Select TWO).

Disable SSID broadcast.

Refresh the MAC address.

Filter the MAC address.

Refresh the IP address.

Use CAT6 cables.

A

Disable SSID broadcast

Filter the MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which of the following extensions identifies a video file?

.msi

.tar

.img

.mp4

A

.mp4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following is the BEST example of productivity software?

Word processing software

Entertainment software

Image editing software

Anti-malware software

A

Word processing software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A technician has just finished setting up a SOHO wireless router but the client does not want the PC on the wireless network for security reasons. The technician connects an RJ-45 cable to the computer and the router but does not receive network connectivity. Which of the following is the NEXT step to diagnose the problem?

Change the IP address on the computer to match the router.

Reseat the power cable on the computer and reboot.

Check for link light activity on the computer and the router.

Change the hostname of the router to match the computer’s network.

A

Check for link light activity on the computer and the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?

Enabling full disk encryption

Requiring screensaver password

Disabling Bluetooth adapters

Adding multi-factor authentication

A

Enabling full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

A user is configuring a SOHO wireless router. The user should change the routers default administrator password for which of the following reasons?

To prevent improper data transmission encryption

To prevent unauthorized configuration changes

To prevent social engineering attacks

To increase wireless signal strength

A

To prevent unauthorized configuration changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

A user will be travelling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).

Keyboard

Speakers

Mouse

Bluetooth

NFC

A

Bluetooth

NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?

Hacking

Phishing

Spam

Cracking

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

An attacker cracks a user’s password for all social media, email, and bank accounts. The user needs to change passwords for all these accounts. Which of the following should the user do in the future to prevent this from happening?

Disable unused browser toolbars.

Clear the browser cache.

Avoid credential reuse.

Delete tracking cookies.

A

Avoid credential reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

After installing the OS on a workstation, a technician notices that everything is displayed in large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?

Color depth

Orientation

DPI settings

Resolution

A

Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Joe, a user, needs to store a large amount of data but does not have enough space on his local computer. Which of the following are the BEST options for him to use? (Select TWO).

Network-attached storage

External hard drive

Optical drive

USB thumb drive

Another computer

A

Network-attached storage

External hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which of the following computer components are used to store data? (Select TWO).

GPU

HDD

RAM

NIC

CPU

A

HDD

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which of the following could be described as both an input and output device?

Flat-screen monitor

Multi-function printer

Microphone

Scanner

A

Multi-function printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

A technician has been tasked with changing the settings for a used SOHO router, but does not have the administrator password because the previous owner changed it. Which of the following actions will resolve this issue?

Click “Forgot password”

Use a password cracker

Hold the reset button

Use the password: password

A

Hold the reset button

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

A user learns of an operating system vulnerability that would allow a hacker to access the computer. The user would like to keep the operating system up to date to prevent such vulnerabilities from occurring. Which of the following should the user configure?

Additional OS features

Automatic updates

Software firewall

Anti-malware software

A

Automatic updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

A technician sets up a new computer system and connects the keyboard and mouse to the PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution?

Swap the mouse and keyboard to the other PS/2 ports

Remap the mouse and keyboard in the BIOS

Update the BIOS to recognize the new keyboard and mouse

Configure the keyboard localization settings

A

Swap the mouse and keyboard to the other PS/2 ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Which of the following is an advantage of using cloud-based collaborative applications and storage, rather than local applications and storage?

Decreased software licensing costs

Higher security encryption

Limited storage space for files

Increased accessibility

A

Increased accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which of the following is a requirement to connect a smartphone to a wireless network?

SSID

SATA

SMTP

gzip

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which of the following protocols is used to secure communications between sender and receiver?

SIP

SNMP

SSL

SMTP

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which of the following software types allows for the creation of a single file composed of multiple subfiles, while at the same time reducing the overall size of combined elements?

Database

Document sharing

Compression

Maintenance

A

Compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which of the following are secure network protocols? (Select TWO).

IMAP

FTPS

SMTP

HTTPS

DNS

A

FTPS

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which of the following data connections would provide a user the BEST Internet availability while traveling?

Workstation with only RJ-45 connectors

Smartphone with cellular service

Laptop with Bluetooth wireless connectivity

Tablet connected to a SOHO wireless network

A

Smartphone with cellular service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

A user receives an email formatted to appear as if the bank sent it. The email explains that the user must confirm the name, address, and social security number listed on the bank account. Which of the following BEST describes the security threat taking place?

Should surfing

Social engineering

Spam

Phishing

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

A user installed a new scanner on a desktop personal computer without any documentation. The scanner powers on, the lamp turns on, and then the unit stops with a failure light lit. Which of the following should the user do FIRST?

Go to the scanner manufacturer’s website and download the current installation information

Check the personal computer manufacturer’s support website for information about scanner installation

Find a scanner user group website and ask for help

Update the scanner firmware and drivers, then reinstall the scanner

A

Go to the scanner manufacturer’s website and download the current installation information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which of the following is performed during WiFi setup on a mobile device?

Configuring a Bluetooth pairing settings

Configuring email settings

Configuring screen lock settings

Configuring SSID settings

A

Configuring SSID settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

When considering backup media, which of the following holds the MOST data?

BD-R

DVD-R

DVD-DL

CD-ROM

A

BD-R

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which of the following is an example of ransomware?

A user is asked to pay a fee for a password to unlock access to their files

A user receives an email demanding payment for a trial application that has stopped working

A user has opened an Internet browser and is taken to a site that is not the normal home page

A user is asked to open an attachment that verifies the price of an item that was not ordered

A

A user is asked to pay a fee for a password to unlock access to their files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?

Change the SSID

Change the router’s address

Change the administrator password

Change the encryption key

A

Change the administrator password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

When setting up a new device, there are multiple features available that will never be used. Which of the following should the user do to make the new device more secure?

