CIS 134 IT Fundamentals Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What compatibility information should you confirm before installing a software application?

That it works with the version of the operating system that you have, and that your computer meets the system (hardware) requirements.

What type of component provides persistent storage?

The Hard Disk Drive (HDD) and Solid State Drive (SSD)

You want to restrict access to a computer on your network to a single internet host running a particular application. What two things do you need to configure in your firewall's access control list?

The IP address of the host and the port number of the application

What type of file system must be used for the partition where Windows 10 is installed?

The NTFS file system

Which admin tool or screen would you use to configure a Windows computer to join a domain?

The System applet in Control Panel

What identifies a website as using the secure HTTPS protocol with a valid certificate?

The URL shows the "https://" protocol and the browser shows a padlock icon.

What default installation folders contain system and application files that should not normally be deleted or modified manually?

The Windows and Program Files folders.

Why might a company ban use of the corporate network and desktop software for personal communications?

The company might be held responsible for inappropriate content posted by its employees.

Why might one of your first tasks on receiving a new computer be to remove software applications?

The computer may be bundled with pre-installed software that you do not want.

Why should you be more careful about deleting files from a USB flash drive than from the main hard drive?

The files from a flash drive will not be recycled, so retrieving them if you change your mind will be very difficult.

You need to plug a microphone into a computer to make a recording. How would you identify which jack to use?

The jack is typically color-coded pink.

A friend is asking for your help in using her computer. When your friend presses the key marked @, the " symbol appears. What could be the cause?

The keyboard is set to use a UK layout.

What crucial piece of information would you need when trying to locate support information about a computer system on the manufacturer's website?

The model number or a service code.

What is the difference between a modem and a router?

The modem transmits frames across the WAN link while the router forwards packets between the local network and the Internet.

What computer component is most restrictive in terms of determining upgrade potential for a desktop computer?

The motherboard

Your colleague is using a laptop and you notice that he laboriously clicks the external mouse repeatedly to scroll through the document you are co-editing. Which feature could he use to be more productive?

The mouse scroll-wheel on the external mouse to maneuver the scroll bar

Which is a true statement regarding whether or not laptops make good servers?

There are limited options for expansion, and its components are not practical for network-wide use cases.

How can a client-server application architecture be described if it could be re-developed to split the application and presentation layers?

This could be described as a two-tier application capable of becoming a tier-three application.

What kind of data would you expect to find in a file with a TIFF extension?

This is an image file format.

What term is used to describe terminating a process that is not responding to user input?

This is often called "killing" the process.

A printer is rated at 20ppm. What is the significance of this statistic?

This is the number of pages per minute the printer can output. High page rates are important in high-volume environments.

What are the two main ways that spam might expose recipients to hazardous content?

Through malware-infected attachments and through links to malicious websites

Which of the following parts of a friendly URL is dependent on a name resolution service?

Top level domain

Why is a smartphone NOT a good tool for writing a report?

Touchscreen or mini keyboards are not optimized for writing lots of text.

You have installed a screensaver application. Later, after updating your anti-virus software, a malicious program is found. This appears to have infected your system at the same time as the screensaver was installed. What class of malware is this?

Trojan Horse

Which of these statements is NOT true about Universal Serial Bus (USB) cables?

USB cables never have the same connectors at either end.

Which data representation format can encode the widest range of characters?

Unicode

What is the technical term for a web address?

Uniform Resource Locator (URL)

You are looking for content on a topic, but your search is returning millions of matches that are not particularly helpful. Which option includes two methods that you could use to get better search results?

Use more search keywords (ideally with 'uncommon' words), or search for an exact phrase by enclosing it in quotes.

What type of access mechanism is MOST vulnerable to a replay attack?

Use of a token generated by software

Which method does a technician use to configure and improve a system's memory usage?

Use of virtual memory or a pagefile, where disk space is used to supplement system RAM.

Windows comes with web server software, but it is not installed by default. How would you install this software?

Use the Turn Windows features on or off dialog from Programs and Features.

