CompTIA IT Fundamentals

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

an installer package file format used by Windows

.MSI

a text file that contains a sequence of commands for a computer operating system

.bat (batch file)

Which port does SMTP use? a. 25 b. 110 c. 143 d. 443

A - 25

What type of computer backup will back up all selected files and then clear the archive bit? a. Normal b. Differential c. Incremental d. Copy

A - A normal (or full) backup will back up all selected files and then clear the archive bit. An incremental backup will clear the archive bit as well, but it will not back up files that have not been changed since the last backup.

Which of the following contains a carcinogen and therefore needs to be recycled? a. Laser printer toner b. Inkjet ink cartridges c. Scanners d. Batteries

A - All of the answers (toner cartridge, inkjet cartridges, scanners, and batteries) should be recycled. The only one of the four that is a known carcinogen is laser printer toner.

One of your coworkers, Marc, is complaining that whenever he searches on the Internet, he always gets directed to the same website, which is not relevant for his needs. What could be the problem? a. His computer has adware b. He is typing in the wrong search terms c. He needs to update his browser d. He needs to disable autofill

A - Browser and search engine redirection are common symptoms of an adware infection. He should remove the adware immediately.

What is the proper way to dispose of a broken CRT monitor? a. Take it to a computer recycling center b. Discharge it with a high-voltage probe and throw it away c. Remove the glass screen and throw it away d. Cut off the power cord and throw it away

A - CRT monitors should be disposed of by taking them to a recycling center

Your manager just got a new workstation and is not part of a domain. He wants to know which user accounts he should disable to increase security. What should you tell him to disable? a. Guest b. Users c. Power Users d. Administrator

A - Disabling the Guest account is a good security measure to reduce the number of entry points a potential attacker could use. You cannot disable the Administrator account, although renaming it is a good idea.

What software is designed to let the OS talk to hardware? a. Driver b. Application c. Patch d. Virtual

A - Drivers are designed to let the OS talk to hardware. Each piece of hardware must have a driver to work with the operating system.

Which of the following is a more common name for ESD? a. Static electricity b. Radio frequency interference c. Magnetic interference d. Battery backup

A - ESD is short for electrostatic discharge, which is static electricity.

What is the maximum speed supported by cables connected with RJ-11 connectors? a. 56 Kbps b. 56 Mbps c. 480 Mbps d. 1.5 Gbps

A - RJ-11 connectors are on the ends of phone lines, which connect to modems. The fastest modems produced had speeds of 56 Kbps.

Jason, a user on your network, is configuring an email account on a new iPhone. Which receiving protocol should he use if he wants the most functionality? a. IMAP b. POP3 c. SMTP d. SNMP

A - The IMAP and POP3 protocols are use to retrieve email, and IMAP has more functionality than POP3. SMTP is for sending email. SNMP is a networking management protocol.

You are troubleshooting a Windows PC that will not load the operating system. You insert the Windows CD and reboot. Which utility can you use to repair Windows? a. Recovery Environment b. MSCONFIG c. System Restore d. Safe Mode

A - The Windows Recovery Environment is a feature of Windows Vista and newer setup programs that lets you repair an installation of Windows when booting to the installation CD. All of the other options require the OS to load before using them.

When considering ergonomics, where should the keyboard and mouse be placed? a. Level with the user's elbows b. Six inches below the user's elbows c. Six inches above the user's elbows d. On the computer desk where they work

A - The keyboard and mouse should be approximately level to the user's elbows, so the elbows can be at 90 degrees and there is little to no bend required in the user's wrists. If the desk does not allow for this, then adjustments to the desk or seating arrangement should be made.

You just copied a file named Proj1 from the Work directory to the Projects directory on your Windows PC. What happened to the orginal Proj1 file on the hard drive? a. Nothing b. The file was deleted from the Work directory and placed in the Projects directory c. The file was not moved, but a new pointer record was created associating the file with the Projects directory

A - When you copy a file, the original file remains intact, and a new version of that file is created elsewhere on the hard drive. The new version is associated with the new folder. Nothing happens to the original.

Renee has five workstations in an office and needs to share resources. Four of the computers are running Windows 7 and the fifth is running Mac OS X. What should she configure to share files? a. Workgroup b. Homegroup c. Peer-to-peer d. Client-server

A - With a mix of operating systems, including one that is not Windows-based, the workgroup option is Renee's only option. A workgroup is a form of peer-to-peer network.

Which of the following file systems can you rename a file when it's open? a. ext3 b. FAT c. HDDFS d. NTFS

A - With the FAT and NTFS file systems, you cannot rename a file, or change any of the metadata, while the file is open or in use. With ext3, you can. HDDFS is not a file system.

Which of the following are hard drive connector types? (Choose two.) a. PATA b. SATA c. PCIe d. AGP

A,B - Parallel ATA (PATA) and Serial ATA (SATA) are two hard drive connection types. PCIe and AGP are expansion slots.

