CIS100 final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents? a) Hub b) Router c) Gateway

a) Hub

Which of the following is not an example of social engineering? a) Port scanning b) Shoulder surfing c) Dumpster diving

a) Port scanning

Which of the following is not an email protocol? a) IMAP b) DHCP c) POP3 d) SMTP9

b) DHCP

The strongest technological security measures can be quickly defeated if employees engage in unsafe behaviors. a) False b) True

b) True

Which of the following file extensions types can be run from a Windows system Command Prompt? a) .exe, .bat, and .com b) .exe, .bat, and .dll c) .com, .sys, and .png

a) .exe, .bat, and .com

Which of the following extensions identifies a program packaged for use by Windows Installer? a) .msi b) .dll c) .exe

a) .msi

Which of the following IP address is Class B addresses? a) 132.12.0.0 b) 64.2.2.64 c) 224.15.55.2

a) 132.12.0.0

What port does Hypertext Transfer Protocol Secure (HTTPS) use? a) 443 b) 23 c) 80

a) 443

Which file attribute identifies the file as having been modified since the last backup? a) Archive b) Encrypted c) Read-only d) Hidden

a) Archive

Which Windows feature can you use to encrypt a hard drive volume? a) BitLocker b) NTFS c) EFS

a) BitLocker

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection? a) Bluetooth b) Infrared c) Cellular WAN

a) Bluetooth

In which of the following situations would you use a custom/clean installation? (Select two.) a) You want to preserve the existing operating system. b) You want to verify system compatibility. c) There is no operating system installed on the computer. d) You want to repair Registry entries and working files. e) You want to upgrade while preserving data and settings. f) You want to install a new build over the current installation.

a) You want to preserve the existing operating system. c) There is no operating system installed on the computer.

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use? a) attrib +r -h b) attrib /add r /remove /h c) attrib add r remove h d) attrib +ro -h

a) attrib +r -h

You need to see which kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you are looking for. Which commands will display the entire contents of the cpuinfo text file? a) cat /proc/cpuinfo b) show /proc/cpuinfo c) vi /proc/cpuinfo

a) cat /proc/cpuinfo

A technician wants to move a file called widget.txt from the current directory to /home/fred. Which of the following commands should the technician use at the shell prompt? a) move widget.txt /home/fred b) mv widget.txt /home/fred c) cp widget.txt /home/fred

a) mv widget.txt /home/fred

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed? a) %systemdrive%\Program Files b) %systemdrive%\Program Files (x86) c) %systemdrive%\Applications

b) %systemdrive%\Program Files (x86)

Which of the following is a valid IP address? a) 192.192.192.292 b) 1.0.0.1 c) 256.0.0.1 d) 192.168.1.416

b) 1.0.0.1

You are currently using a cellular network plan that provides maximum speeds of up to 10 Gbps for your smart phone. Which of the following cellular network types are you using? a) 3G b) 5G c) 2G

b) 5G

You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11? a) C:\Users\Profiles\username b) C:\Users\username c) C:\Documents and Settings\username d) C:\Users\Documents and Settings\username

b) C:\Users\username

Which of the following protocols is often combined with TCP to send data across the internet? a) UDP b) IP c) ICMP

b) IP

You have just upgraded your motherboard. Several weeks later, you suddenly start having issues with accessing Windows features on your computer. Which of the following will BEST resolve this issue? a) Boot into Safe Mode and revert to a prior restore point. b) Perform a Startup Repair from the Advanced Startup Options menu. c) Reactivate your copy of Windows. d) Disable your antivirus software.

c) Reactivate your copy of Windows.

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed? a) %systemdrive%\Applications (32-bit) b) %systemdrive%\Applications c) %systemdrive%\Program Files d) %systemdrive%\Program Files (x86)

d) %systemdrive%\Program Files (x86)