Make all users adminstrators

Remove or disable the unnecessary features

Install a password manager on the device

Make all users guests

A

Remove or disable the unnecessary features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which of the following is a safety feature of cloud-based backups?

Incremental copy of data

Local copy of data

Offsite storage of data

Full backup of PC data

A

Offsite storage of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?

The application has to be registered to the user?

The application must be upgraded to a 64-bit version

The application must be activated

The application needs to be reinstalled

A

The application must be activated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:

adware

spyware

ransomware

phishing

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?

The monitor power cable is unplugged

The video cable has become disconnected

The video driver is not installed

The operating system has encountered a stop error

The screen save has activated

A

The video cable has become disconnected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?

Change the router administrator username

Change the router’s broadcasting channel

Update the unit’s firmware

Use a complex administrator password

A

Update the unit’s firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).

Network connection

Microphone

Modem

Firewall

Webcam

Cable connection

A

Network connection

Microphone

Webcam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Joe, a user, saves a document to a flash drive on his computer in order to print the document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive. Which of the following is the MOST likely cause of the infection?

The flash drive was infected by a driving hacker on the way to the public kiosk.

The public workstation was infected by Joe’s flash drive.

The public workstation was infected and passed the virus to the flash drive.

The flash drive was already infected by the user’s computer.

A

The public workstation was infected and passed the virus to the flash drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

A home computer that has been in operation for more than five years is now suffering from random shutdowns during the day. The PC is set up in an enclosed cubby built into the home office desk. Which of the following is MOST likely plaguing the PC?

The PC was switched over to 240v operation mode

Dust accumulation

The PC’s BIOS is severely out-of-date, causing PSU issues

EMI

A

Dust accumulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which of the following has the lowest latency?

SSD

NAS

Blu-Ray

DVD

A

SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Which of the following is the BEST security practice to use when configuring the management options of a wireless router?

Disable DHCP

Change the admin password

Enable SSID

Enable remote administation

A

Change the admin password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

Social engineering

Phishing

Virus attack

License theft

A

License theft

115
Q

A technician wants to minimize the risk of having third parties track previously visited web pages. Which of the following should be performed in the Internet browsers settings? (Select TWO).

Select from data

Disable location services

Remove cookies

Clear history

Change passwords

A

Remove cookies

Clear history

116
Q

Which of the following defines why backup verification is important?

To ensure that the backup runs as quickly as possible

To ensure that the backup can be stored indefinitely

To ensure that the backup can be saved to the cloud

To ensure that the backup contains usable data

A

To ensure that the backup contains usable data

117
Q

A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?

Only browse the Internet on WiFi connections that use WPA2

Turn off the guest account in the operating system

Disable autofill functionality within the web browser

Remove any legacy browsers from the computer

A

Disable autofill functionality within the web browser

118
Q

Which of the following permissions is required to run a .bat file?

Delete

Execute

Write

Modify

A

Execute

119
Q

Which of the following security threats is classified as license theft?

Entering the neighbor’s software key

Using software to reveal a password

Searching through the trash for passwords

Watching what a user types on screen

A

Entering the neighbor’s software key

120
Q

Which of the following allows for hands-free operation of a wireless device?

Encryption

Wireless password

Bluetooth pairing

Internet connectivty

A

Bluetooth pairing

121
Q

A user wants to have the latest security patches and bug fixes installed on a computer. Which of the following is the BEST method to achieve this?

Configure anti-malware updates

Manually update before each use

Update every six months

Schedule automatic updates

A

Schedule automatic updates

122
Q

A technician has added an external hard drive to a personal computer. The hard drive is powered on, but the computer does not see the new hard disk. Which of the following is the FIRST thing the technician should check?

The power cable

The OS version for compatibility

The hard drive firmware revision

The data cable

A

The data cable

123
Q

A user, Joe, is concerned about the safety of his personal information on a website. Which of the following can Joe look for to ensure that his personal information is not at risk? (Select TWO).

HTTP on the browser address bar

Suspicious ads in the browser

HTTPS on the browser address bar

A lock symbol on the browser address bar

The word secure in the browser address bar

A

HTTPS on the browser address bar

A lock symbol on the browser address bar

124
Q

Which of the following CPU cooling types is BEST in the dusty environment?

Liquid cooling

Open case

Case fan

Heat sink fan

A

Liquid cooling

125
Q

A home user wants to share files between two different computers. The user wants the files to be available to either computer, regardless of whether either computer is turned on. Which of the following is the BEST storage method?

USB storage

Internal storage

Direct attached storage

Network attached storage

A

Network attached storage

126
Q

The extension .rtf is an example of which of the following file types?

Document

Executable

Audio

Spreadsheet

A

Document

127
Q

A technician just installed a new computer. Which of the following is the BEST way to manage the cables?

Line the cables up neatly and wrap them together with cable ties.

Leave the cables loose to prevent interference between wires.

Nail the cables to the wall.

Tuck the cables neatly underneath the carpet.

A

Line the cables up neatly and wrap them together with cable ties.

128
Q

Which of the following device types needed within a computer to read information on a CD-ROM?

Network card

Optical drive

Video card

Solid state drive

A

Optical drive

129
Q

Which of the following applications would a user employ to write a business letter?

Spreadsheet software

Word processor

Desktop publishing

Presentation software

A

Word processor

130
Q

Which of the following is used for temporary storage of program data that is cleared when the computer is turned off?

CPU

SSD

Hard drive

System memory

A

System memory

131
Q

Which of the following internal components is used for temporary data storage in a workstation?

Power supply

CPU

RAM

Hard drive

A

RAM

132
Q

A website locks a users account after three unsuccessful login attempts. This precaution prevents which of the following?