Which two of the following statements are true regarding single sign-on? a. It is convenient for users. b. It can potentially cause security issues. c. It requires the use of multi-factor authentication. d. It does not work across different operating systems.

A,B - Single sign-on can be a convenience for users, but it does introduce potential security risks. It does not require multi-factor authentication, and it will work across different operating systems and software platforms.

Ray, a coworker, is concerned that his computer is infected with adware. What symptoms should you tell Ray to look for to confirm his suspicions? (Choose three.) a. Excessive popups b. Browser redirection c. Search engine redirection d. Multifactor login redirection

A,B,C - Adware can give you a barrage of popups as well as cause browser and search engine redirection.

Your boss wants to you justify your suggestion to purchase solid-state hard drives. What are advantages of solid-state drives? (Choose three.) a. Faster than HDDs b. Generate less heat than HDDs c. Quieter than HDDs d. Cheaper than HDDs

A,B,C - Solidstate drives (SSDs) are faster, generate less heat, and quieter than conventional HDDs. They are not cheaper per megabyte than HDDs, though.

What are the colors used by component video? (Choose three.) a. Red b. Blue c. Yellow d. Green e. White f. Black

A,B,D - Component video is also named RGB, standing for the three colors it uses: red, green, and blue.

123. Which components in your computer store data? (Choose three.) a. RAM b. SSD c. PCI d. PSU e. BDROM

A,B,E - RAM is memory, which is a temporary data storage area. SSD is a hard drive technology for data storage, and BDROM discs store data as well. PCI is an expansion slot type, and PSU is a power supply unit.

You are recycling nonworking computer parts. Which components contain capacitors and should not be opened? (Choose two.) a. CRT monitors b. LCD monitors c. Power supplies d. Spinning hard drives

A,C - CRT monitors and power supplies contain capacitors, which can store energy even after they are powered off and unplugged. Never open either one.

Which of the following are considered characteristics of a strong password? (Choose two.) a. Long b. Uses patterns c. Uses symbols, numbers, and letters d. Contains PII

A,C - Strong passwords are long, complex, and use a variety of symbols, numbers, and letters. Passwords should not contain any personally identifiable information (PII), and patterns in passwords make them easier to guess.

Due to a recent string of theft in your office, you need to harden your local system. What two actions are most appropriate for your situation? (Choose two.) a. Install a hardware lock b. Disable unused services c. Install antimalware d. Enable encryption

A,D - All four answers are devicehardening options. If you are worried about local theft, installing a hardware lock is a must. In addition, if your device does get stolen, encryption will prevent thieves from accessing your files unless they know your username and password.

Which of the following are considered physical security risks? (Choose two.) a. Hardware theft b. Password cracking c. Phishing d. Software theft

A,D - Examples of physical security risks include hardware damage and theft, software and license theft, shoulder surfing, and dumpster diving.

You are configuring a computer to participate on a network. Which of the following are mandatory? (Choose two.) a. IP address b. Default gateway c. DHCP server d. Subnet mask

A,D - For network communications on a TCP/IP network, an IP address and a subnet mask are required. If you want to communicate outside your network, a default gateway is also required. DHCP servers automatically assign clients IP configuration information.

Michael needs to connect two PCs directly to each other for large file transfers. What options does he have? (Choose two.) a. Cat 5 crossover cable b. Cat 5 patch cable c. Cat 5 duplex cable d. USB direct link cable

A,D - There are two options for directly connecting two PCs to each other. The first is a USB direct link cable. The second is a Cat 5 (or Cat 6) crossover cable. It needs to be a crossover cable so that the signals sent from one end are directed to the receive pins at the receiving end.

Which of the following devices are both input and output devices? (Choose two.) a. NAS b. Flat screen c. Scanner d. Webcam e. Smartphone

A,E - Network attached storage and smartphones are both input and output devices. Flat screens are output, whereas scanners and webcams are input devices.

Your network administrator tells you that recently there has been an upsurge in Internet-based attacks on your network. What two actions are most appropriate for you to take to harden your system in this situation? (choose two) a. Disable unused services b. Install a hardware lock c. Install anti-malware d. Enable encryption

A/C - All four answers are device-hardening options. If you are worried about Internet-based attacks, disabling services and installing anti-malware are the two best options. These two are the best for preventing attackers from gaining access to your system remotely.

Which of the following are options typically chosen when configuring localization during the OS setup wizard? (choose two) a. Country b. Color scheme c. Language d. Screen resolution

A/C - Localization refers to the country and other local settings associated with the computer, such as language, date and time, and how numbers and dates are displayed.

Which port does POP3 use? a. 25 b. 110 c. 143 d. 443

B - 110

What is the optimal humidity level for computer operation? a. 30 percent b. 50 percent c. 70 percent d. 90 percent

B - A good range for humidity for computers is between 40 and 80 percent, but the ideal is around 50 percent.

You have just installed a new printer on your computer, and while it seems to be recognized by the operating system, it will not print. What is the first source to check for information on the problem? a. The OS manufacturer's web site b. The printer manufacturer's web site c. Google search d. Internet technical community groups

B - Always check the manufacturer's web site first. Since it's hardware, check that manufacturer and not the OS manufacturer.