What is the size of an IPV6 address? a) 128 byte b) 32 bit c) 32 byte d) 128 bit

d) 128 bit

Your company currently has an on-premises cloud solution that provides services to its employees. However, the company would like to begin offering some services to the public from the cloud. Which of the following cloud computing solutions would BEST meet your company's new cloud computing requirements? a) Private cloud b) Community cloud c) Public cloud d) Hybrid cloud

d) Hybrid cloud

What should be created when you destroy a hard drive? a) Certificate of Destruction b) Record of Format c) Outsourcing Record

a) Certificate of Destruction

You have a computer with a 64-bit dual-core processor that runs the 64-bit version of Windows 10 Professional edition. You would like to upgrade to the 64-bit version of Windows 11 Home. You want to perform the upgrade with the least amount of effort possible. Which of the following installation methods do you need to perform? a) Clean installation b) In-place upgrade c) Repair installation d) Windows 10 Installation Assistant installation

a) Clean installation

You want to implement name resolution on the Linux workstations in your company. Which protocol should you use to do this? a) DNS b) SMTP c) WINS

a) DNS

Which hard drive destruction method uses a strong magnetic pulse to destroy data? a) Degaussing b) Disk shredder c) Incineration

a) Degaussing

Which of the following BEST describes a community cloud implementation? a) Designed to be shared by several organizations. b) Designed to be accessed by the general public. c) Designed to be used by a single organization. d) Designed to be a combination of public and private cloud resources.

a) Designed to be shared by several organizations.

You want to install Windows from optical media on a mirrored RAID disk array. You run the motherboard disk configuration utility and create the RAID 1 array. Then you configure the system to boot from the Windows installation optical media. The Windows installation starts, but does not detect the RAID array. Which of the following will MOST likely allow the RAID array to be detected? a) During the installation, browse to and select the appropriate drivers for your RAID controller when prompted. b) In the UEFI configuration, configure the boot order to boot from the hard drive instead of the optical drive. c) In the UEFI configuration, set the SATA mode to AHCI. d) In the UEFI configuration, set the SATA mode to IDE.

a) During the installation, browse to and select the appropriate drivers for your RAID controller when prompted.

When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright for the user. Which of the following technologies detects this movement on a mobile device? a) Gyroscope and accelerometer b) GPS and Wi-Fi c) Geotracking and GPS

a) Gyroscope and accelerometer

A thin layer of software that resides between the virtual machine and hardware. a) Hypervisor b) Virtual hard disk c) Virtual machine

a) Hypervisor

Which of the following protocols is often combined with TCP to send data across the internet? a) IP b) UDP c) FTP

a) IP

You need to install Windows 11 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 11 on this system? a) Install Windows the same way you would install a system that uses a standard hard disk drive. b) Add a standard hard disk to the system and install Windows on the disk instead of the SSD device. c) Set the SATA configuration in the UEFI firmware to RAID. d) Load the drivers for the SSD device during the initial phase of the Windows installation.

a) Install Windows the same way you would install a system that uses a standard hard disk drive.

You have just purchased a new Windows 11 computer for creating and editing animations. You install a new high-end video adapter to handle the animation creation requirements. However, when compiling and running the animations, the computer seems sluggish, and the compilation takes longer than expected. Which of the following would be the BEST first step to resolve this issue? a) Install the adapter driver from the manufacturer instead of using the Windows driver. b) Add more RAM to your computer to improve performance. c) Purchase and install a video adapter with more onboard memory. d) Update the animation software to the latest version.

a) Install the adapter driver from the manufacturer instead of using the Windows driver.

Which of the following should be installed inside the entrance to the building to prevent weapons or unauthorized equipment being brought into the building? a) Magnetometer b) Access control vestibule c) Badge reader

a) Magnetometer

Which of the following wireless networking technology allows two-way communication between two devices, but they must be within a few centimeters of each other? a) NFC b) Infrared c) Bluetooth

a) NFC

What are the standards called that define how data is formatted and transmitted over a network? a) Networking protocols b) Transmission medium c) Network interface

a) Networking protocols

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes. Which of the following will be true when the file is copied? a) Only the R attribute is retained on the file. b) All the attributes and NTFS permissions are retained on the file. c) Only the R and Encryption attributes are retained on the file. d) None of the NTFS permissions or attributes are retained on the file. e) Only the NTFS permissions are retained on the file.

a) Only the R attribute is retained on the file.

Which of the following BEST describes the Platform as a Service (PaaS) cloud computing service model? a) PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. b) PaaS stores and provides data from a centralized location without the need for local collection and storage. c) PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure.

a) PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure.