Following installation of a program written for an older version of Windows, you receive an alert that it might not have installed correctly. What feature could you use to make the program run correctly?

Use the program's Compatibility tab to use settings for the older Windows version.

What protection feature in Windows is designed to prevent a script or software from making unauthorized changes to the OS configuration?

User Account Control (UAC)

What is the main means by which anti-virus software identifies infected files?

Using definitions or signatures of known virus code

What technique makes password cracking fairly easy?

Using simple words or names as a password

In order to obtain support on a currently installed application, the software vendor wants to know the application's product ID. How would you locate this information?

Usually via the Help > About menu.

Which type of display interface does NOT support High Definition picture resolution?

VGA

What should you do before attempting to set up a new computer system?

Verify that the environment is suitable and that the installation will be safe.

Which of the following provides the greatest security for wireless networks

WPA

What type of information would NOT be considered confidential and governed by classification and handling procedures?

Website information

What is the result of putting a phone in "airplane mode?"

Wireless features are disabled.

Which of the following is NOT a privacy issue that is related to using a social networking site?

You need to ensure that private information is physically shredded prior to disposal.

HTTP is an example of ______ layer protocol.

application

Which of these are NOT configurations for dual monitor displays

arrange

What is the file path to the Documents folder for a user named "David", assuming Windows is installed to a hard disk with a single partition using the default settings?

c:\Users\David\Documents

What is the decimal number 75 in binary and hexadecimal?

0100 1011 in binary and 4B in hex

You want to purchase a flat panel monitor that can show widescreen movies. Which native resolution should you choose?

1920x1080

What is the main advantage of using a CPU in 64-bit mode?

64-bit software is more reliable and is faster than 32-bit software. It also supports more system memory.

What is a Command Line Interface (CLI)?

A Command Line Interface allows the user to interact with the OS using typed commands or scripts rather than a GUI.

An attacker has used a rogue access point to intercept traffic passing between wireless clients and the wired network segment. What type of attack is this?

A Man-in-the-Middle (MitM) attack

What type of address identifies a network interface in the context of the local network segment only?

A Media Access Control (MAC) address

You want to use a website that hosts training modules in a custom media format. What type of add-on would you need to install to play this media?

A Plug-in

You want to check whether a condition has been met, and if it has, perform one action. Otherwise, you want your program to perform a second action. What sort of programming operation would help achieve this?

A conditional branch

How is a Windows library different from a folder?

A library acts as a virtual folder by displaying the contents of multiple folders, which could be located on different drives.

In a program, what does a loop do?

A loop performs one or more instructions until a condition is met.

When a client connects to a folder on a network server via a drive letter, what is the drive called?

A mapped drive

How does a markup language differ from a compiled language?

A markup language is not a programming language, rather it is a way of using nested tags within a document to describe its structure and contents.

A hard drive is rated at 10,000 rpm. What is the significance of this statistic?

A measurement of the speed of the drive

What is a Wide Area Network (WAN)?

A network that connects sites in different geographic locations

What is a packet made up of?

A packet consists of a number of fields contained within a header section plus a payload.

What is the difference between a procedure and a function?

A procedure does something, while a function does something and then returns a value to the main program.

If you do not have a support contract, what is likely to be the best option for obtaining advice about a problem with an application?

A product support or community forum

What type of device is used to transfer packets between different networks?

A router

What systems use a Central Processing Unit (CPU) and memory?

All types of computers

What is a reputable source of management software and drivers for a particular system?

An OEM website

Which version or edition of Windows can be used to share files with other users?

Any version or edition

In general, what is the difference between the char and string data types?

Char stores a single textual character in a fixed length field (typically 1 byte). A string is a variable length field for storing a sequence of characters.

Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. What should you do next?

Check whether your friend actually sent the link in good faith first.

You are using a computer in an Internet cafe. What should you do at the end of the session?

Clear the browser cache.

What security concern is snooping most affected by?

Confidentiality

Which of the following configuration changes does NOT reduce the attack surface?