When providing computer support and testing solutions, what should you always do first? a. Assume user error b. Test the simple stuff c. Check Internet resources for solutions d. Establish a plan of action

B - Always test the simple stuff first. Assuming user error is not a good way to endear yourself to your clients.

What is the purpose of file extensions? a. To organize the files when viewing them b. To instruct the operating system on which application to use to open them c. To indicate which operating system these files will work with d. To specify which platform the files will work with

B - File extensions exist so that the operating system knows which application to open fro that file to work.

You are configuring a new workstation for an office. Three users might need to access the system. One of them, Charles, will need to occasionally perform administrative tasks. What type of user account should you create for Charles for his primary use? a. Guest b. User c. Power user d. Administrator

B - For primary use, all users should have a regular user account. Charles can also have access to an administrator account username and password for when he needs to perform his administrative tasks.

While troubleshooting a Windows computer that may have a bad memory module, the computer freezes and displays a blue screen with white text and a STOP error. What generated that error message? a. The memory module b. Windows c. BIOS d. MSCONFIG

B - STOP errors, also known as the Blue Screen of Death (BSOD), are generated by Windows. The faulty memory module may have caused the error, but Windows generated the message.

Rebecca, your boss, has recently been getting telephone calls from someone in the IT department telling her that her email account needs to be reset and asking for her password. What is this an example of? a. Email support management b. Social engineering c. Password cracking d. Shoulder surfing

B - Social engineering occurs when attackers ask people for information to help them gain access to sensitive information. In this case, it can be an attempt to crack Rebecca's password.

Which one of the following compression file extensions doesn't actually use compression? a. .rar b. .tar c. .7z d. .gz

B - The .tar (tape archive) file extension is listed among the compression file formats, but it doesn't actually use compression. All of the others do.

What is the secure file transfer protocol that uses SSH for security? a. FTPS b. SFTP c. HTTPS d. SHTTP

B - The Secure File Transfer Protocol (SFTP), also called the SSH File Transfer Protocol, uses SSH for security. It also uses port 22.

What is the last step in the process of troubleshooting a computer? a. Verify Internet functionality b. Document work c. Clean up mess d. Retest the solution

B - The last step in the troubleshooting process, and one that is often overlooked, is to document the work. (Cleaning up is important to do if you made a mess, but it's not specifically a step in the troubleshooting process.)

You need to purchase an inkjet printer cartridge, and you want to see what chemicals are in it. How do you obtain the MSDS for this product? a. You are not legally allowed to have an MSDS for this product. b. Visit the website of the printer cartridge manufacturer. c. The store is required to give you one at the time of purchase. d. It's contained in the packaging of the printer cartridge.

B - The manufacturer of the ink cartridge will have an MSDS on their website.

After installing several new software applications, your friend notices that her computer boots very slowly. Which tool can she use to disable programs from running on startup of Windows? a. Recovery Console b. System Configuration c. System Restore d. Safe Mode

B - The system configuration utility, or MSCONFIG, allows users to see which applications are loading at the startup of Windows. If too many programs load on startup, it will slow down the boot process.

Using an Android phone, you want to scroll up. What do you do to accomplish this? a. Swipe up b. Swipe down c. Pinch fingers together d. Start with pinched fingers and separate them

B - To scroll up, you need to "pull" the page down to swipe down.

An administrator has configured a network that has offices in London, Chicago, and Mexico City. What kind of network is it? a. LAN b. WAN c. Peer-to-peer d. Client-server

B - a network that spans multiple geographical locations is a wide area network (WAN). While it's most likely a client-server network, it could be either peer-to-peer or client-server depending on how it was set up.

You want to enable backups of your new iPhone. Which two options do you have? (Choose two.) a. iDrive b. iCloud c. iTunes d. iBackup

B,C - For syncing and backing up iPhones (and iPads), you can use iCloud to back up to the Internet or use iTunes to back up to a local computer.

When thinking of software compatibility, which two factors matter most? (Choose two.) a. If the software will work with other software on the computer b. If the software will work with the operating system c. If the minimum hardware requirements are met d. If the software comes with automatic updates

B,C - The two most important things to consider are if the software was written to work with that operating system and if the computer has enough hardware to run the application.

When configuring a wireless router, which of the following should you always do? (Choose two.) a. Enable DHCP. b. Change the SSID. c. Change the admin password. d. Configure the firewall.

B,C - You should always change the SSID and the administrator password on a wireless router.

Which port does IMAP use? a. 25 b. 110 c. 143 d. 443

C - 143

You are troubleshooting a PC, and see a gray textbased message about the boot disk on a black screen. What is the most likely source of this error message? a. Windows b. CHKDSK c. BIOS d. POST card

C - A blackscreen error usually comes from the BIOS, such as a message indicating that the hard disk is not bootable.

