Practice test #6 Flashcards

Mixed questions (95 cards)

1
Q
QUESTION NO: 119
A user has finished running the initial operating system setup wizard. Which of the following would
be BEST for the user to do next?
A.
Verify Internet connectivity
B.
Install productivity software
C.
Install security software
D.
Add other user accounts
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
QUESTION NO: 120
Which of the following technologies would allow a user to run multiple operating systems at the
same time on a single computer?
A.
Telepresence
B.
Cloud-based software
C.
Virtualization software
D.
Productivity software
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION NO: 121
A user wants to update a driver for additional features. Where would the user find a current
version of the driver from an official source?
A.
Manufacturer’s CD/DVD that came with the computer
B.
Manufacturer’s web site
C.
Internet community support forums
D.
Third-party support web sites

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QUESTION NO: 122
Which of the following should be done to reduce physical safety hazards around a newly installed
computer?
A.
Verify all connections are seated properly.
B.
Avoid placing other computers nearby.
C.
Bundle loose cables with zip ties or Velcro straps.
D.
Attach all peripherals to the computer

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QUESTION NO: 123
A user with an outdated operating system is consistently browsing sensitive websites such as
banking, email, and corporate intranets. The Internet browser of choice is one that has already lost
patch support and is not updated anymore. Which of the following actions will remedy this
situation?
A.
Uninstall all unused browser extensions and toolbars to help reduce risks.
B.
Convert the user’s account to an admin level account, to provide better overall security.
C.
Move to an alternate browser that still has consistent security update support.
D.
Install multiple anti-malware and firewall products to harden the computing experience.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
QUESTION NO: 124
Which of the following connectors is MOST often used to connect a computer to a network?
A.
RJ-45
B.
RJ-11
C.
IDE
D.
eSATA
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
QUESTION NO: 125
A user is installing a new scanner on a computer. Which of the following MOST likely needs to be
installed in order for this equipment to work?
A.
License key
B.
OS update
C.
Firmware
D.
Driver
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
QUESTION NO: 126
Which of the following software is used to reduce the size of a file or folder?
A.
Desktop publishing
B.
Basic database
C.
Compression
D.
Anti-malware
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
QUESTION NO: 127
Which of the following is used with a touch screen to increase accuracy?
A.
Touchpad
B.
Stylus pen
C.
Joystick
D.
Trackball
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
QUESTION NO: 128
Which of the following internal components is used for temporary data storage in a workstation?
A.
Power supply
B.
CPU
C.
RAM
D.
Hard drive
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
QUESTION NO: 129
Which of the following is used for temporary storage of program data that is cleared when the
computer is turned off?
A.
CPU
B.
SSD
C.
Hard drive
D.
System memory
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
QUESTION NO: 130
Which of the following connectors supports both high definition video and audio?
A.
S-video
B.
Component
C.
HDMI
D.
DVI
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
QUESTION NO: 131
Which of the following BEST describes malicious software that demands the end-user pay a fee or
face the destruction of their files?
A.
Trojan
B.
Virus
C.
Spyware
D.
Ransomware
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

QUESTION NO: 132
Which of the following should be done to reduce the risk of having sensitive passwords
compromised while browsing the Internet?
A.
Enable software firewalls to block unknown ports
B.
Disable autofill of forms and passwords
C.
Enable screensavers and time-outs on the computer
D.
Use ad-blocking software on the computer

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
QUESTION NO: 133
Which of the following would be the MOST efficient way to transport a file from one location on a
local hard drive to a different location on the same hard drive?
A.
Rename
B.
Cut
C.
Move
D.
Save
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QUESTION NO: 134
A student wishes to share contacts with another student’s mobile device. Which of the following

would be the easiest method to use?
A.
Network attached storage
B.
Bluetooth sharing
C.
Local hard drive
D.
Peer-to-Peer network
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
QUESTION NO: 135
When setting up a new desktop, which of the following should be performed FIRST?
A.
Configure user accounts
B.
Plug in cables
C.
Install security software
D.
Configure wireless network settings
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

QUESTION NO: 136
A user, Joe, wants to install an application on his computer. Which of the following factors should
he be aware of before beginning?