Match each cloud computing definition on the left with the appropriate characteristic on the right. Each characteristic may be used once, more than once, or not at all. a) Provides resources to a single organization. b) Combines public, private, and community cloud resources from different service providers. c) Designed to be shared by several organizations. d) Provides computing resources that are accessible to the general public e) Keeps an organization's data separate and secure from any other organization using the same service provider.

a) Provides resources to a single organization. - Private cloud b) Combines public, private, and community cloud resources from different service providers. - Hybrid cloud c) Designed to be shared by several organizations. -Community cloud d) Provides computing resources that are accessible to the general public - Public cloud e) Keeps an organization's data separate and secure from any other organization using the same service provider. - Private cloud

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes? a) Robocopy b) Copy c) Xcopy

a) Robocopy

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network? a) IaaS b) SaaS c) PaaS

a) SaaS

Your company cloud service currently provides data storage, processing, and network connectivity that hosts several services and applications used by your employees. You want to transition to a cloud service that provides many of these services and applications natively without the IT department needing to constantly maintain and update the services and applications. In addition, the IT department wants to make sure that the cloud service provides employees with resources that are segregated from other employees. Which of the following cloud service solutions meets these requirements? a) SaaS with a simple multi-tenancy implementation. b) PaaS with a fine-grain multi-tenancy implementation. c) SaaS with a fine-grain multi-tenancy implementation. d) PaaS with a simple multi-tenancy implementation.

a) SaaS with a simple multi-tenancy implementation.

What type of IP addressing method requires manual configuration and provides a fixed, unchanging IP address? a) Static IP addressing b) APIPA IP addressing c) Dynamic IP addressing

a) Static IP addressing

Which of the following factor significantly determine the number of virtual machines that a host can accommodate? a) Installation of integration services (IS) on the virtual machine. b) The number of software applications installed on the host machine. c) The components installed on host machine.

a) The components installed on host machine.

Which of the following is a program that appears to be a legitimate application, utility, game, or screen saver, but performs malicious activities surreptitiously? a) Trojan horse b) Ransomware c) Scareware

a) Trojan horse

You want to create a virtualization environment that runs directly on the host machine's hardware to manage the virtual machines. Which of the following virtualization types should you use? a) Type 2 hypervisor b) Container virtualization c) Type 1 hypervisor

a) Type 1 hypervisor

Which of the following authentication methods allows you to securely connect a printer to the wireless network with the least amount of effort? a) WPS b) Open Network c) Captive Portal

a) WPS

What would you enter at the shell prompt on a Linux system to display the present working directory? a) pwd b) dir c) cd

a) pwd

You would like to completely shut down a system 10 minutes after notifying all users of your intent. Which of the following commands should you enter at the shell prompt? a) shutdown -h +10 message b) shutdown 10 -h message c) shutdown -r +10 message

a) shutdown -h +10 message

The most effective way of improving security is to implement _________________. a) user education and training. b) proxy server c) firewall

a) user education and training.

You want to upgrade your Windows 10 Professional computer to Windows 11 Professional. You begin by checking the hardware and discover that it has 2 GB of RAM, a 2.0 GHz dual-core processor, a 256 GB solid-state drive, and a video adapter with 128 MB of RAM and DirectX 12 support. You want to install the 64-bit version of Windows 11. What should you do? a) Upgrade to a processor with at least four cores. b) Add more memory. c) Upgrade to a faster processor. d) Install a larger solid-state drive or hard drive. e) Upgrade the video adapter.

b) Add more memory.

You are in the process of preparing to install Windows 11 Professional on your Windows 10 laptop. You have already verified that your laptop hardware is compatible with a Windows 11 installation. Which of the following pre-installation steps should you perform next? a) Plug your laptop into an uninterruptible power source. b) Back up existing data. c) Upgrade your laptop's RAM. d) Run Disk Cleanup on the hard drive.

b) Back up existing data.

Which of the following tasks are part of configuring the user environment after you successfully install a Windows system? (Select two.) a) Configure Windows Update. b) Configure accessibility options. c) Activate your Windows system. d) Add or remove apps and folders from the Start menu. e) Install and configure your firewall.

b) Configure accessibility options. d) Add or remove apps and folders from the Start menu.

You are about to begin an upgrade of a Windows 10 workstation to Windows 11. What should you do before beginning? (Select two.) a) Install all the applications that will be used on the new system. b) Create a system backup of the hard drive. c) Repartition and reformat the hard drive. d) Remove all peripherals and expansion boards. e) Verify that the computer meets the minimum requirements.

b) Create a system backup of the hard drive. e) Verify that the computer meets the minimum requirements.