When cleaning a monitor, you should not use cleaning solutions that contain what? a. Water b. Alcohol c. Ammonia d. All of the above

C - Ammonia can run the coating on a monitor screen, so it should never be used. Many common glass cleaners contain ammonia, so be careful of them.

You need to purchase a battery backup system for a desktop PC. What type of device do you need? a. API b. RFI c. UPS d. EMI e. ESD

C - An uninterruptable power supply (UPS) is a device with batteries in it that can power a computer in the event of a power failure.

You are configuring an office with new computers. What should you recommend the temperature be set at for optimal desktop computer performance? a. Warmer than is comfortable for humans b. The same as is comfortable for humans c. Colder than is comfortable for humans, but not freezing d. Below freezing

C - Computers like it colder than humans do. Below freezing is not good though, because if there is frost, and it's heated by computer components, that can form water which can cause a short circuit.

Which of the following can cause data loss via crosstalk between adjacent cables? a. ESD b. RFD c. EMI d. MSDS

C - Electromagnetic interference (EMI) can cause loss of data due to crosstalk, which is when one electrical signal interferes with another.

What is the approximate minimum level of static charge for humans to feel a shock? a. 30 volts b. 300 volts c. 3,000 volts d. 30,000 volts

C - Humans can feel a shock of as little as 3,000 volts. However, computer equipment can be damaged by as little as 300 volts.

You have been asked to design a backup solution for your manager's workstation. Which option will be the fastest? a. Cloud b. Network storage c. Local storage d. They are all the same speed

C - Local backup solutions will always be faster than network storage or cloud-based solutions. This is because the transfer rate to a local hard disk or optical disc is faster than network connections.

Which of the following statements accurately describes password-cracking software? a. It's illegal in all circumstances b. It's legal in all circumstances c. It's legal if you own the computer or have express permission to use it d. It's legal on Windows systems only if you have the permission of the owner and Microsoft

C - Password crackers can be incredibly useful if you have a system where no one knows the password, yet you need access. The key is you need to own the system or have permission to crack the password. You do not need Microsoft's permission for password cracking on a Window's machine.

Previously, your network required you to enter passwords for four different systems when you logged on at the beginning of your shift. Now you only need to enter your password once to access all four systems. What is this an example of? a. Multi-factor authentication b. Password convergence c. Single sign-on

C - Single sign-on means you only have to supply your login credentials once, and the authenticating system passes your credential on to other systems on the network. It can be convenient for end users but can also potentially create security holes.

In troubleshooting theory, what is the first step toward solving a problem? a. Establish a theory of probable cause b. Test the simple stuff first c. Identify the problem d. Reboot

C - The first step in troubleshooting is to identify the problem. This can involve talking to end users, gathering information, and trying to isolate the problem.

A technician just installed a new scanner on a computer. The light turns on but it won't scan. What resource should she consult first for more information? a. Her manager b. The computer's documentation c. The scanner manufacturer's website d. Technical community support groups

C - When there is an issue with a hardware component, always check the manufacturer's website for information on solving the problem. It could be a driver issue or another issue for which they will have troubleshooting tips.

If you want to plug in a keyboard, which types of connectors might you use? (Choose two.) a. Parallel b. Serial c. USB d. PS/2

C,D - Keyboards can be plugged into either USB or PS/2 ports. Parallel ports were used for printers, and serial ports were used for modems and older mice.

Which of the following file formats were designed to replace .mp3? (Choose two.) a. .mp4 b. .flac c. .aac d. .m4a

C,D - The .aac and .m4a file formats are designed to replace .mp3. There is no .mp4 format, and .flac is a competing standard.

Which port does HTTPS use? a. 25 b. 110 c. 143 d. 443

D - 443

You have four AA alkaline batteries that you just removed from a remote control device. What is the recommended way to dispose of these batteries? a. Throw them in the trash. b. Flush them down the toilet. c. Incinerate them. d. Take them to a recycling center.

D - Batteries should always be taken to a recycling center to dispose of them properly.

What technology can easily be used to create an ad hoc network for sharing of pictures or contacts? a. Wi-Fi b. NAS c. Direct link d. Bluetooth

D - Bluetooth networks can be created ad hoc, and they allow for wireless transfer of files such as pictures or contacts.

Which hard drive connector will give you the greatest speed? a. PCIe b. AGP c. PATA d. SATA

D - Serial ATA (SATA) is faster than Parallel ATA (PATA). PCIe and AGP are expansion slot types.

Which of the following is not a file extension for image files? a. .jpg b. .gif c. .png d. .avi

D - The .avi file extension is for video. .jpg, .gif, and .png files are all image files.

Which of the following must contain information about a liquid monitor cleaner's emergency cleanup procedure? a. Product label b. CRT c. OSHA d. MSDS

D - The MSDS contains information about chemical properties of the cleaner, as well as emergency cleanup procedures.

Which external storage connection type requires the external hard drive to supply its own power? a. Thunderbolt b. USB c. FireWire d. eSATA

D - The eSATA connector is the only one that does not provide power. All of the others do.

