CIS 100 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are the two most common printer types? a.Laser and inkjet printers b.Laser and dot matrix printers c.Thermal and dot matrix printers

.Laser and inkjet printers

Which of the following file extensions types can be run from a Windows system Command Prompt? a..com, .sys, and .png b..exe, .bat, and .dll c..exe, .bat, and .com

.exe, .bat, and .com

Which of the following extensions identifies a program packaged for use by Windows Installer? a..dll b..exe c..msi

.msi

Which of the following is a valid IP address a.1.0.0.1 b.192.168.1.416 c.192.192.192.292 d.256.0.0.1

1.0.0.1

What is the size of an IPV6 address? a.32 byte b.128 byte c.32 bit d.128 bit

128 bit

Which of the following IP address is Class B addresses? a.132.12.0.0 b.224.15.55.2 c.64.2.2.64

132.12.0.0

Which one is not a common band for wireless networking technology? a.20 GHz b.2.4 GHz c.5 GHz

20 GHz

You are currently using a cellular network plan that provides maximum speeds of up to 10 Gbps for your smart phone. Which of the following cellular network types are you using? a.5G b.3G c.2G

5G

You want to upgrade your Windows 10 Professional computer to Windows 11 Professional. You begin by checking the hardware and discover that it has 2 GB of RAM, a 2.0 GHz dual-core processor, a 256 GB solid-state drive, and a video adapter with 128 MB of RAM and DirectX 12 support. You want to install the 64-bit version of Windows 11. What should you do? Add more memory. Upgrade to a processor with at least four cores. Upgrade the video adapter. Upgrade to a faster processor. Install a larger solid-state drive or hard drive.

Add more memory.

Which of the following tasks are part of configuring the user environment after you successfully install a Windows system? (Select two.) Add or remove apps and folders from the Start menu. Configure Windows Update. Configure accessibility options. Install and configure your firewall. Activate your Windows system.

Add or remove apps and folders from the Start menu. Configure accessibility options.

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches that you have performed. Which of the following is this an example of? Answer Worm Trojan Adware Grayware

Adware

You are in the process of preparing to install Windows 11 Professional on your Windows 10 laptop. You have already verified that your laptop hardware is compatible with a Windows 11 installation. Which of the following pre-installation steps should you perform next? Answer Plug your laptop into an uninterruptible power source. Run Disk Cleanup on the hard drive. Back up existing data. Upgrade your laptop's RAM.

Back up existing data.

Which Windows feature can you use to encrypt a hard drive volume? a.BitLocker b.EFS c.NTFS

BitLocker

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection? a.Cellular WAN b.Infrared c.Bluetooth

Bluetooth

You have installed your Windows 11 system on a C: drive. Where are your fonts stored on your Windows 11 system? a.C:\Windows\Documents and Settings\Fonts\ b.C:\Fonts\ c.C:\Windows\Fonts\

C:\Windows\Fonts\

What should be created when you destroy a hard drive? Answer Chain of Custody Certificate of Destruction Record of Format Outsourcing Record

Certificate of Destruction

What should be created when you destroy a hard drive? a.Certificate of Destruction b.Record of Format c.Outsourcing Record

Certificate of Destruction

Which of the following identifies who had possession of a hard drive and for how long before it was actually destroyed? Chain of Custody Outsourcing Record Record of Format Certificate of Destruction

Chain of Custody

You have a computer with a 64-bit dual-core processor that runs the 64-bit version of Windows 10 Professional edition. You would like to upgrade to the 64-bit version of Windows 11 Home. You want to perform the upgrade with the least amount of effort possible. Which of the following installation methods do you need to perform? In-place upgrade Repair installation Clean installation Windows 10 Installation Assistant installation

Clean installation

You want to keep an existing operating system installed on a system and deploy Windows as a separate instance on the same device, creating a multiple-boot configuration. Which installation type should you use? Clean installation Repair installation Upgrade installation In-place installation

Clean installation

You are in the process of preparing to install Windows 11 on your Windows 10 computer. Which of the following pre-installation steps are critical to complete if you are performing a clean installation? (Select two.) Back up existing data Gather any third-party installation media Verify software compatibility Obtain hardware drivers Create a system image