A.
The computer has the proper hard drive drivers installed.
B.
The computer is connected to a secure wireless network.
C.
Check for any updates for the application.
D.
The computer meets the application’s minimum requirements

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
QUESTION NO: 137
Which of the following applications would a user employ to write a business letter?
A.
Spreadsheet software
B.
Word processor
C.
Desktop publishing
D.
Presentation software
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
QUESTION NO: 138
Which of the following devices transmits and receives printed images over a telephone line?
A.
Monitor
B.
Fax
C.
Scanner
D.
Webcam
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
QUESTION NO: 139
Which of the following video connections provides the highest resolution?
A.
USB
B.
S-video
C.
HDMI
D.
VGA
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

QUESTION NO: 140
A user receives an email containing a link. When they hover the mouse over the link, the actual
URL does not match the text in the body of the email and appears to be a string of random
characters. Which of the following is the BEST course of action?
A.
Forward the email to a friend to ask for advice.
B.
Reply to the sender asking for confirmation that it is safe to open.
C.
Delete the email without clicking on the link.
D.
Click the link because malware protection software is installed on the computer.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
QUESTION NO: 141
Which of the following is the BEST reason to change a wireless router’s default SSID?
A.
To make it easier to identify in a location with several routers.
B.
To make the network feel more personal.
C.
To make it more difficult to join.
D.
To make the network secure.
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
QUESTION NO: 142
A user, Joe, is concerned about the safety of his personal information on a website. Which of the
following can Joe look for to ensure that his personal information is not at risk? (Select TWO).
A.
HTTP on the browser address bar
B.
Suspicious ads in the browser
C.
HTTPS on the browser address bar
D.
A lock symbol on the browser address bar
E.
The word secure in the browser address bar
A