Shoulder surfing

Phishing

Spam

Password cracking

A

Password cracking

133
Q

A user wants to update a driver for additional features. Where would the user find a current version of the driver from an official source?

Manufacturer’s CD/DVD that came with the computer

Manufacturer’s web site

Internet community support forums

Third-party support web sites

A

Manufacturer’s web site

134
Q

A technician wants to keep a router up to date. Which of the following MUST be updated regularly?

SSID

Adminstrator password

Wireless encryption

Firmware

A

Firmware

135
Q

A user has finished running the initial operating system setup wizard. Which of the following would be BEST for the user to do next?

Verify Internet connectivity

Install productivity software

Install security software

Add other user accounts

A

Install security software

136
Q

A user needs to establish an initial password for an email account. Which of the following is the BEST example of a complex password?

01#iWant!2686612338

iWantobeaCosmonau#

01c234n56789v9876x21

012iWanttobe210

A

01#iWant!2686612338

137
Q

Which of the following computer connector types was designed specifically for allowing high-speed external hard drive transfers?

DVI

USB

eSATA

HDMI

A

eSATA

138
Q

Which of the following ports can be used to connect an external hard drive to a computer?
(Select TWO).

MIDI

PS/2

eSATA

RJ-45

USB

RJ-11

A

eSATA

USB

139
Q

Joe, a user, has many applications on his computer and is trying to use software management best practices. Which of the following should he consider?

Install a desktop cleanup application

Uninstall unneeded applications

Load each appliaction one at a time

Manage the use of internal memory

A

Uninstall unneeded applications

140
Q

Which of the following is the primary goal in performing a backup verification?

Ensure backup data can be correctly restored

Prove the media has sufficient space for the data

Configue frequency of backups

Adhere to legal backup storage requirements

A

Ensure backup data can be correctly restored

141
Q

A user is accessing an online bank account for the first time via an Internet browser. Which of the following should the user check? (Select TWO).

HTTPS before the URL

Exclamation point on the status bar

Lock symbol in the address bar

HTTP before the URL

Skull/crossbones symbols in the corner

A

HTTPS before the URL

Lock symbol in the address bar

142
Q

Which of the following is the component responsible for interconnectivity of internal system devices?

System case

Power supply

Motherboard

Expansion card

A

Motherboard

143
Q

A technician is creating a WiFi network to which anyone can connect without entering a key. With which of the following should the technician configure the wireless network?

Shared

Open

WPS

WPA

A

Open

144
Q

Which of the following data connectivity options is the BEST to use when both high availability and reliability are required?

WiFi

Bluetooth

Cellular

Wired

A

Wired

145
Q

Which of the following functions can transfer a file between folders and deletes it from the original folder?

Edit

Move

Copy

Paste

A

Move

146
Q

A user is installing a new scanner on a computer. Which of the following MOST likely needs to be installed in order for this equipment to work?

License key

OS update

Firmware

Driver

A

Driver

147
Q

To increase security, which of the following is the BEST feature to disable on a mobile device when not in use?

Wireless

GPS

Network

NFC

A

NFC

148
Q

Which of the following data connection types provides the HIGHEST mobility?

WiFi

Cellular

Direct link

Wired

A

Cellular

149
Q

Which of the following keys should be pressed to enable access to various menus?

ALT

SHIFT

TAB

CTRL

A

ALT

150
Q

Which of the following system utilities allows a user to configure multiple monitors in the OS?

Color management

Device manager

GPU driver

Display

A

Display

151
Q

Joe, a user, reports that his neck and back are hurting after being at his desk for the whole day. Which of the following possible causes of the problem? (Select TWO).

The keyboard is not ergonomic

The monitor does not have a screen protector

The monitor height is not adjusted to Joe’s needs

Joe is not using a wrist rest with the keyboard

The chair is not properly adjusted to Joe’s needs

A

The monitor height is not adjusted to Joe’s needs

The chair is not properly adjusted to Joe’s needs

152
Q

Which of the following is MOST important to ensure a computer temperature is maintained within normal limits?

Maintaining constant power output

Ensuring sufficient airflow

Keeping the case open

Turning the wireless off when not needed

A

Ensuring sufficient airflow

153
Q

A user reports an inability to access the Internet on a new SOHO router. On further investigation, a technician notices that the wireless network is not visible. Which of the following is the MOST likely cause?

SSID broadcast is disabled

Wireless password has changed

Firmware update is required

WPA2 is enabled

A

SSID broadcast is disabled

154
Q

When setting up a new desktop which of the following should be performed FIRST?

Configure user accounts

Plug in cables

Install security software

Configure wireless network settings

A

Plug in cables

155
Q

A user has just removed a new desktop PC from the box and has plugged in several new peripheral devices. During which of the following steps will the plug and play peripheral devices be installed on the new PC?

Installing security software

Powering on for the first time

Booting the operating system

Adding additional user accounts

A

Booting the operating system

156
Q

Which of the following items require ESD precautions?

Upgrading to a new touch screen monitor

Adding a micro SD card to a smartphone

Installing an compact flash card into a laptop

Replacing RAM in a personal computer

A

Replacing RAM in a personal computer

157
Q

A user’s government identification number, birth date, and current address are considered which of the following?

IMAP

HTTP

PII

HTTPS

A

PII

158
Q

Which of the following is used for telepresence?

VoIP telephone

Webcam

Remote desktop

Touchscreen

A

Webcam

159
Q

Which of the following media has the highest possible availability?

Wired

WiFi

Cellular

Bluetooth

A

Wired

160
Q

Which of the following connectors supports both high definition video and audio?

S-video

Component

HDMI

DVI

A

HDMI

161
Q

Which of the following is considered an open-source operating system?

Windows

Chrome OS

Mac OS X

Linux

A

Linux

162
Q

Ann, a user, has an external monitor that will not turn on. Her laptop has activity lights and is plugged into the same power strip. Which of the following should be checked FIRST to begin troubleshooting this issue?