Ron's computer behaves normally for a time, and then his screen completely freezes up. The mouse and keyboard do not respond. What is the most likely cause of his problem? a. Faulty video driver b. Faulty mouse or keyboard driver c. Failing hard drive d. Overheating

D - The most likely cause of intermittent hard locks like this is an overheating system. Power the system down, give it a chance to cool off, and then inspect for damage or excessive dust in the fans. With the case open, power it back on and ensure that all cooling fans are running.

After downloading and installing a new application, your Windows 8 computer is now booting very slowly. Which tool should you use to check to see which programs are running on startup of Windows? a. Recovery Console b. Safe Mode c. Startup Editor d. MSCONFIG

D - The system configuration utility, or MSCONFIG, allows users to see which applications are loading at the startup of Windows. If too many programs load on startup, it will slow down the boot process.

Your computer has been running backups for a year. Today, you make a change from backing it up to an external optical drive to backing it up to the cloud. What should you do next? a. Secure the cloud backup location b. Schedule regular cloud backups c. Destroy the old optical discs d. Verify that the cloud backup works

D - Whenever setting up a new backup system or making a change to an existing backup solution, verify that the backup works. Once you have done that, then you can perform other tasks.

a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.

Dynamic Host Configuration Protocol (DHCP)

The managers at your company have decided to implement stricter security policies. Which of the following login schemes will help them achieve this goal? a. Single signon b. Multifactor authentication c. Password confidentiality d. HTTPS

B - Multi-factor authentication increases security by requiring users to use more than one method to authenticate. They need to use two or more items among something they know, something they have, and something they are.

Ronnie is configuring a new iPad to receive email from the corporate email server, which supports POP3. What port number does POP3 use? a. 25 b. 110 c. 143 d. 443

B - POP3 uses 110, IMAP uses port 143, and SMTP uses 25. HTTPS uses port 443.

You need to set up a wireless network. Which standard will give you the highest speed? a. 802.11a b. 802.11ac c. 802.11g d. 802.11n

B - The 802.11ac standard is the fastest one available on the market today. In this list, 802.11n is the next fastest, followed by 802.11g and then 802.11a.

What is the name of the round connector that is used for keyboards and mice? a. USB b. PS/2 c. DIN d. Serial

B - The PS/2 connector is round and used for keyboards and mice. USB is also used for both devices, but it is rectangular.

Your friend recently got a new Android phone and comes over to your house. What app does your friend use to set up a WiFi connection with your wireless router? a. WiFi b. Settings c. Networking d. Connections

B - The WiFi settings are in the Settings app in Android as well as in iOS.

What is the name of the component that controls communication between the processor and memory? a. Motherboard b. Chipset c. CPU d. Expansion bus

B - The chipset on the motherboard controls communications between the processor (CPU) and memory (RAM). The motherboard itself just provides connectivity.

Which component inside a computer produces the most heat? a. PSU b. CPU c. GPU d. RAM

B - The processor, or CPU, produces the most heat of any internal component. Care must be taken to ensure that the heat is properly dissipated or the processor will fail.

You just deleted a shortcut to an important work presentation. What happened to the data in the presentation? a. Nothing. b. It's in the Recycle Bin/Trash. c. It's deleted. d. It's in the recovery partition

A - When you delete a shortcut, nothing happens to the file the shortcut pointed to. The shortcut is just an easy way to access the file.

Which one of the following types of network connections can give you the highest data transfer rates? a. Wired b. Cellular c. Broadband d. Wireless

A - Wired networks can provide the highest data throughput rates of any of the connection types.

Word processing, spreadsheets, and presentation software are examples of what? a. Productivity software b. Collaboration software c. Utility software d. Operating system addins

A - Word processing, spreadsheets, and presentation software are three examples of productivity software. Other types are email, PDF viewers, desktop publishing, personal information manager, and remote desktop software.

You are configuring a workstation, and are setting the video resolution. After selecting the resolution, the screen goes black. What should you do? a. Wait 15 seconds for the image to reappear b. Turn off the monitor and turn it back on c. Reboot the workstation d. Restart the operating system setup wizard

A - You probably chose a resolution that is not supported by the monitor, and it can't display it. If you wait for 15 seconds, the system will revert back to the previous setting, which you should be able to see. Then choose a different resolution.

You are going to purchase a new iPhone. Which operating system will be installed on it? a. iOS b. OS X c. iPhone OS d. Android e. iDontKnow

A - iPhones come with the iOS operating system.

IT security recently found a program on your coworker's computer that apparently tracked all of the words that they typed into the computer. What kind of malware is this? a. Keylogger b. Keyblogger c. Trojan horse d. Keystroke virus

A - A keylogger is a program that tracks a user's keystrokes and then transmits that information back to the attacker. This can be used to gather usernames and passwords.

If you were setting up a network on one floor of an office building, what type of network would that most likely be? a. LAN b. WAN c. Peertopeer d. Clientserver

A - A small network in one geographical location is a local area network (LAN). It could be either peertopeer or clientserver depending on how you set it up.