Configuring data back-ups in case ransomware encrypts the file system

The Task Scheduler allows you to run a process automatically in Windows. What is a widely-used Linux equivalent?

Cron

What key combination can you use to force the browser to ignore any locally cached files when refreshing a page?

Ctrl+F5

Which four toners are used to produce color prints?

Cyan, magenta, yellow, and black

You have a motherboard that is designed for Double Data Rate 2 (DDR2) memory that works at a bus speed of 533 MHz. You have some DDR3 memory modules that also work at a bus speed of 533 MHz. Are the modules compatible with the motherboard?

DDR3 modules cannot be used in DDR2 slots.

An INSERT statement is an example of what data language type?

Data Manipulation Language

What class of data is a transport encryption protocol designed to protect?

Data in transit

What are the three main areas where redundancy should be provisioned?

Data, network links, and power

What type of computer is most likely to need peripheral devices?

Desktop

You are advising a colleague about best practices when troubleshooting. You have identified the following techniques to use to identify a problem: gather information, duplicate the problem, question users, identify symptoms, and approach multiple problems individually. If you are following CompTIA's troubleshooting model, what other piece of advice should you give?

Determine if anything has changed

Which Windows interface is used for advanced management and troubleshooting of devices?

Device manager

What data protection technology could you implement in order to restrict the type of activity that a user could employ on digital products that they have purchased or rented?

Digital Rights Management

Which protocol allows people to use names/labels, rather than numeric addresses, to address network resources?

Domain Name System (DNS)

Which of these statements is true regarding how you set up your display?

Dots Per Inch (DPI) or scaling is configured via Display settings.

How is a relationship identified between two tables in an RDBMS?

Each table contains a primary key whose value is unique for each record in the table. A secondary table can use the value of a primary key as a relation, storing the value in a foreign key field.

What are the structural elements of a database?

Each table stores information about records in fields.

Which email protocol(s) are used to download messages from a mail server?

Either Post Office Protocol (POP) or Internet Message Access Protocol (IMAP)

If you use an open network, what email configuration setting should you configure?

Enable Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption to protect the account password

What can you do to reduce the risk of using a free Wi-Fi network to place an order from an online shop?

Ensure that the online store uses a secure (HTTPS) connection.

How could you access a network folder called DATA on a network server called TOWER1 using the Explorer address bar?

Enter the Universal Naming Convention (UNC) path.

You have asked a senior manager to authorize your plan of action for resolving a fault in a software application. What name is given to the process you are following?

Escalating the problem

Mice and keyboards CANNOT connect to which types of ports?

Ethernet ports

How does Microsoft SQL Server differ from Microsoft Excel when used to store a dataset?

Excel is an example of a flat file system, whereas SQL Server is relational database software that is better suited for larger volumes of information and more users.

You are configuring dual monitors positioned side-by-side. You want to increase the amount of screen space available. Which multiple display option should you set?

Extend the displays.

Your computer has 4 SATA ports. How many hard drives can be installed?

Four drives

What view options could you use to show files of a particular type sorted by date?

Group the files by file type, then sort by date.

What sort of account allows someone to access a computer without providing a user name or password?

Guest account

What is the difference between HTTP and HTTPS protocols?

HTTPS serves SSL (Secure Sockets Layer) secured HTML web pages, whereas HTTP serves unsecured web pages.

What type of cryptographic operation(s) are non-reversible?

Hashing

Which notation system supports presenting the largest numbers using the fewest digits?

Hexadecimal

How would you access the system setup program on a PC?

Historically, by pressing the appropriate key during startup (ESC, DEL, F1, F2, or F10). Modern PCs often use fast boot modes that require some other means of booting to the firmware setup program.

What is the latest Wi-Fi standard and which frequency band(s) does it use?

IEEE 802.11ac works in the 5 GHz band.

You log into a SOHO router and review current settings to prepare it for use. Which of the following items is NOT needed to configure a wireless connection on the router?