What is a base-10 numbering system also known as? a) Binary b) Decimal c) Hexadecimal

b) Decimal

Which component is designed to let you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard, monitor, and speakers? a) Built-in Bluetooth b) Docking station c) USB ports

b) Docking station

You recently purchased a copy of Windows 11 from a retail store. The system that you want to install Windows on does not have an optical drive. What is the BEST option for installing Windows in this scenario? a) Install Windows on a system that has an optical drive and then create a disk image and copy it to the system that you originally wanted to install Windows on. b) Download an ISO copy of the installation files to a USB flash drive. c) Install the system over the network from a Windows Deployment Services (WDS) server. d) Perform a reset installation.

b) Download an ISO copy of the installation files to a USB flash drive.

Which of the following are printer languages? a) Pascal, C++, and C# b) Escape codes, PCL, and PostScript c) Java, C++, and Python

b) Escape codes, PCL, and PostScript

Which formatting method leaves data on a drive in a state that can be recovered using special software? a) Deep format b) High-level formatting c) Low-level formatting

b) High-level formatting

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications that your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the following installation types would be the BEST use of your time in this scenario? a) Clean installation b) Image deployment c) Upgrade d) Recovery partition

b) Image deployment

What are the two most common printer types? a) Laser and dot matrix printers b) Laser and inkjet printers c) Thermal and dot matrix printers

b) Laser and inkjet printers

Which of the following are the most common means of virus distribution? a) Commercial software and music files from the internet b) Malicious websites and Email c) Commercial software CDs and floppy disks

b) Malicious websites and Email

A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this? a) Bluetooth b) NFC c) MicroUSB

b) NFC

Which of the following BEST describes the Platform as a Service (PaaS) cloud computing service model? a) PaaS stores and provides data from a centralized location without the need for local collection and storage. b) PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure. c) PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. d) PaaS delivers software applications to the client either over the internet or on a local area network.

b) PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure.

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use? a) Local Area Network (LAN) b) Personal Area Network (PAN) c) Wide Area Network (WAN)

b) Personal Area Network (PAN)

A company has subscribed to a cloud service that offers cloud applications and storage space. Through acquisition, the number of company employees quickly doubled. The cloud service vendor was able to add cloud services for these additional employees without requiring hardware changes. Which of the following cloud concepts does this represent? a) On-demand b) Rapid elasticity c) Resource pooling d) Measured service

b) Rapid elasticity

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network? a) DaaS b) SaaS c) PaaS d) IaaS

b) SaaS

Which authentication category does a username and password fall under? a) Something you have b) Something you know c) Something you are

b) Something you know

Which of the following network types uses special hardware to provide high-speed access to storage across the network? a) Peer-to-peer network b) Storage area network c) Local area network

b) Storage area network

What do you call a system that has no anti-malware or firewall installed? a) End-of-life b) Unprotected c) Unpatched

b) Unprotected

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which Transport layer protocol is MOST likely used for this service? a) Transport Layer Protocol (TCP) b) User Datagram Protocol (UDP) c) File Transfer Protocol (FTP)

b) User Datagram Protocol (UDP)

What is the best countermeasure against social engineering? a) Strong passwords b) User awareness training c) Access auditing

b) User awareness training

technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use? a) grep b) chmod c) ps

b) chmod

Which of the following is an example of a strong password? a) NewYorkCity b) wl0v2Et!? c) Password

b) wl0v2Et!?

Which one is not a common band for wireless networking technology? a) 2.4 GHz b) 5 GHz c) 20 GHz

c) 20 GHz

Which of the following processes is used to prove a user's identity? a) Authorization b) Certificate Manager c) Authentication

c) Authentication

You have installed your Windows 11 system on a C: drive. Where are your fonts stored on your Windows 11 system? a) C:\Windows\Fonts\ b) C:\Fonts\ c) C:\Windows\Documents and Settings\Fonts\

c) C:\Windows\Documents and Settings\Fonts\

You want to keep an existing operating system installed on a system and deploy Windows as a separate instance on the same device, creating a multiple-boot configuration. Which installation type should you use? a) In-place installation b) Repair installation c) Clean installation d) Upgrade installation

c) Clean installation

You are in the process of preparing to install Windows 11 on your Windows 10 computer. Which of the following pre-installation steps are critical to complete if you are performing a clean installation? (Select two.) a) Gather any third-party installation media b) Verify software compatibility c) Create a system image d) Obtain hardware drivers e) Back up existing data

c) Create a system image e) Back up existing data

You have a workstation running Windows 10 Home. However, you want to install Windows 11 Professional as a separate instance in order to boot into either operating system. Which of the following installation types will meet your needs? a) In-place installation b) Upgrade installation c) Custom/clean installation d) Repair installation