What are the utilities in an OS called that enable programs such as a screen reader? a. Accessibility options b. Reading options c. User options d. User account settings

A - Accessibility options allow you to configure a computer to be easier for people with disabilities to use.

Which one of the following addresses is considered a private IP address? a. 192.168.100.101 b. 168.192.100.101 c. 19.21.68.100 d. 172.15.100.101

A - Addresses that are in the 192.168.x.x range are private IP addresses, as are those in the 10.x.x.x range and the 172.16.x.x-172.31.x.x range.

Which of the following types of monitors is most likely to have a Degauss button on it? a. CRT b. Flat screen c. Touchscreen d. Projector

A - CRT monitors used vacuum tubes to show images, which sometimes built up static charges. The Degauss button removed the built up charges.

Which of the following connectivity options gives you the best mobility? a. Cellular b. Wireless c. Wired d. Broadband

A - Cellular networks give you the best mobility, with a range of up to several miles. Even then, unless you go out of the range of a tower completely, you will be handed over to the next cell tower.

Which of the following is not a way to open the Start menu on a Windowsbased computer? a. Ctrl+S b. Ctrl+Esc c. Click the Start button d. Press the Start key on the keyboard

A - Ctrl+S is usually a hot key to save a file within Word or Excel. It does not open the Start menu.

You want your computer to be able to get on the Internet. Which one of the following is not required? a. DNS server b. IP address c. Default gateway d. Subnet mask

A - For your computer to get on the Internet, three parameters are required: an IP address, a subnet mask, and a default gateway. A DNS server will be very handy to have, but it's not required.

You want to use the video connector with the best resolution. Which one should you pick? a. HDMI b. HEMI c. DVI d. Component

A - HDMI is the best video connection standard available today. DVI and component video are older standards. HEMI is not a video connector.

Rose opens her software application and gets a message stating that she has only 16 more uses of the product available. Given this scenario, what is her best course of action in order to use it more than 16 additional times? a. Activate the software. b. Register the software. c. Uninstall and reinstall the software. d. Not close the application any more.

A - If a software product is giving you a limited number of uses, you must activate that software with the manufacturer. This typically requires you to have a software license and a product key.

What type of connector do you plug into a modem? a. RJ11 b. RJ15 c. RJ41 d. RJ45

A - RJ11 connectors are used at the ends of phone lines, which are plugged into modems. RJ45 connectors are used on the ends of twisted pair network cables.

Claire, a coworker, is browsing the Internet and wants to know if it's safe to enter her credit card information into a website. What do you tell her to look for? a. HTTPS:// b. HTTP:// c. SSL:// d. TLS://

A - Secure websites start with HTTPS://. Also tell her to look for the lock symbol nearby.

Susan wants to play the games that come with Windows on her computer, but they are not on the Start menu. What should she do in this scenario? a. Install the games from Control Panel. b. Install the games from Windows Update. c. Install the games from System Update. d. Delete and reinstall Windows.

A - Susan can go into the Software app in Control Panel to install or remove OS features, such as games.

Which of the following image formats produces the best quality images? a. .tiff b. .bmp c. .jpg d. .gif

A - The .tiff format produces the best quality images, along with .png.

When you turn on your computer, it tells you that it does not have the time and date set and asks you to enter setup. What likely needs to be replaced? a. CMOS battery b. BIOS chip c. CPU d. Time controller

A - The BIOS stores configuration information such as time and date but is powered by the CMOS battery when the system is off. If the CMOS battery fails, the system will no longer retain its BIOS configuration.

By definition, what is an SSID? a. A wireless network name b. A wireless network security protocol c. A wireless network security password d. A wireless network authentication method

A - The Service Set Identifier (SSID) is the wireless network name.

Using an Android phone, you want to scroll down. What do you do to accomplish this? a. Swipe up b. Swipe down c. Pinch fingers together d. Start with pinched fingers and separate them

A - To scroll down, you need to "pull" the page up, so swipe up.

You have just purchased licensed software and want to install it. Which of the following are you required to enter to install this software? a. Your name and contact information b. The product key c. The serial number of your processor d. None of the above

B - The product key will be required to install or use any licensed software product. The manufacturer will include this on the installation media or email it to you.

A friend of yours bought a computer from a major manufacturer. On it is bundled software that she does not want. When is the appropriate time during the setup process to uninstall this software? a. After installing security software b. After configuring peripherals c. During the initial operating system setup wizard d. After configuring and verifying the Internet connection

B - Per the exam objectives, uninstalling unneeded software should occur after plugging in cables, powering on the computer, setting up the OS, installing security software, and configuring peripherals.

You want to share files among six computers, all running Windows 8. You do not want to have to create user accounts for each user on all six computers. What should you use? a. Workgroup b. Homegroup c. Clientserver d. Ad hoc network

B - Since all client computers are running Windows 7, you can create a homegroup. A homegroup requires a password to join, and you are able to share files across the network without requiring the users to have individual accounts on all computers.