IP address

What is the advantage of a local network hosted application, in terms of data storage?

If data is stored on the server and not on the local workstation, it is easier to apply access controls and to back it up.

What system policy ensures that users do not receive rights unless granted explicitly?

Implicit deny

What part of the process of data analytics is most closely supported by meaningful reporting?

Insights

Why would Windows prompt you to enter a password if you try to install a software application?

Installing an application requires administrator privileges and is an action protected by User Account Control

What is an interpreted programming language?

Interpreted languages do not need to be compiled because the code gets converted to machine code at runtime.

What is the purpose of an accelerometer, as fitted in a mobile device?

It is one of the components that detects how the user is moving the device around.

Select the one UNTRUE statement in regard to cookies.

It's not legal for a web site to store cookies on your computer.

Give two examples of semi-structured data stores.

Key/value pair databases and markup language document stores.

Why can't you use memory modules designed for a desktop computer in a laptop?

Laptops use a smaller form factor called SO-DIMM while desktops use DIMMs.

What type of print technology uses toner?

Laser

What type of mouse would you recommend for someone who uses their computer principally to play computer games and why?

Laser mouse — this registers cursor movements more quickly and accurately.

What type of printer uses a fuser?

Laser printer

What is an example of open source operating systems?

Linux, Chromium, or Android

What does attenuation mean?

Loss of strength of a signal

Which non-discretionary access control type is based on the idea of security clearance levels?

Mandatory Access Control (MAC)

What sort of device would you need to transfer data from a "Memory Stick"?

Memory card reader / multi-card reader.

You are considering buying a new display device. The model you are considering accepts digital inputs only. Your computer's graphics adapter has a blue port with 15 holes. Would this flat panel be a wise purchase?

No, as this connector is VGA which supports analog output only.

What are the key features of a packet switching network?

Nodes within the network can perform a forwarding function, allowing a packet to utilize any available path through the network.

What is the difference between freeware and open source software?

Open source means that the programming code used to design the software is publicly available.

You are using the mouse to access a file located on a network server. There are currently no mapped drives. What should be your first step?

Open the Network object from Explorer and locate the server hosting the file.

You need to configure settings for an input device. What should be your first step?

Open the Settings app or Control Panel.

Which system object provides the functionality for a hardware component?

A device driver

What is a zip file?

A file archive containing other files in a compressed format.

What sort of device could you use to expand the storage capacity of a smartphone?

A flash memory card

What type of component provides a passive cooling solution?

A heatsink

What device is used to connect computers together in an Ethernet network?

A switch

How does a one-time password work?

A unique password is generated using an algorithm known to both a device (fob) and the authenticating server.

What is a typical speed for a mid-range CPU to run at?

Around 2 GHz; budget models might run as low as 1 GHz, while faster ones run at 3 or 4 GHz.

What three scripting options are commonly used in Windows 10 to perform administrative tasks?

Batch files, Windows PowerShell scripts, and VBScripts

What type of disk has the greatest capacity?

Blu-ray that is a single layer

How might malware hosted on a website be able to infect your computer simply by your browsing the site?

By exploiting a vulnerability in software installed on your computer

How might spyware be able to steal a password?

By monitoring key strokes or stealing a password database

What type of computer is best suited for using in a job where you have to make notes and be able to move around easily?

A tablet or smartphone or possibly a hybrid laptop/tablet.

What type of programming concept allows for a variable size container?

A vector

What is the main difference between virus and worm malware?

A virus has to infect a file whereas a worm propagates in memory and over computer networks.

What is a Standard Operating Procedure (SOP)?

An inflexible, step-by-step listing of the actions that must be completed for any given task

A user has two USB drives connected to her PC. She complains that when she copies large files to both drives at the same time, it seems to take much longer. Why might this be?

Bandwidth on the USB bus is shared between all devices.

What does a hard disk connected to a computer via a USB port describe?

Direct attached storage

What factors should you consider when positioning input and output devices?

Ensure that they can be used without exerting strain, especially on the arms / wrists and back / neck.