The power strip

The monitor video cable

The laptop power cable

The monitor power cable

A

The monitor power cable

163
Q

When setting up a new computer where does a user change the date and time?

Peripheral configuration

Localization settings

Screen resolution

eSATA settings

A

Localization settings

164
Q

Which of the following would be the MOST efficient way to transport a file from one location on a local hard drive to a different location on the same hard drive?

Rename

Cut

Move

Save

A

Move

165
Q

Which of the following security threats includes suspicious activity, such as reviewing someone’s screen display without permission?

Malware

Shoulder surfing

Phishing

Password cracking

A

Shoulder surfing

166
Q

Which of the following connectors is MOST often used to connect a computer to a network?

RJ-45

RJ-11

IDE

eSATA

A

RJ-45

167
Q

Which of the following data connections can span the FARTHEST distance?

WiFi

Dial-up

Satellite

Cable

A

Satellite

168
Q

Which of the following adds a basic security measure to a wireless device?

Hands-free headset

Screen lock feature

Airplane mode

Clip-on case

A

Screen lock feature

169
Q

Which of the following is the MOST secure password?

Have-A-Nice-Day

HAVE-A-NICE-DAY

have-a-nice-day12

hav3-@-Nic3-D@Y14

A

hav3-@-Nic3-D@Y14

170
Q

A user, Ann, calls the manufacturer of a software product she purchased, but is denied assistance because the product is no longer supported. Which of the following options is a BEST next choice?

P2P software sharing service

Original instruction manual

Online user forum

PC manufacturer’s website

A

Online user forum

171
Q

Ann, a user, is browsing shopping websites on the Internet when she receives a pop-up message on her screen indicating a virus has been detected by the antivirus software. Which of the following actions should be performed NEXT?

Ignore the message because it is likely adware

Run a scan on the entire local drive

Clear temporary files and folders

Minimize the alert and continue browsing the Internet

A

Run a scan on the entire local drive

172
Q

A technician needs to troubleshoot a users computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated?

Password confidentiality

Password compexity

Password reuse

Password expiration

A

Password confidentiality

173
Q

Which of the following is the BEST method of sharing files within a department?

Email

Flash drive

Network drive

Instant messaging

NFC

A

Network drive

174
Q

Which of the following is a common way to prevent physical theft of a laptop or workstation?

Shred any sensitive information to prior to disposal

Avoid storing passwords near the computer

Practice good awareness skills when entering passwords/PINs

Cable and lock device securely attached to a solid object

A

Cable and lock device securely attached to a solid object

175
Q

A user receives an email from the bank stating that the user needs to follow a link and re-enter login credentials due to recent security breaches. Based on best practices, which of the following actions should the user take? (Select TWO).

Inform the ISP

Follow the instructions

Delete the message

Reply to the email

Contact the bank

A

Delete the message

Contact the bank

176
Q

A user, Joe, wants to install an application on his computer. Which of the following factors should he be aware of before beginning?

The computer has the proper hard drive drivers installed

The computer is connected to a secure wireless network

Check for any updates for the application

The computer meets the application’s minimum requirements

A

The computer meets the application’s minimum requirements

177
Q

Which of the following should be done to reduce the risk of having sensitive passwords compromised while browsing the Internet?

Enable software firewalls to block unknown ports

Disable autofill of forms and passwords

Enable screensavers and time-outs on the computer

Use ad-blocking software on the computer

A

Disable autofill of forms and passwords

178
Q

Which of the following is used with a touch screen to increase accuracy?

Touchpad

Stylus pen

Joystick

Trackball

A

Stylus pen

179
Q

Which of the following BEST describes malicious software that demands the end-user pay a fee or face the destruction of their files?

Trojan

Virus

Spyware

Ransomware

A

Ransomware

180
Q

Which of the following should be done to reduce physical safety hazards around a newly installed computer?

Verify all connections are seated properly

Avoid placing other computers nearby

Bundle loose cables with zip ties or Velcro straps

Attach all peripherals to the computer

A

Bundle loose cables with zip ties or Velcro straps

181
Q

A user wants to run a major update on a laptop. Which of the following should be considered before running any major updates?

Restore folders from back up

Change administrator account password

Back up important folders

Print all personal documents

A

Back up important folders

182
Q

The manufacturer of a SOHO router has released a security fix for the router. Which of the following methods should be used to apply the fix?

Change the admin password

Apply the WEP key

Update the firmware

Hold the reset button

A

Update the firmware

183
Q

Which of the following methods are MOST likely used to reduce the internal temperature of a computer? (Select TWO).

Install a protective cover

Reduce display brightness

Air circulation

Electronic recycling

Liquid cooling

A

Air circulation

Liquid cooling

184
Q

Which of the following technologies would allow a user to run multiple operating systems at the same time on a single computer?

Telepresence

Cloud-based software

Virtualization software

Productivity software

A

Virtualization software

185
Q

An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?

LTE

GSM

VoIP

CDMA

A

VoIP

186
Q

Which of the following are reasons to verify backups? (Select TWO).

To create a system image for easy restore

To confirm all selected data was backed up

To diagnose any backup media hardware failure

To determine if backup software needs to be patched

To ensure files can be restored

A

To confirm all selected data was backed up

To ensure files can be restored

187
Q

Which of the following storage media provides the FASTEST speeds when backing up large data files?

Offsite storage

Network-attached storage

Locally attached storage

Cloud-based storage

A

Locally attached storage

188
Q

When storing a document in the cloud, a user needs to be:

On a shared drive

Using a USB cable

Connected to the Internet

In airplane mode

A

Connected to the Internet

189
Q

Which of the following storage methods is MOST likely used in corporate settings to save large amounts of data in a secured manner?