c) Custom/clean installation

You are establishing a new security policy for user authentication and want to implement multifactor authentication. Which of the following would BEST accomplish this? a) Username and password b) Fingerprint and iris scan c) Fingerprint and one-time code text message

c) Fingerprint and one-time code text message

Google Cloud, Amazon Web Services, and Microsoft Azure are some of the most widely used cloud storage solutions for enterprises. Which of the following factors prompt companies to take advantage of cloud storage? (Select two.) a) Need for software to manage enterprise applications b) Need for a storage provider to manage access control c) Growing demand for storage d) Need for a platform to develop applications e) Need to bring costs down

c) Growing demand for storage e) Need to bring costs down

Which printer type is ideal for printing carbon-copy documents? a) Inkjet printers b) Leaser printer c) Impact printer (Dot matrix printers )

c) Impact printer (Dot matrix printers )

What does the term cloud mean when referring to cloud computing? a) It refers to the virtual hardware that cloud computing is built on. b) It is the name of an operating system that anyone can use to design, build, and provide cloud services. c) It is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network. d) It is a metaphor for a data storage service with an ever-growing capacity, like storm clouds.

c) It is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network.

Which of the following can be paired with a motion sensor to improve security? a) Cable lock b) Magnetometer c) Lights

c) Lights

Which of the following network components is responsible for converting digital data into a signal that can be transmitted? a) Switch b) Transmission medium c) Network interface

c) Network interface

You want to connect your internal network to an external network in order to provide internet access to your employees. Which of the following network components is designed to make this type of connection? a) Hub b) PoE c) Router

c) Router

Which of the following is a specialized controller that you can use to remotely manage all your network devices? a) VLAN b) PoE c) SDN

c) SDN

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' data to a central database via the internet. Which technology is BEST to use to ensure network connectivity for any clinic located in the world? a) DSL b) Dial-up c) Satellite

c) Satellite

You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer? a) The file was corrupted during the sending process. b) The wrong default app is selected for the type of file that you sent. c) The wrong file extension was used when saving the file. d) Mark's computer does not have the same program you used to write the proposal.

c) The wrong file extension was used when saving the file.

You have a workstation running a 64-bit version of Windows 10 Professional that you would like to upgrade to Windows 11 Professional. You want to preserve the existing data, settings, and applications. Which of the following would be the BEST installation methods to use to install Windows 11? a) Custom/clean b) In-place c) Upgrade d) Repair

c) Upgrade

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 11 licenses for your organization's accounting department. She received a single Windows 11 installation disc with the licenses. Which of the following would be the BEST installation methods to use? (Select two.) a) Burn 50 copies of the installation disc and install 50 systems at a time. b) Copy the installation media to 10 flash drives and install 10 systems at a time. c) Use a network installation. d) Use the installation disk to install Window on each system individually. e) Install one system and image it to the other systems.

c) Use a network installation. e) Install one system and image it to the other systems.

Which of the following attacks exploits a vulnerability in software that has not been discovered by the developer? a) Brute force attack b) XSS attack c) Zero-day attack

c) Zero-day attack

After upgrading from Windows 10 to Windows 11 on your laptop, everything seems to be going well until you start running a graphics editing program that you have used for years. The program keeps locking up after a few minutes. Which of the following pre-installation steps would have helped to resolve this issue? a) Verify that your system (drive space, memory, and so on) is compatible with Windows 11. b) Create a system image. c) Gather third-party installation media and drivers. d) Ensure that your software is compatible with Windows 11.

d) Ensure that your software is compatible with Windows 11.

You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the company's current size but would also be able to scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model would BEST fit these requirements? a) SaaS b) PaaS c) DaaS d) IaaS

d) IaaS

You begin the installation process and discover that you need to load additional drivers to support your storage controller so that Windows can write to that disc. What should you do? a) Remove all drivers and restart. b) Insert or connect to the installation media and boot from that media. c) Allow Windows to find the necessary drivers. d) Load the necessary drivers from a USB drive.

d) Load the necessary drivers from a USB drive.

You are an IT administrator for your company. You have been tasked with installing 300 copies of Windows 11. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstances? a) DVD b) USB c) Solid-state/flash drives d) PXE

d) PXE


Conjuntos de estudio relacionados

Safety and Infection Control week 3

View Set

New Testament quiz questions: (Midterm multi choice prep)

View Set

Chapter 40: Medical Office Computerization

View Set

Political, Economic and Social Effects of Civil War

View Set