How can a smartphone join a Wi-Fi network if the SSID is not being broadcast?

Enter the network name manually, as with a computer.

Which protocol would be best used to provide encrypted file downloads directly from a web server?

HTTPS

What are the four processes of an access control system?

Identification, authentication, authorization, and accounting

Which data type provides for whole numbers only?

Integer

What function of an operating system is performed by the "shell"?

Interface between the user and the computer.

What protocol is usually used to provide logical addressing on networks?

Internet Protocol (IP)

Which of the following is NOT a medium used for Internet access?

Internet Service Provider (ISP)

What impact is presented when users reveal their passwords to technical support staff?

It exposes users to social engineering attacks that try to gather login credentials for malicious use.

In considering availability concerns, what use might a lockable faceplate on a server-class computer be?

It may prevent the user from switching the machine on/off or accessing removable drives and ports.

You are setting up a new computer, but it doesn't seem to be working. Should you check anything or contact the manufacturer?

It would be best to double-check you have connected the cables correctly.

You have to open a word processing application, but you cannot see an icon on the desktop. What should you do?

Look for the shortcut in Start Menu or Start Screen.

A user sends an email to another user. The email sender receives a delivery receipt from the receiving server. Which security-related concept validates that the email was successfully delivered?

Non-repudiation

In Windows, do letter-labeled "drives" correspond exactly to physical disks?

Not in the case of hard disks, which can be configured with multiple partitions, each of which can be assigned a drive letter.

What function of a scanner would you use if you want to convert a letter that someone has mailed to you into a computer-editable document?

Optical Character Recognition (OCR).

What IoT device may contain a "black box" that is able to record event data?

Smart Vehicle

What provides sound functionality in a personal computer?

Sound functions are often provided by the motherboard chipset.

Which of these statements is true regarding a standard user and their password?

Standard users can change their own password but cannot change anyone else's password.

You have made a backup of system data using a removable hard disk. Time and security are of great importance. What should you do next?

Store the disk in a secure, off-site location.

What language is usually used to request data from an RDBMS such as Oracle?

Structured Query Language (SQL) is used to query RDBMS-based database platforms.

Why might you use the Microsoft Management Console (MMC) Services snap-in to manage background processes rather than Task Manager?

Task Manager allows you to start and stop services but the Services snap-in also allows you to configure service properties.

What type of connection would a NAS device NOT be able to use?

Twisted pair (RJ-11)

What do you need to know to connect to a device that is configured over the network?

Typically, the Internet Protocol (IP) address of its management page or the device's hostname

The following is a newer example of firmware code

UEFI

Which specific attack uses a botnet to threaten availability?

Distributed Denial of Service (DDoS)

What three things define an object?

Properties, attributes, and methods

What shows the structure of code without using the specific syntax of any one language?

Pseudocode

What is it called when antivirus software remediates a system by blocking access to an infected file but not actually deleting it.

Quarantining the file

What term is used to describe selecting and viewing information in a database?

Query

What type of connector would you NOT use for an external hard drive to connect to a Windows PC?

RGB

Malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key. What type of malware is being described?

Ransomware

Which of the following is NOT an example of unstructured data?

Relational databases

What type of software would you use to configure a server by connecting to it over the network?

Remote desktop

Which feature allows data to be removed from a device if it is lost or stolen?

Remote wipe

Which of the following methods can be used to open the Computer Management console?

Right-click the This PC object in File Explorer. Right-click the Start button.

If you have made changes to a file and want to keep both the original file and the modified version, what command should you use?

Save As.

Why is prioritization a critical task for disaster recovery?

Services may have dependencies that make restoring them in the wrong order futile.

What type of system allows a user to authenticate once to access multiple services?

Single Sign-On (SSO)

You have just bought a new computer but want to use the older version of Windows that came with your previous computer. Windows was provided as an OEM license. Can you use this license key to install the software on your new PC?

Original Equipment Manufacturer (OEM) licenses can only be used on the brand and model it was initially installed on.