HTTP

HTTPS

FTPS

FTP

A

FTPS

190
Q

A user receives an email containing a link. When they hover the mouse over the link, the actual URL does not match the text in the body of the email and appears to be a string of random characters. Which of the following is the BEST course of action?

Forward the email to a friend to ask for advice

Reply to the sender asking for confirmation that is safe to open

Delete the email without clicking on the link

Click the link because malware protection software is installed on the computer

A

Delete the email without clicking on the link

191
Q

Which of the following are core peripherals needed to use a desktop PC? (Select THREE).

Monitor

Keyboard

Printer

Mouse

Speakers

Mouse pad

A

Monitor

Keyboard

Mouse

192
Q

Joe, a user, is setting up a new computer and wants to minimize the risk of a malicious software infection over the network. Which of the following should be configured on the new computer? (Select THREE).

Password policies

Multiple user accounts

Software firewall

Driver updates

Operating system updates

Anti-malware software

A

Software firewall

Operating system updates

Anti-malware software

193
Q

A student wishes to share contacts with another students mobile device. Which of the following would be the easiest method to use?

Network-attached storage

Bluetooth sharing

Local hard drive

Peer-to-Peer network

A

Bluetooth sharing

194
Q

A user with an outdated operating system is consistently browsing sensitive websites such as banking, email, and corporate intranets. The Internet browser of choice is one that has already lost patch support and is not updated anymore. Which of the following actions will remedy this situation?

Uninstall all unused browser extensions and toolbars to help reduce risks

Convert the user’s account to an admin-level account, to provide better overall security

Move to an alternate browser that still has consistent security update support

Install multiple anti-malware and firewall products to harden the computing experience

A

Move to an alternate browser that still has consistent security update support

195
Q

Which of the following commands is used to view the contents of a file?

Save

Open

Copy

Move

A

Open

196
Q

Which of the following video connections provides the highest resolution?

USB

S-video

HDMI

VGA

A

HDMI

197
Q

Which of the following software types BEST facilitates collaboration?

Personal information manager

Video editing software

Instant messaging software

CAD software

A

Instant messaging software

198
Q

Which of the following is a benefit of setting up a computer to receive automatic updates from the OS vendor?

Arranges the hard drive files in order

Restores missing files that were lost or deleted

Keeps the software current and applies security patches

Provides the latest virus definitions to keep the compuer safe

A

Keeps the software current and applies security patches

199
Q

An end-user has 16GB of RAM installed on a computer system. Which of the following describes why the OS only uses a maximum of 4GB of RAM?

The operating system is 16-bit

The computer has corrupted RAM

The computer has a defective motherboard

The operating system is 32-bit

The computer has a virus

A

The operating system is 32-bit

200
Q

Which of the following application types is MOST often used for doing a mail merge?

PDF software

Word processor

Presentation software

Personal information manager

A

Word processor

201
Q

Which of the following are examples of video connectors? (Select TWO).

VGA

Serial

HDMI

eSATA

PS.2

A

VGA

HDMI

202
Q

Which of the following devices transmits and receives printed images over a telephone line?

Monitor

Fax

Scanner

Webcam

A

Fax

203
Q

Which of the following file types is use to consolidate a group of files?

.rtf

.m3u

.avi

.rar

A

.rar

204
Q

Which of the following extension types are associated with document files? (Select THREE).

.txt

.odf

.msi

.rft

.mp3

.tar

A

.txt

.msi

.rft

205
Q

A user purchases a new desktop computer and requires assistance setting it up. Which of the following describes the BEST resource the user should reference?

Technical community group

Local retail store technical

Internet search engine

Manufacturer documentation

A

Manufacturer documentation

206
Q

Which of the following describes the difference between open source and commercial operating systems?

Open-source operating systems only run on desktop computers whereas commercial operating systems run on servers

Open-source operating systems run on standard and non-standard hardware, whereas commercial operating systems only run on specific hardware

Open-source operating systems can be downloaded and used by everyone, whereas commercial operating systems can only be used by companies

Open-source operating systems are usually provided free of charge, whereas most commercial operating systems are usually provided at some cost

A

Open-source operating systems are usually provided free of charge, whereas most commercial operating systems are usually provided at some cost

207
Q

To reduce the risk of installing unapproved or possibly malicious apps on a smartphone, a user should:

Download apps from a user-supports community

Use a search engine to identify safe apps

Update the firmware to the latest version

Utilize the vendor-provided app store

A

Utilize the vendor-provided app store

208
Q

A printer is migrated between offices. All the wires are connected properly, but the new workstation cannot find the printer. Which of the following should the technician install?

OS

Updates

Drivers

Application

A

Drivers

209
Q

A technician is setting up a router and would like to increase the security level. Which of the following actions will achieve this?

Installing anti-malware on the router

Changing the default admin password

Increasing transmission power

Configuring multifactor logon authentication

A

Changing the default admin password

210
Q

Which of the following is the BEST reason to change a wireless router’s default SSID?

To make it easier to identify in a location with several routers

To make the network feel more personal

To make it more difficult to join

To make the network secure

A

To make it easier to identify in a location with several routers

211
Q

Which of the following software is used to reduce the size of the file or folder?

Desktop publishing

Basic database

Compression

Anti-malware

A

Compression

212
Q

A user is updating a website. Which of the following protocols will provide the MOST security when uploading the files?

FTPS

FTP

SMTP

HTTP

SNMP

A

FTPS

213
Q

Which of the following storage methods provides the HIGHEST redundancy and availability?

Cloud-based storage

Storage Area Network

Locally attached storage

Network Attached Storage

A

Cloud-based storage

214
Q

Which of the following are types of access control attacks?
Each correct answer represents a complete solution. Choose all that apply.