Answer: C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
``` QUESTION NO: 143 Which of the following data connection types provides the HIGHEST mobility? A. WiFi B. Cellular C. Direct link D. Wired ```
Answer: B
26
``` QUESTION NO: 144 Which of the following items require ESD precautions? A. Upgrading to a new touch screen monitor B. Adding a micro SD card to a smartphone C. Installing an compact flash card into a laptop D. Replacing RAM in a personal computer ```
Answer: D
27
QUESTION NO: 145 Which of the following are reasons to verify backups? (Select TWO). A. To create a system image for easy restore B. To confirm all selected data was backed up C. To diagnose any backup media hardware failure D. To determine if backup software needs to be patched E. To ensure files can be restored
Answer: B,E
28
``` QUESTION NO: 146 A user has just removed a new desktop PC from the box and has plugged in several new peripheral devices. During which of the following steps will the plug and play peripheral devices be installed on the new PC? A. Installing security software B. Powering on for the first time C. Booting the operating system D. Adding additional user accounts ```
Answer: C
29
``` QUESTION NO: 147 Which of the following is the BEST method of sharing files within a department? A. Email B. Flash drive C. Network drive D. Instant messaging E. NFC ```
Answer: C
30
``` QUESTION NO: 148 When storing a document in the cloud, a user needs to be: A. On a shared drive. B. Using a USB cable. C. Connected to the Internet. D. In airplane mode. ```
Answer: C
31
``` QUESTION NO: 149 Which of the following device types is needed within a computer to read information on a CDROM? A. Network card B. Optical drive C. Video card D. Solid state drive ```
Answer: B
32
``` QUESTION NO: 150 Which of the following ports can be used to connect an external hard drive to a computer? (Select TWO). A. MIDI B. PS/2 C. eSATA D. RJ-45 E. USB F. RJ-11 ```
Answer: C,E
33
``` QUESTION NO: 151 Which of the following is considered an open-source operating system? A. Windows B. Chrome OS C. Mac OS X D. Linux ```
Answer: D
34
``` QUESTION NO: 152 A technician wants to keep a router up to date. Which of the following MUST be updated regularly? A. SSID B. Administrator password C. Wireless encryption D. Firmware ```
Answer: D
35
``` QUESTION NO: 153 The extension .rtf is an example of which of the following file types? A. Document B. Executable C. Audio D. Speadsheet ```
Answer: A
36
``` QUESTION NO: 154 Which of the following are examples of video connectors? (Select TWO). A. VGA B. Serial C. HDMI D. eSATA E. PS/2 ```
Answer: A,C
37
``` QUESTION NO: 155 When setting up a new computer, where does a user change the date and time? A. Peripheral configuration B. Localization settings C. Screen resolution D. eSATA settings ```
Answer: B
38
``` QUESTION NO: 156 A user wants to have the latest security patches and bug fixes installed on a computer. Which of the following is the BEST method to achieve this? A. Configure anti-malware updates B. Manually update before each use C. Update every six months D. Schedule automatic updates Answer: D ```
Answer: D
39
``` QUESTION NO: 157 A user is accessing an online bank account for the first time via an Internet browser. Which of the following should the user check? (Select TWO). A. HTTPS before the URL B. Exclamation point on the status bar C. Lock symbol in the address bar D. HTTP before the URL E. Skull/crossbones symbol in the corner ```
Answer: A,C
40
``` QUESTION NO: 158 Which of the following CPU cooling types is BEST in a dusty environment? A. Liquid cooling B. Open case C. Case fan D. Heat sink fan ```
Answer: A
41
QUESTION NO: 159 To reduce the risk of installing unapproved or possibly malicious apps on a smartphone, a user should: A. Download apps from a user-supported community. B. Use a search engine to identify safe apps. C. Update the firmware to the latest version. D. Utilize the vendor-provided app store.
Answer: D
42
``` QUESTION NO: 160 Which of the following computer connector types was designed specifically for allowing high-speed external hard drive transfers? A. DVI B. USB C. eSATA D. HDMI ```
Answer: C
43
QUESTION NO: 161 Which of the following is a common way to prevent physical theft of a laptop or workstation? A. Shred any sensitive information to prior to disposal. B. Avoid storing passwords near the computer. C. Practice good awareness skills when entering passwords/PINs. D. Cable and lock device securely attached to a solid object
Answer: D
44
QUESTION NO: 162 Ann, a user, is browsing shopping websites on the Internet when she receives a pop-up message on her screen indicating a virus has been detected by the antivirus software. Which of the following actions should be performed NEXT? A. Ignore the message because it is likely adware. B. Run a scan on the entire local drive. C. Clear temporary files and folders. D. Minimize the alert and continue browsing the Internet.
Answer: B
45
``` QUESTION NO: 163 A technician needs to troubleshoot a user’s computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated? A. Password confidentiality B. Password complexity C. Password reuse D. Password expiration ```
Answer: A
46
``` QUESTION NO: 164 Joe, a user, has many applications on his computer and is trying to use software management best practices. Which of the following should he consider? A. Install a desktop cleanup application. B. Uninstall unneeded applications. C. Load each application one at a time. D. Manage the use of internal memory ```
Answer: B
47
``` QUESTION NO: 165 A user's government identification number, birth date, and current address are considered which of the following? A. IMAP B. HTTP C. PII D. HTTPS ```
Answer: C
48
``` QUESTION NO: 166 A user, Ann, calls the manufacturer of a software product she purchased, but is denied assistance because the product is no longer supported. Which of the following options is a BEST next choice? A. P2P software sharing service B. Original instruction manual C. Online user forum D. PC manufacturer's website ```
Answer: C