Create a system image Back up existing data

You have a workstation running Windows 10 Home. However, you want to install Windows 11 Professional as a separate instance in order to boot into either operating system. Which of the following installation types will meet your needs? Custom/clean installation Repair installation In-place installation Upgrade installation

Custom/clean installation

Which of the following is not an email protocol? a.POP3 b.SMTP9 c.DHCP d.IMAP

DHCP

What is a base-10 numbering system also known as? a.Hexadecimal b.Binary c.Decimal

Decimal

Which hard drive destruction method uses a strong magnetic pulse to destroy data? Degaussing Disk shredder Drilling Incineration

Degaussing

Which of the following BEST describes a community cloud implementation? Answer Designed to be used by a single organization. Designed to be a combination of public and private cloud resources. Designed to be shared by several organizations. Designed to be accessed by the general public.

Designed to be shared by several organizations.

Which component is designed to let you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard, monitor, and speakers? a.Docking station b.Built-in Bluetooth c.USB ports

Docking station

You recently purchased a copy of Windows 11 from a retail store. The system that you want to install Windows on does not have an optical drive. What is the BEST option for installing Windows in this scenario? Answer Install the system over the network from a Windows Deployment Services (WDS) server. Install Windows on a system that has an optical drive and then create a disk image and copy it to the system that you originally wanted to install Windows on. Perform a reset installation. Download an ISO copy of the installation files to a USB flash drive.

Download an ISO copy of the installation files to a USB flash drive.

Which of the following hard drive destruction methods only works with mechanical hard drives? Drilling Disk shredder Low-level format Incineration

Drilling

You want to install Windows from optical media on a mirrored RAID disk array. You run the motherboard disk configuration utility and create the RAID 1 array. Then you configure the system to boot from the Windows installation optical media. The Windows installation starts, but does not detect the RAID array. Which of the following will MOST likely allow the RAID array to be detected? Answer In the UEFI configuration, set the SATA mode to IDE. During the installation, browse to and select the appropriate drivers for your RAID controller when prompted. In the UEFI configuration, configure the boot order to boot from the hard drive instead of the optical drive. In the UEFI configuration, set the SATA mode to AHCI.

During the installation, browse to and select the appropriate drivers for your RAID controller when prompted.

Which of the following are the most common means of virus distribution? (Select two.) Email Malicious websites Commercial software CDs Music files from the internet Floppy disks

Email Malicious websites

Which of the following are printer languages? a.Escape codes, PCL, and PostScript b.Java, C++, and Python c.Pascal, C++, and C#

Escape codes, PCL, and PostScript

You are establishing a new security policy for user authentication and want to implement multifactor authentication. Which of the following would BEST accomplish this? a.Username and password b.Fingerprint and iris scan c.Fingerprint and one-time code text message

Fingerprint and one-time code text message

When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright for the user. Which of the following technologies detects this movement on a mobile device? a.GPS and Wi-Fi b.Geotracking and GPS c.Gyroscope and accelerometer

Gyroscope and accelerometer

Which formatting method leaves data on a drive in a state that can be recovered using special software? a.Deep format b.Low-level formatting c.High-level formatting

High-level formatting

Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents? a.Hub b.Router c.Gateway

Hub

Your company currently has an on-premises cloud solution that provides services to its employees. However, the company would like to begin offering some services to the public from the cloud. Which of the following cloud computing solutions would BEST meet your company's new cloud computing requirements? Answer Private cloud Hybrid cloud Community cloud Public cloud

Hybrid cloud

A thin layer of software that resides between the virtual machine and hardware. a. Virtual machine b. Virtual hard disk c. Hypervisor

Hypervisor

Which of the following protocols is often combined with TCP to send data across the internet? a.UDP b.FTP c.IP

IP

Which of the following protocols is often combined with TCP to send data across the internet? a.ICMP b.UDP c.IP

IP

You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the company's current size but would also be able to scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model would BEST fit these requirements? IaaS PaaS DaaS SaaS

IaaS

Which printer type is ideal for printing carbon-copy documents? Question 5Answera.Inkjet printers a.Inkjet printers b.Leaser printer c.Impact printer (Dot matrix printers )

Impact printer (Dot matrix printers )

Which of the following should you do FIRST when you suspect a malware infection? Answer Run a deep malware scan. Investigate and verify the malware symptoms. Disable Windows System Restore. Quarantine the infected system.