What type of expansion card allows your computer to talk to other computers, without wires? a. Modem b. NIC c. PSU d. PCIe

B - A network interface card (NIC) lets your computer participate on a network, either wired or wireless. Modems require telephone lines. PSU is a power supply unit and PCIe is an expansion slot type.

What type of malware is best known for carrying other malware as a payload? a. Virus b. Worm c. Trojan horse d. Rootkit

B - A worm is a piece of selfreplicating malware that can either do damage itself or act as a transport for other malware. If acting as a transport, the malware it carries is its payload.

Which of the following is not a function of an operating system? a. Interface between the user and the machine b. Coordinate software applications c. Coordinate hardware components d. Monitor system health

B - An operating system provides an environment for the software to function but does not coordinate between software applications.

Which of the following would not be considered metadata for a spreadsheet file? a. Readonly attribute b. Calculations inside the file c. Name of the file d. File size

B - Any data or information inside a file is part of the file itself, not the metadata for the file. Metadata is information about the file, such as its name, size, creator, and security.

Which technology refers to online storage, and means that there is not a one-to-one relationship between the hardware and the server? a. Cloud computing b. Virtualization c. Server farm d. Spanning

B - Cloud computing uses virtualization, which means that multiple servers can be created on one physical server.

You have a color inkjet printer. What type of ink cartridge does it most likely use? a. CMYB b. CMYK c. RGB d. ROYGBIV

B - Color inkjet printers use cyan, magenta, yellow, and black ink. Those cartridges are called CMYK.

What type of power do internal computer components require? a. AC b. DC c. LVC d. HVC

B - Computer components require direct current (DC). Power supplies convert alternating current (AC) from wall sockets into DC.

Your computer is quickly running out of hard drive space, and you need to transfer several large files from another computer to yours. You need a fast and cheap solution. What type of storage should you get? a. NAS b. DAS c. Network drive d. P2P

B - Direct attached storage (DAS) is the best choice here for quick and cheap storage. DAS can be as simple as an external hard drive.

Someone was recently caught sifting through your company's trash looking for confidential information. What is this an example of? a. Trash snooping b. Dumpster diving c. Phishing d. Social engineering

B - Going through the trash to find confidential information is considered dumpster diving, and it's illegal in most areas. Social engineering means trying to get information out of another person. Phishing is social engineering via email.

From the hard drive's perspective, moving a file is analogous to which of the following actions? a. Copy and paste b. Cut and paste c. Delete and paste d. Renaming

B - Moving a file is analogous to a cut and paste. It takes the file from one folder and places it in another.

The system administrator in your office quits unexpectedly in the middle of the day. It's quickly apparent that he changed the server password and no one knows what it is. What might you do in this type of situation? a. Use a Trojan horse to find the password b. Use a password cracker to find the password c. Use social engineering to find the password d. Delete and reinstall the server

B - This is one case where using a password cracker is legal and helpful. Just don't ever use one on a system where you don't have explicit permission to do so!

What is the name of the connector that you are likely to find at the end of a twisted pair network cable? a. RJ11 b. RJ45 c. HDMI d. FireWire

B - Twisted pair network cables are terminated with RJ45 connectors.

What aspect ratio do widescreen computer monitors typically use by default? a. 16:9 b. 16:10 c. 4:3 d. 3:2

B - Widescreen monitors use 16:10 aspect ratios. High definition televisions use 16:9, and standard VGA monitors use 4:3.

When configuring your manager's new iPad, she asks you what protocol is used by the email client to send email. What do you tell her? a. IMAP b. POP3 c. SMTP d. SNMP

C - SMTP is used to send email. IMAP and POP3 are receiving protocols. SNMP is a network management protocol.

Which of the following are required to join a homegroup? (Choose two.) a. All computers on the same local network b. A password c. File and print sharing enabled d. Windows 7 or newer

B/D - To join a homegroup, the computer must be running Windows 7 or newer. The person who wants to join must also know the password to the homegroup.

What is it called when a coworker sitting next to you always seems to look your way when you try to enter your user ID and password to log onto the network? a. Phishing b. Social engineering c. Shoulder surfing d. Coincidence

C - Shoulder surfing is trying to see private information on someone else's computer. This can include information on the computer screen, but also can be something like trying to see a password.

You receive a security warning from your antivirus software provider stating that a new virus is directly attacking the antivirus software. What type of virus is this? a. Macro b. Phage c. Retrovirus d. Armored

C - A retrovirus works by directly attacking antivirus software designed to keep it at bay. If the virus can disable the antivirus software, then it can infect the computer.

You want to upgrade your computer to give it a faster boot time and more space for your files. What should you purchase? a. RAM b. HDD c. SSD d. CPU

C - A solidstate drive (SSD) will provide faster bootup times than a conventional hard disk drive (HDD). Neither RAM nor CPUs provide storage space.