49
``` QUESTION NO: 167 Which of the following software types BEST facilitates collaboration? A. Personal information manager B. Video editing software C. Instant messaging software D. CAD software ```
Answer: C
50
``` QUESTION NO: 168 To increase security, which of the following is the BEST feature to disable on a mobile device when not in use? A. Wireless B. GPS C. Network D. NFC ```
Answer: D
51
``` QUESTION NO: 169 Which of the following data connectivity options is the BEST to use when both high availability and reliability are required? A. WiFi B. Bluetooth C. Cellular D. Wired ```
Answer: D
52
``` QUESTION NO: 170 A technician has added an external hard drive to a personal computer. The hard drive is powered on, but the computer does not see the new hard disk. Which of the following is the FIRST thing the technician should check? A. The power cable B. The OS version for compatibility C. The hard drive firmware revision D. The data cable ```
Answer: D
53
``` QUESTION NO: 171 Which of the following is the MOST secure password? A. Have-A-Nice-Day B. HAVE-A-NICE-DAY C. have-a-nice-day12 D. hav3-@-Nic3-D@Y14 ```
Answer: D
54
``` QUESTION NO: 172 A user is updating a website. Which of the following protocols will provide the MOST security when uploading the files? A. FTPS B. FTP C. SMTP D. HTTP E. SNMP ```
Answer: A
55
``` QUESTION NO: 173 A website locks a user’s account after three unsuccessful login attempts. This precaution prevents which of the following? A. Shoulder surfing B. Phishing C. Spam D. Password cracking ```
Answer: D
56
``` QUESTION NO: 174 Which of the following commands is used to view the contents of a file? A. Save B. Open C. Copy D. Move ```
Answer: B
57
``` QUESTION NO: 175 Which of the following media has the highest possible availability? A. Wired B. WiFi C. Cellular D. Bluetooth ```
Answer: A
58
``` QUESTION NO: 176 Which of the following extension types are associated with document files? (Select THREE). A. .txt B. .odf C. .msi D. .rtf E. .mp3 F. .tar G. .jpg ```
Answer: A,B,D
59
``` QUESTION NO: 177 A home user wants to share files between two different computers. The user wants the files to be available to either computer, regardless of whether either computer is turned on. Which of the following is the BEST storage method? A. USB storage B. Internal storage C. Direct attached storage D. Network attached storage ```
Answer: D
60
``` QUESTION NO: 178 Which of the following is the component responsible for interconnectivity of internal system devices? A. System case B. Power supply C. Motherboard D. Expansion card ```
Answer: C
61
``` QUESTION NO: 179 Which of the following storage methods provides the HIGHEST redundancy and availability? A. Cloud-based storage B. Storage Area Network C. Locally attached storage D. Network Attached Storage ```
Answer: A
62
QUESTION NO: 180 Which of the following is a benefit of setting up a computer to receive automatic updates from the OS vendor? A. Arranges the hard drive files in order B. Restores missing files that were lost or deleted C. Keeps the software current and applies security patches D. Provides the latest virus definitions to keep the computer safe
Answer: C
63
``` QUESTION NO: 181 Which of the following application types is MOST often used for doing a mail merge? A. PDF software B. Word processor C. Presentation software D. Personal information manager ```
Answer: B
64
``` QUESTION NO: 182 Which of the following security threats includes suspicious activity, such as reviewing someone's screen display without permission? A. Malware B. Shoulder surfing C. Phishing D. Password cracking ```
Answer: B
65
``` QUESTION NO: 183 A user reports an inability to access the Internet on a new SOHO router. On further investigation, a technician notices that the wireless network is not visible. Which of the following is the MOST likely cause? A. SSID broadcast is disabled B. Wireless password has changed C. Firmware update is required D. WPA2 is enabled ```
Answer: A
66
``` QUESTION NO: 184 Which of the following storage methods is MOST likely used in corporate settings to save large amounts of data in a secured manner? A. HTTP B. HTTPS C. FTPS D. FTP ```
Answer: C
67
QUESTION NO: 185 Which of the following describes the difference between open source and commercial operating systems? A. Open source operating systems only run on desktop computers, whereas commercial operating systems run on servers. B. Open source operating systems run on standard and non-standard hardware, whereas commercial operating systems only run on specific hardware. C. Open source operating systems can be downloaded and used by everyone, whereas commercial operating systems can only be used by companies. D. Open source operating systems are usually provided free of charge, whereas most commercial operating systems are usually provided at some cost.
Answer: D
68
``` QUESTION NO: 186 Which of the following is MOST important to ensure a computer temperature is maintained within normal limits? A. Maintaining constant power output B. Ensuring sufficient airflow C. Keeping the case open D. Turning the wireless off when not needed ```
Answer: B
69
``` QUESTION NO: 187 An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using? A. LTE B. GSM C. VoIP D. CDMA ```
Answer: C
70
``` QUESTION NO: 188 Which of the following allows for hands-free operation of a wireless device? A. Encryption B. Wireless password C. Bluetooth pairing D. Internet connectivity ```
Answer: C
71
``` QUESTION NO: 189 Joe, a user, is setting up a new computer and wants to minimize the risk of a malicious software infection over the network. Which of the following should be configured on the new computer? (Select THREE). A. Password policies B. Multiple user accounts C. Software firewall D. Driver updates E. Operating system updates F. Anti-malware software ```
Answer: C,E,F
72
QUESTION NO: 190 Which of the following is the primary goal in performing a backup verification? A. Ensure backup data can be correctly restored B. Prove the media has sufficient space for the data C. Configure frequency of backups D. Adhere to legal backup storage requirements