Brute force attack

Mail bombing

Spoofing

Dictionary attack

A

Brute force attack

Mail bombing

Spoofing

215
Q

Which of the following is the bandwidth of an SCSI Ultra2 Wide I/O port?

50 MBps

160 MBps

320 MBps

80 MBps

A

80 MBps

216
Q

Which of the following actions can a technician take to reduce the chances of static charges being built up? Each correct answer represents a complete solution. Choose three.

Wear silken clothes

Do not wear wrist strap

Remove carpets from computer rooms

Wear cotton clothes

Increase humidity level

A

Remove carpets from computer rooms

Wear cotton clothes

Increase humidity level

217
Q

You work as a computer technician. When you start your computer, you find that the computer’s CMOS battery has failed. You replace the CMOS battery. What will be your next step after replacing the CMOS battery?

Run the DEFRAG utility

Create a partition on the hard disk drive

Run the SCANDISK utility

Reboot the computer and set the date and time

A

Reboot the computer and set the date and time

218
Q

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows-based network. You do maintenance work on a Windows 2000 Professional computer. You require to perform the following jobs:
Exhaustive disk checking.
Locate bad sectors (if any).
Recover readable information.
Which of the following commands will you use to accomplish the task?

CHKDSK /v
CHKDSK /i
CHKDSK /f
CHKDSK /r

A

CHKDSK /r

219
Q

You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file and folder encryption. Which file system should you use when installing Windows XP?

FAT

EXT4

FAT32

NTFS

A

NTFS

220
Q

Which of the following DB-style connectors are used by SCSI-2 drive interface standard? Each correct answer represents a complete solution? Choose three.

40-pin female

25-pin female

68-pin female

50-pin female

A

25-pin female

68-pin female

50-pin female

221
Q

Which of the following are removable storage devices/media? Each correct answer represents a complet solution. Choose three.

CD-ROM

SD card

Hard disk drive

USB Pen drive

A

CD-ROM

SD card

USB Pen drive

222
Q

Which of the following uses a shorter wavelength and allows for almost six times more data storage than on a DVD?

Blu-ray Disc

Digital Linear Tape (DLT)

Bluetooth

Blue Jacking

A

Blu-ray Disc

223
Q

Which of the following SCSI types use 16-bit bus? Choose 2.

Fast Wide SCSI-2

Double Wide SCSI-2

Fast SCSI-2

Wide SCSI-2

Ultra-2 SCSI (Fast 40)

A

Fast Wide SCSI-2

Wide SCSI-2

224
Q

Which of the following firewalls inspects the actual contents of packets?

Packet filtering firewall

Application-level firewall

Circuit-level firewall

Stateful inspection firewall

A

Application-level firewall

225
Q

Which of the following protocols is widely used for setting up and tearing down multimedia communication sessions such as voice and video calls over the Internet (VoIP)?

LDAP

ICMP

UDP

SIP

A

SIP

226
Q

Which of the following technologies can be used to encrypt the wireless networks? Each correct answer represents a complete solution. Choose two.

WAP

Kerberos

WEP

WPA

A

WEP

WPA

227
Q

Which of the following statements about the DVI-D connector are true? Each correct answer represents a complete solution. Choose three.

It is used for only digital signal connections

Its single link connector contains 18 pins

It is used for both digital and analog signal connections

Its dual link connector contains 24 pins

A

It is used for only digital signal connections

Its single link connector contains 18 pins

Its dual link connector contains 24 pins

228
Q

Which of the following is a program initially designed to prevent phosphor burn-in on CRT and plasma computer monitors?

Screensaver

Monitor saver

Debugger

Spider

A

Screensaver

229
Q

Which of the following is a framework for defining reusable software components that perform a particular function or a set of functions in Microsoft Windows?

SSID

ActiveX

Cookies

JavaScript

A

ActiveX

230
Q

Which of the following file attributes are not available on a FAT32 partition? Each correct answer represents a complete solution. Choose two

Compression

Archive

Hidden

Encryption

Read Only

A

Compression

Encryption

231
Q

You are selecting memory to put into a laptop. Which of the following types of RAM chips would most likely select?

144 PIN

72 PIN

240 PIN

184 PIN

A

144 PIN

232
Q

You are responsible for the laptops used by travelling sales people in your company. These laptops all use Windows XP. You want the machines to go to a lower power state when they have been inactive for more than 10 minutes and are running on battery. The sales people complain that when their laptops go inactive they want them to return to active state very quickly. Which low power state should you use?

Low Power

Sleep

Standby

Hibernate

A

Standby

233
Q

Which of the following protocols provides an encryption by using the Temporal Key Integrity Protocol (TKIP)?

EAP

WEP

IPSec

WPA

A

WPA

234
Q

Which of the following devices has a 15-pin 3 row connector?

Joystick port

VGA monitor

Parallel port

Serial port

A

VGA monitor

235
Q

You need to select a laptop for a traveling salesman. He will really need to stretch the battery life as long as possible so he wants low power options wherever possible. Which type of monitor should you select?

LCD

CRT

Active Matrix

Passsive Matrix

A

Passive Matrix

236
Q

Which of the following do not support encrypted data transmission?

Ethernet devices

Infrared devices

WiFi devices

Bluetooth devices

A

Infrared devices

237
Q

Which of the following does the image denote?

          I
          I
          I
\_\_\_\_\_\_\_\_\_\_
   \_\_\_\_\_\_\_
     \_\_\_\_\_
       \_\_\_

Ground

Capacitor

Resistor

Terminator

A

Ground

238
Q

You have an older Windows 98 computer. You wish to upgrade to Windows Vista Home Basic. What must you do?