Investigate and verify the malware symptoms.

What does the term cloud mean when referring to cloud computing? It is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network. It is the name of an operating system that anyone can use to design, build, and provide cloud services. It is a metaphor for a data storage service with an ever-growing capacity, like storm clouds. It refers to the virtual hardware that cloud computing is built on.

It is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network.

Which of the following can be paired with a motion sensor to improve security? a.Lights b.Cable lock c.Magnetometer

Lights

Which of the following should be installed inside the entrance to the building to prevent weapons or unauthorized equipment being brought into the building? a.Badge reader b.Access control vestibule c.Magnetometer

Magnetometer

Which of the following are the most common means of virus distribution? a.Malicious websites and Email b.Commercial software CDs and floppy disks c.Commercial software and music files from the internet

Malicious websites and Email

A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this? a.Bluetooth b.NFC c.MicroUSB

NFC

Which of the following wireless networking technology allows two-way communication between two devices, but they must be within a few centimeters of each other? a.NFC b.Bluetooth c.Infrared

NFC

Google Cloud, Amazon Web Services, and Microsoft Azure are some of the most widely used cloud storage solutions for enterprises. Which of the following factors prompt companies to take advantage of cloud storage? (Select two.) Answer Need for a platform to develop applications Need for software to manage enterprise applications Need for a storage provider to manage access control Need to bring costs down Growing demand for storage

Need to bring costs down Growing demand for storage

Which of the following network components is responsible for converting digital data into a signal that can be transmitted? a.Transmission medium b.Switch c.Network interface

Network interface

What are the standards called that define how data is formatted and transmitted over a network? a.Network interface b.Networking protocols c.Transmission medium

Networking protocols

After a malware infection has been fully remediated, you should re-enable System Restore and run a full system backup. Which of the following is the BEST place to save this backup? On the secondary drive on your computer On an external drive In the cloud On the main hard drive on your computer

On an external drive

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use? a.Personal Area Network (PAN) b.Local Area Network (LAN) c.Wide Area Network (WAN)

Personal Area Network (PAN)

Which of the following should you do immediately after a malware infection is confirmed? Answer Disable Windows System Restore. Run a deep malware scan. Quarantine the infected system. Boot to a Windows Pre-installation Environment (WinPE).

Quarantine the infected system.

A company has subscribed to a cloud service that offers cloud applications and storage space. Through acquisition, the number of company employees quickly doubled. The cloud service vendor was able to add cloud services for these additional employees without requiring hardware changes. Which of the following cloud concepts does this represent? Answer On-demand Measured service Rapid elasticity Resource pooling

Rapid elasticity

You have just upgraded your motherboard. Several weeks later, you suddenly start having issues with accessing Windows features on your computer. Which of the following will BEST resolve this issue? Answer Boot into Safe Mode and revert to a prior restore point. Disable your antivirus software. Perform a Startup Repair from the Advanced Startup Options menu. Reactivate your copy of Windows.

Reactivate your copy of Windows.

You want to connect your internal network to an external network in order to provide internet access to your employees. Which of the following network components is designed to make this type of connection? a.PoE b.Router c.Hub

Router

Which of the following is a specialized controller that you can use to remotely manage all your network devices? .VLAN b.PoE c.SDN

SDN

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' data to a central database via the internet. Which technology is BEST to use to ensure network connectivity for any clinic located in the world? a.Satellite b.DSL c.Dial-up

Satellite

What type of IP addressing method requires manual configuration and provides a fixed, unchanging IP address? a.Dynamic IP addressing b.APIPA IP addressing c.Static IP addressing

Static IP addressing

Which of the following factor significantly determine the number of virtual machines that a host can accommodate? a. Installation of integration services (IS) on the virtual machine. b. The components installed on host machine. c. The number of software applications installed on the host machine.

The components installed on host machine.

In which of the following situations would you use a custom/clean installation? (Select two.) Answer You want to repair Registry entries and working files. You want to preserve the existing operating system. You want to verify system compatibility. You want to install a new build over the current installation.

There is no operating system installed on the computer. You want to upgrade while preserving data and settings.