Answer: A
73
``` QUESTION NO: 191 Which of the following file types is used to consolidate a group of files? A. .rtf B. .m3u C. .avi D. .rar ```
Answer: D
74
``` QUESTION NO: 192 Which of the following keys should be pressed to enable access to various menus? A. ALT B. SHIFT C. TAB D. CTRL ```
Answer: A
75
``` QUESTION NO: 193 Ann, a user, has an external monitor that will not turn on. Her laptop has activity lights and is plugged into the same power strip. Which of the following should be checked FIRST to begin troubleshooting this issue? A. The power strip B. The monitor video cable C. The laptop power cable D. The monitor power cable ```
Answer: D
76
``` QUESTION NO: 194 Which of the following methods are MOST likely used to reduce the internal temperature of a computer? A. Install a protective cover B. Reduce display brightness C. Air circulation D. Electronic recycling E. Liquid cooling ```
Answer: C,E
77
``` QUESTION NO: 195 A technician is setting up a router and would like to increase the security level. Which of the following actions will achieve this? A. Installing anti-malware on the router B. Changing the default admin password C. Increasing transmission power D. Configuring multifactor logon authentication ```
Answer: B
78
``` QUESTION NO: 196 Which of the following data connections can span the FARTHEST distance? A. WiFi B. Dial-up C. Satellite D. Cable ```
Answer: C
79
``` QUESTION NO: 197 Which of the following functions can transfer a file between folders and deletes it from the original folder? A. Edit B. Move C. Copy D. Paste ```
Answer: B
80
``` QUESTION NO: 198 An end-user has 16GB of RAM installed on a computer system. Which of the following describes why the OS only uses a maximum of 4GB of RAM? A. The operating system is 16-bit. B. The computer has corrupted RAM. C. The computer has a defective motherboard. D. The operating system is 32-bit. E. The computer has a virus. ```
Answer: D
81
QUESTION NO: 199 A technician just installed a new computer. Which of the following is the BEST way to manage the cables? A. Line the cables up neatly and wrap them together with cable ties. B. Leave the cables loose to prevent interference between wires. C. Nail the cables to the wall. D. Tuck the cables neatly underneath the carpet.
Answer: A
82
``` QUESTION NO: 200 A printer is migrated between offices. All the wires are connected properly, but the new workstation cannot find the printer. Which of the following should the technician install? A. OS B. Updates C. Drivers D. Application ```
Answer: C
83
``` QUESTION NO: 201 A user wants to run a major update on a laptop. Which of the following should be considered before running any major updates? A. Restore folders from back up B. Change administrator account password C. Back up important folders D. Print all personal documents ```
Answer: C
84
``` QUESTION NO: 202 Which of the following adds a basic security measure to a wireless device? A. Hands-free headset B. Screen lock feature C. Airplane mode D. Clip-on case ```
Answer: B
85
``` QUESTION NO: 203 Which of the following system utilities allows a user to configure multiple monitors in the OS? A. Color management B. Device manager C. GPU driver D. Display ```
Answer: D
86
QUESTION NO: 204 Joe, a user, reports that his neck and back are hurting after being at his desk for the whole day. Which of the following are the possible causes of the problem? (Select TWO). A. The keyboard is not ergonomic. B. The monitor does not have a screen protector. C. The monitor height is not adjusted to Joe's needs. D. Joe is not using a wrist rest with the keyboard. E. The chair is not properly adjusted to Joe's needs
Answer: C,E
87
``` QUESTION NO: 205 Which of the following are core peripherals needed to use a desktop PC? (Select THREE). A. Monitor B. Keyboard C. Printer D. Mouse E. Speakers F. Mouse pad G. Webcam ```
Answer: A,B,D
88
``` QUESTION NO: 206 A user purchases a new desktop computer and requires assistance setting it up. Which of the following describes the BEST resource the user should reference? A. Technical community group B. Local retail store technical support C. Internet search engine D. Manufacturer documentation ```
Answer: D
89
``` QUESTION NO: 207 Which of the following is used for telepresence? A. VoIP telephone B. Webcam C. Remote desktop D. Touchscreen ```
Answer: B
90
``` QUESTION NO: 208 Which of the following storage media provides the FASTEST speeds when backing up large data files? A. Offsite storage B. Network attached storage C. Locally attached storage D. Cloud-based storage ```
Answer: C
91
``` QUESTION NO: 209 Which of the following security threats is classified as license theft? A. Entering the neighbor’s software key B. Using software to reveal a password C. Searching through the trash for passwords D. Watching what a user types on screen ```
Answer: A
92
``` QUESTION NO: 210 The manufacturer of a SOHO router has released a security fix for the router. Which of the following methods should be used to apply the fix? A. Change the admin password. B. Apply new WEP key. C. Update the firmware. D. Hold the reset button. ```
Answer: C
93
``` QUESTION NO: 211 A user receives an email from the bank stating that the user needs to follow a link and re-enter login credentials due to recent security breaches. Based on best practices, which of the following actions should the user take? (Select TWO). A. Inform the ISP. B. Follow the instructions. C. Delete the message. D. Reply to the email. E. Contact the bank. ```
Answer: C,E
94
``` QUESTION NO: 212 A technician is creating a WiFi network to which anyone can connect without entering a key. With which of the following should the technician configure the wireless network? A. Shared B. Open C. WPS D. WPA ```
Answer: B
95
``` QUESTION NO: 213 A user needs to establish an initial password for an email account. Which of the following is the BEST example of a complex password? A. 01#iWant!2686612338 B. iWantobeaCosmonau# C. 01c234n56789v9876x21 D. 012iWanttobe210 ```
Answer: A