First upgrade to Windows 2000 then upgrade to Vista Home Basic

First upgrade to Windows XP Pro, then upgrade to Vista Home Basic

Simply buy and install the Windows Vista Home Basic Upgrade

First upgrade to Windows XP Home, then upgrade to Vista Home Basic

A

First upgrade to Windows XP Home, then upgrade to Vista Home Basic

239
Q

Which of the following is the lightest but most expensive battery used in laptops?

NiMH

NiCad

Li-Ion

Sodium-Ion

A

Li-Ion

240
Q

Which of the following types of fire extinguishers are needed for combustible liquids’ fire such as gasoline and kerosene?

Class C

Class B

Class D

Class A

A

Class B

241
Q

Which of the following statements about Hardware Compatibility List (HCL) are true? Each correct answer represents a part of the solution. Choose two.

It ensures that a computer and its components are compatible with the operating system before the operating system is installed

It contains the listing of all the hardware that operating systems vendors have tested with their operating systems

It ensures that a computer and its components are working properly

It contains the license to use operating systems

A

It ensures that a computer and its components are compatible with the operating system before the operating system is installed

It contains the listing of all the hardware that operating systems vendors have tested with their operating systems

242
Q

Mark purchases a new computer and installs the Windows 2000 Professional operating system on it. He wants to connect the computer to the Internet. Which of the following actions can he take to protect his computer from unauthorized access, adware, and malware? Each correct answer represents a complete solution. Choose two.

Configure a firewall on the computer

Configure auditing on the computer

Set hidden attributes on his important files

Install all the service packs available for the operating system

A

Configure a firewall on the computer

Install all the service packs available for the operating system

243
Q

Which of the following devices does SCSI support? Each correct answer represents a complete solution. Choose all that apply.

Tape drive

Sound card

CD drive

Modem

Hard disk drive

A

Tape drive

CD drive

244
Q

Which of the following standard displays is commonly used on 14 inch or 15 inch laptop LCD screens with a resolution of 1400 x 1050 pixels?

SXGA+

UXGA

WUXGA

SXGA

A

SXGA+

245
Q

Which of the following display standards has a resolution of 1400 x 1050 pixels?

XGA

UXGA

SXGA+

WUXGA

A

SXGA+

246
Q

Which of the following statements about High-Definition Multimedia Interface (HDMI) are true? Each correct answer represents a complete solution. Choose two.

It is capable of delivering the highest quality digital video and multi-channel digital audio on a single cable

It is an interface primarily used to connect hard disk and CD drives in a computer

It is a new I/O bus technology that has more bandwidth than PCI and AGP slots

It has two types of connectors: Type A and Type B

A

It is capable of delivering the highest quality digital video and multi-channel digital audio on a single cable

It has two types of connectors: Type A and Type B

247
Q

You are trying to select a particular wireless encryption algorithm. You are concerned that it implements as much of the wireless 802.11i standard as possible. Which encryption algorithm should you implement?

WEP2

WPA2

WPA

WEP

A

WPA2

248
Q

Which of the following interfaces is the current standard for digital LCD monitors?

DVE

SVGA

DVI

VGA

A

DVI

249
Q

Which of the following are touch screen technologies? Each correct answer represents a complet solution? Choose all that apply?

Surface Wave

Resistive

Transitive

Capacitive

A

Surface Wave

Resistive

Capacitive

250
Q

Which of the following statements about Bluetooth are true? Each correct answer represents a complete solution. Choose two.

It forms a network whenever two Bluetooth devices come within a range of ten meters

It has a maximum transmission range of 200 meters

It does not require a line-of-sight connection between devices

It requires a line-of-sight connection between devices

A

It forms a network whenever two Bluetooth devices come within a range of ten meters

It does not require a line-of-sight connection between devices

251
Q

Which of the following statements about Standby Power Supply (SPS) is true? Each correct answer represents a complete solution. Choose two.

It provides protection against power surges

It provides protection against power drops and power surges

It provides no protection against power surges

It provides protection against under voltage

A

It provides no protection against power surges

It provides protection against under voltage

252
Q

Which of the following internal busses are used for expansion cards? Each correct answer represents a complete solution. Choose all that apply.

PCI

SATA

PCI Express

ISA

A

PCI

PCI Express

ISA

253
Q

Which of the following types of batteries are used by toys and watches?

Silver oxide

Zinc-air

Lead-acid

Silver lead

A

Silver oxide

254
Q

Which of the following are a form of online advertising on World Wide Web intended to attract Web traffic or capture email addresses?

Pop-ups

Signed script policy:

Cookies

Java applet

A

Pop-ups

255
Q

Which of the following types of SATA hard disk drives is used for the Desktop computers?

  1. 5 inches
  2. 2 inches
  3. 8 inches
  4. 5 inches
A

3.5 inches

256
Q

Which of the following hardware uses flash memory technology?

PCMCIA card

Smart card reader

Secure digital card

DDR2 SDRAM

A

Secure digital card

257
Q

Which of the following are types of Random Access Memory (RAM)? Each correct answer represents a complete solution. Choose all that apply.

EDO RAM

DRAM

SRAM

VRAM

NRAM

A

EDO RAM

DRAM

VRAM

258
Q

Which of the following statements is true about the installation of Universal Serial Bus (USB) devices?

A USB device can be plugged to a computer without restarting it

A computer has to be restarted to install a USB device

USB devices are non-Plug and Play

Software drivers are not required for USB devices.

A

A USB device can be plugged to a computer without restarting it

259
Q

Under which environmental conditions is the risk of Electrostatic discharge (ESD) the highest?

Low temperature

High humidity

Low humidity

High temperature

A

Low humidity

260
Q

How many pins are available on a PS/2 Mini-DIN connector?

5

4

6

3

A

6

261
Q

Rick works as your assistant. He is configuring a computer running Windows XP Professional to connect to a network. He needs to get IP information in the command prompt. He asks you about the usage and brief description of various switches used with a command. Which of the following command switches will you suggest that he use to get the required information of the command?