The strongest technological security measures can be quickly defeated if employees engage in unsafe behaviors. a.True b.False

True

You want to create a virtualization environment that runs directly on the host machine's hardware to manage the virtual machines. Which of the following virtualization types should you use? a. Type 2 hypervisor b. Container virtualization c. Type 1 hypervisor

Type 1 hypervisor

You have a workstation running a 64-bit version of Windows 10 Professional that you would like to upgrade to Windows 11 Professional. You want to preserve the existing data, settings, and applications. Which of the following would be the BEST installation methods to use to install Windows 11? Answer In-place Repair Custom/clean Upgrade

Upgrade

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 11 licenses for your organization's accounting department. She received a single Windows 11 installation disc with the licenses. Which of the following would be the BEST installation methods to use? (Select two.) Answer Burn 50 copies of the installation disc and install 50 systems at a time. Use a network installation. Copy the installation media to 10 flash drives and install 10 systems at a time. Use the installation disk to install Window on each system individually. Install one system and image it to the other systems.

Use a network installation. Install one system and image it to the other systems.

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which Transport layer protocol is MOST likely used for this service? a.Transport Layer Protocol (TCP) b.File Transfer Protocol (FTP) c.User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

Which of the following authentication methods allows you to securely connect a printer to the wireless network with the least amount of effort? a.WPS b.Captive Portal c.Open Network

WPS

What port does Hypertext Transfer Protocol Secure (HTTPS) use? a.443 b.23 c.80

a.443

Which of the following network types uses special hardware to provide high-speed access to storage across the network? a.Storage area network b.Peer-to-peer network c.Local area network

a.Storage area network

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed? a.%systemdrive%\Program Files b.%systemdrive%\Program Files (x86) c.%systemdrive%\Applications

b.%systemdrive%\Program Files (x86)

technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use? a.grep b.chmod c.ps

b.chmod

What would you enter at the shell prompt on a Linux system to display the present working directory? a.cd b.pwd c.dir

b.pwd

The most effective way of improving security is to implement _________________. a.firewall b.proxy server c.user education and training.

c.user education and training.

You need to see which kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you are looking for. Which commands will display the entire contents of the cpuinfo text file? a.show /proc/cpuinfo b.cat /proc/cpuinfo c.vi /proc/cpuinfo

cat /proc/cpuinfo

You would like to completely shut down a system 10 minutes after notifying all users of your intent. Which of the following commands should you enter at the shell prompt? a.shutdown 10 -h message b.shutdown -r +10 message c.shutdown -h +10 message

shutdown -h +10 message

Which of the following is an example of a strong password? a.wl0v2Et!? b.NewYorkCity c.password

wl0v2Et!?

You are about to begin an upgrade of a Windows 10 workstation to Windows 11. What should you do before beginning? (Select two.) Verify that the computer meets the minimum requirements. Install all the applications that will be used on the new system. Remove all peripherals and expansion boards. Repartition and reformat the hard drive. Create a system backup of the hard drive.

Create a system backup of the hard drive. Verify that the computer meets the minimum requirements.

You want to implement name resolution on the Linux workstations in your company. Which protocol should you use to do this? a.SMTP b.DNS c.WINS

DNS

Which hard drive destruction method uses a strong magnetic pulse to destroy data? a.Degaussing b.Incineration c.Disk shredder

Degaussing

You have been tasked with removing malware from an infected system. You have confirmed that there is an infection, and you continue running scans and removing the malware, but every time the system is rebooted, the malware comes back. Which of the following should you do to help prevent this from happening? Answer Use a different anti-malware program Disable Windows System Restore Boot into Safe Mode Quarantine the system

Disable Windows System Restore

After upgrading from Windows 10 to Windows 11 on your laptop, everything seems to be going well until you start running a graphics editing program that you have used for years. The program keeps locking up after a few minutes. Which of the following pre-installation steps would have helped to resolve this issue? Answer Create a system image. Verify that your system (drive space, memory, and so on) is compatible with Windows 11. Ensure that your software is compatible with Windows 11. Gather third-party installation media and drivers.

Ensure that your software is compatible with Windows 11.

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications that your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the following installation types would be the BEST use of your time in this scenario? Answer Upgrade Clean installation Image deployment Recovery partition

Image deployment

You need to install Windows 11 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 11 on this system? Install Windows the same way you would install a system that uses a standard hard disk drive. Load the drivers for the SSD device during the initial phase of the Windows installation. Set the SATA configuration in the UEFI firmware to RAID. Add a standard hard disk to the system and install Windows on the disk instead of the SSD device.