Which of the following is NOT a method that a malicious person can use to masquerade as someone else when using email or Instant Messaging?

Overwhelm the server with a Denial of Service (DoS)

You want to purchase a computer with a fast graphics interface. What type of expansion slot should you look for?

PCIe x16—this is a type of PCI Express slot that uses 16 'lanes'. Each lane can transfer 250 MBps (or 500 MBps for PCIe 2 and 1 GBps for v3).

You are trying to find a use for an old dot matrix printer. The only port on the printer is a large edge-style one with 36 contacts. What type of port is this?

Parallel port

What is TRUE about legal protection for a novel software algorithm?

Patent provides the best protection as it can enforce ownership even if someone tries to write the algorithm in a slightly different way.

What type of gesture is typically used for zooming on a touchscreen?

Pinch

Select the one UNTRUE statement in regard to browser pop-up windows.

Pop-up windows are always a sign of viruses.

Your colleague has to run many applications at the same time and finds it difficult to know which icon to choose when switching between them. What alternative method could you suggest?

Press Alt+Tab - this shows previews of the window and allows the user to quickly switch between windows.

What basic command demonstrates that a printer is connected properly to a computer and that its driver is installed correctly for Windows?

Print test page.

You want to configure a printer to use both sides of the paper (duplex) by default. You have alt-clicked the printer object. Which command should you select to proceed?

Printing preferences

You need a development environment with a library of database functions. What type of interface are you using?

Programmatic access

What are constants and variables examples of?

Programming identifiers

What type of software manages tasks, dependencies, and timelines?

Project management software

What two things are configured on a disk to make storage space on the disk available to the Windows OS?

The disk must contain at least one partition, typically allocated a drive letter, and the partition must be formatted with a suitable file system.

Following installation of an application, another program on your computer has stopped working. What could you do to try to fix it?

Try using the Repair option in Programs and Features (if available) or re-installing the program.

Which of these statements is FALSE regarding the Windows 10 versions available?

Windows 10 Enterprise is similar to the Pro edition but designed for licensing by small businesses.

You have to sign in to Windows - does it matter if the CAPS LOCK light on the keyboard is activated?

Windows passwords are case sensitive, so the CAPS LOCK may prevent successful login.

What type of software is an ODF file associated with?

Word processing software

What type of computing device(s) is macOS designed for installation on?

Workstations and laptops

What does AAA stand for and in which order are they typically performed?

Authentication, Authorization, Accounting

Denial of service attack is most likely to threaten which of the following

Availability

What type of wired interface is a printer MOST likely to use?

USB

Your computer locks up (freezes) periodically and feels hot to the touch. Could these things be related?

Yes, many lockup problems are caused by overheating.

You want to find something on a particular website, but the site does not have a search tool. Could you use a general search engine (and if so, how)?

Yes—you use an advanced search form and provide a URL such as comptia.org.

Which of these statements is false?

You can connect the camera's flash memory card directly into your computer's USB port.

What is the best way to install a web application on your computer?

You do not install a web application on your computer. You access it through your browser.

When setting up a desktop computer, what factor should you consider when deciding on the location of the system case?

You need to consider the position of power outlet(s) and peripheral devices as well as air flow around the system unit.


Ensembles d'études connexes

Chapter 3 - Key Cases and Precedents Affecting Expert Witnessing

View Set

Chapter 6 - QuickBooks - Employees and Payroll

View Set

(Pharm/Jacques) Chapter 54: Drugs Acting on the Upper Respiratory Tract

View Set

Chapter 5 assignment photosynthesis bio L100

View Set

Employment strategies final exam

View Set

south asia: chapter 26, lesson one

View Set

Ecology Final: Ch 15, 16, 17, 18

View Set

ENVI: Chp. 4 Interrelated Scientific Principles: Matter, Energy and Enviroment

View Set

AC Sys, Lvl I - Lesson 2: Understanding Vectors and How to Use Them Effectively

View Set