[command] /&It;

[command] /+

[command] />

[command] /?

A

[command] /?

262
Q

You have a 2,8 Ghz Pentium 4 desktop computer running Windows 2000 Server operating system. You want to disable the hyper-threading on the computer. How will you disable the hyper-threading on the computer?

Disable hyper-threading from the Computer Management utility

Disable hyper-threading using jumper setting on the motherboard

Disable hyper-threading from the Device Manager utility

Disable hyper-threading from the Basic Input/Output System (BIOS)

A

Disable hyper-threading from the Basic Input/Output System (BIOS)

263
Q

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Demilitarized zone (DMZ)

Firewall

Intrusion detection system (IDS)

Packet filtering

A

Intrusion detection system (IDS)

264
Q

What is the display resolution of the WUXGA standard?

1024 x 768 pixels

1280 x 1024 pixels

1920 x 1200 pixels

1600 x 1200 pixels

A

1920 x 1200 pixels

265
Q

You are responsible for purchasing computer hardware for a school district. You have been looking at various sales brochures advocating various types of memory. What would be one advantage to buying dual-channel memory?

It will reduce memory bottlenecks

It will be twice as fast as single channel memory

It has no advantage over single channel memory

It will have more memory capacity than single channel memory

A

It will reduce memory bottlenecks

266
Q

Which type of memory chip has 168 pins?

DMA

DIMM

DIP

SIMM

A

DIMM

267
Q

Which of the following types of batteries are considered as environmental hazards? Each correct answer represents a complete solution. Choose three.

Button cell

Lead-acid

NiMH

NiCd

A

Button cell

Lead-acid

NiCd

268
Q

Which of the following slots on a motherboard are best for a video card? Each correct answer represents a complete solution. Choose two.

PCIe

PCI

AGP

EISA

A

PCIe

AGP

269
Q

Which of the following are used by FireWire 800 devices?

6-pin connectors

10-pin connectors

9-pin connectors

4-pin connectors

A

9-pin connectors

270
Q

Rick works as a Network Administrator for Company Inc. He takes a backup of some important compressed files on an NTFS partition, using the Windows 2000 Backup utility. Rick restores these files in a FAT32 partition. He finds that the restored files do not have the compression attribute. What is the most likely cause?

The FAT32 partition is corrupt and requires to be reformatted

A FAT32 partition does not support compression

The Windows 2000 Backup utility decompresses files while taking a backup

The backup of files that are saved on an NTFS partition cannot be restored in a FAT32 partition

A

A FAT32 partition does not support compression

271
Q

Which of the following statements about a docking station are true? Each correct answer represents a complete solution. Choose two.

It allows a laptop to connect to desktop I/O devices such as full-sized keyboards, CRT monitors, etc

Docking station is also known as a workstation

It is a large circuit board found in a computer on which a CPU is mounted

It is a specialized case into which an entire laptop can be inserted

A

It allows a laptop to connect to desktop I/O devices such as full-sized keyboards, CRT monitors, etc

It is a specialized case into which an entire laptop can be inserted

272
Q

You are responsible for technical support at a hospital. Recently, all computers have been upgraded to Windows Vista 64 bit. However, you have a particular custom application that runs only in 32 bit. What should you do?

You will have to uninstall the upgraded operating system

Use compatibility mode to run the 32-bit application

You will need a 32-bit version of Vista, not 64-bit

You will need to get the upgraded 64-bit version of the application

A

Use compatibility mode to run the 32-bit application

273
Q

Which of the following cache levels are implemented on microprocessors? Each correct answer represents a complete solution. Choose two.

Level 0 (L0) cache

Level 1 (L1) cache

Level 5 (L5) cache

Level 2 (L2) cache

A

Level 1 (L1) cache

Level 2 (L2) cache

274
Q

Your Windows XP hard drive has 2 partitions. The system partition is NTFS and the other is FAT. You wish to encrypt a folder created on a system partition for the purpose of data security. Which of the following statements is true about this situation?

Since the operating system is on the NTFS partition, you can encrypt files on both

You can only encrypt files on the FAT partition

You can only encrypt files on the NTFS partition

You cannot encrypt files on either partition

A

You can only encrypt files on the NTFS partition

275
Q

How many devices can be connected to an IEEE 1394 port?

63

127

256

1

A

63

276
Q

Which of the following wireless standards has a transmission speed of up to 720 kbpps?

Infrared

Bluetooth

IEEE 802.11a

WiFi

A

Bluetooth

277
Q

Which of the following is a fake target that deters hackers from locating your real network?

Honeypot

KFSensor

Malware

Spyware

A

Honeypot

278
Q

Which of the following ports support hot swapping? Each correct answer represents a complete solution. Choose two.

USB

Parallel

Serial

IEEE 1394

A

USB

IEEE 1394

279
Q

Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?

Password guessing attack

Spoofing

Phishing

Replay attack

A

Phishing

280
Q

Your customer is using Windows Vista and complains about the quality of picture he is getting on his monitor. You find that you cannot adjust the refresh rate or the resolution. What is the most likely cause?

The video card is not recognized by Windows

The monitor is not compatible with the video card

The video card has failed

The video card does not have enough video RAM

A

The video card is not recognized by Windows

281
Q

Which of the following will you use to clean your laptop screen? Each correct answer represents a complete colution. Choose two.

Detergent

Slightly wet and soft cloth

Rough cloth

LCD screen cleaner

A

Slightly wet and soft cloth

LCD screen cleaner

282
Q

What is the maximum resolution that SXGA video technology supports?

2560 x 1600

1024 x 768

1280 x 1024

1280 x 720

A

1280 x 1024

283
Q

Which of the following typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet?

Thin client

Cloud computing

Application Virtualization

Terminal services

A

Cloud computing