Install Windows the same way you would install a system that uses a standard hard disk drive.

You have just purchased a new Windows 11 computer for creating and editing animations. You install a new high-end video adapter to handle the animation creation requirements. However, when compiling and running the animations, the computer seems sluggish, and the compilation takes longer than expected. Which of the following would be the BEST first step to resolve this issue? Install the adapter driver from the manufacturer instead of using the Windows driver. Add more RAM to your computer to improve performance. Purchase and install a video adapter with more onboard memory. Update the animation software to the latest version.

Install the adapter driver from the manufacturer instead of using the Windows driver.

Which of the following describes spyware? It monitors the actions of a user and then sends pop-up ads to the user that match their tastes. It is a program that attempts to damage a computer system and replicate itself to other computer systems. It monitors the actions you take on your machine and sends the information back to the originating source. It is a malicious program that is disguised as legitimate software.

It monitors the actions you take on your machine and sends the information back to the originating source.

You begin the installation process and discover that you need to load additional drivers to support your storage controller so that Windows can write to that disc. What should you do? Answer Insert or connect to the installation media and boot from that media. Load the necessary drivers from a USB drive. Remove all drivers and restart. Allow Windows to find the necessary drivers.

Load the necessary drivers from a USB drive.

You are an IT administrator for your company. You have been tasked with installing 300 copies of Windows 11. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstances? Answer Solid-state/flash drives USB DVD PXE

PXE

Which of the following BEST describes the Platform as a Service (PaaS) cloud computing service model? Answer PaaS stores and provides data from a centralized location without the need for local collection and storage. PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure. PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. PaaS delivers software applications to the client either over the internet or on a local area network.

PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure.

Which of the following BEST describes the Platform as a Service (PaaS) cloud computing service model? a. PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure. b. PaaS stores and provides data from a centralized location without the need for local collection and storage. c. PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments.

PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure.

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network? Answer DaaS IaaS PaaS SaaS

SaaS

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network? a.SaaS b.IaaS c.PaaS

SaaS

Your company cloud service currently provides data storage, processing, and network connectivity that hosts several services and applications used by your employees. You want to transition to a cloud service that provides many of these services and applications natively without the IT department needing to constantly maintain and update the services and applications. In addition, the IT department wants to make sure that the cloud service provides employees with resources that are segregated from other employees. Which of the following cloud service solutions meets these requirements? Answer PaaS with a simple multi-tenancy implementation. SaaS with a simple multi-tenancy implementation. PaaS with a fine-grain multi-tenancy implementation. SaaS with a fine-grain multi-tenancy implementation.

SaaS with a simple multi-tenancy implementation.

Anna, a user, downloaded a free PDF editing application from the internet. Now her laptop constantly displays desktop pop-ups, and several applications don't start. Which of the following types of malware was Anna the victim of? Trojan Worm Spyware Social engineering

Trojan

Which of the following is a program that appears to be a legitimate application, utility, game, or screen saver, but performs malicious activities surreptitiously? Answer Ransomware Scareware Trojan horse Worm

Trojan horse

Which of the following is a program that appears to be a legitimate application, utility, game, or screen saver, but performs malicious activities surreptitiously? a.Ransomware b.Trojan horse c.Scareware

Trojan horse

You are troubleshooting a malware infection. As part of the remediation process, you have used a USB drive to boot into a lightweight version of Windows. Which of the following did you MOST likely boot into? WinPE System Restore Safe Mode Sheep dip computer

WinPE

A technician wants to move a file called widget.txt from the current directory to /home/fred. Which of the following commands should the technician use at the shell prompt? a.cp widget.txt /home/fred b.move widget.txt /home/fred c.mv widget.txt /home/fred

mv widget.txt /home/fred

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes? a.xcopy b.copy c.robocopy

robocopy


Conjuntos de estudio relacionados

History and Systems Psych Exam 3

View Set

ATI practice question GI, Ch 40, Chapter 41 NCLEX style questions

View Set

Chapter 2 - Types of Life Policies

View Set

Psychology Chapter 12 Quiz Questions

View Set

Int. Financial Management LS Chapter 11

View Set