Rose just installed a new search engine on her laptop. Now whenever she searches the Internet, she gets several popup windows directing her to websites to buy products. What does Rose have? a. Ransomware b. Spyware c. Adware d. Trojan horse

C - Adware will create popups advertising websites, even when you don't want it to. It's possible it was attached to the search engine that Rose downloaded.

What kind of network is specifically associated with Bluetooth devices? a. LAN b. WAN c. PAN d. MAN

C - Bluetooth devices create personal area networks (PANs) called piconets. Multiple piconets can be connected to form a scatternet.

Which of the following is not a basic function of an operating system? a. Monitor system health b. Coordinate hardware components c. Provide antivirus protection d. Display file structure and directories for data management

C - By default, operating systems typically do not provide antivirus protection.

Which of the following statements is true about DVI connectors? a. They are digital only. b. They are analog only. c. They are digital and analog. d. They support hybrid video technology.

C - DVI connectors are digital in nature, but they are backward compatible with analog VGA devices.

Which type of printer uses a fuser that gets hot and melts the image into the paper? a. Thermal b. Inkjet c. Laser d. Fusing

C - Laser printers use a fuser, which heats and melts the toner into the paper.

Linux is defined as a _____, which is also the core of an operating system. a. Distribution b. Version c. Kernel d. Shell

C - Linux is a kernel, which is the core of an OS. Linux packages are put together as distributions and marketed as such.

When configuring a new workstation with Windows 8, you choose the wrong localization setting for this particular user. What is the easiest way to fix this setting? a. Delete and reinstall Windows 8 b. Reboot the computer and rerun the OS setup wizard c. Change the option in Control Panel d. Use the localization rollback option in the setup wizard configuration utility

C - Localization settings are chosen during the initial setup wizard, but can easily be changed in Windows Control Panel.

Mac OS X disk image files have what extension? a. .osx b. .img c. .dmg d. .iso

C - Mac OS X disk image files have a .dmg extension.

Which of the following file formats indicates a program that can be run on a Macintosh computer? a. .msi b. .bat c. .app d. .prog

C - Macs use .app files as applications.

You are configuring a wireless router to let clients get on the Internet while using private IP addresses. In this scenario, which of the following services do you need to make sure is enabled on the router? a. DHCP b. DNS c. NAT d. APIPA

C - Network Address Translation (NAT) is a service run on a router that translates private IP addresses into a public IP address, so you can get on the Internet.

Which type of expansion slot provides the fastest data transfer speeds? a. PCI b. PCIe x1 c. PCIe x16 d. PCIe x64

C - PCIe is the fastest expansion slot standard in the market today. PCI is much older and slower. Of the PCIe slots, PCIe x16 is the fastest. There is no PCIe x64 (not yet anyway).

John purchases a singleuser software license for an application and installs it on his desktop. Then he installs it on his laptop computer. In this scenario, which of the following statements is true? a. John can use the application on both computers at the same time. c. John can use the application on only one of the computers. b. John can use the application on both computers but only one at a time. d. John can share the application with his friends to install on their computers.

C - Single user software licenses typically state that the software can be used on only one computer. John should uninstall it from the second computer unless he purchases a second license.

You are configuring a new workstation for an engineer who has a special printer he needs attached to his system. When should you perform this task? a. When plugging in all of the cables b. Before installing security software c. After installing security software d. After configuring and verifying the Internet connection

C - The best time to install and configure peripherals is after installing the security software.

You recently purchased a workstation and brought it home. After unpacking it, what is the first step you should perform to set it up? a. Power on the computer b. Perform computer registration c. Plug in the cables d. Configure the Internet connection

C - The first step in setting up a workstation is to plug in the cables.

What is the term used that refers to connecting two Bluetooth devices together for communications? a. Synching b. Netting c. Pairing d. Partnering

C - To have two Bluetooth devices communicate with each other, they need to be paired.

Your friend Michael is setting up a wireless network and asks you which security option he should choose to make the network the most secure. What do you suggest? a. WEP b. WPA c. WPA2 d. NAT

C - WPA2 is the most secure wireless security protocol in use today.

Agi has an iPhone with a biometric scanner enabled. What methods can she use to unlock her phone? a. Fingerprint only b. Passcode only c. Fingerprint or passcode d. Fingerprint, passcode, or iris scan

C - With biometrics enabled, she can use either the passcode or her fingerprint to access a locked device.

Which of the following actions is not considered a webbrowsing best practice? a. Limiting the use of PII b. Disabling Autofill c. Closing untrusted source warnings d. Updating plugins and toolbars

C - You should recognize untrusted source warnings and act on them appropriately. Good practices include limiting the use of personally identifiable information (PII), disabling Autofill, and updating plugins, toolbars, and extensions.

What is the name of an application that appears to look like a helpful application but instead does harm to your computer? a. Virus b. Worm c. Malware d. Trojan horse

D - A Trojan horse might look like helpful software but will actually do harm to your computer. An example could be a program that looks like a security scanner but actually installs malware. (Ironic, isn't it?)

Which of the following types of networks offers centralized security and resource administration? a. LAN b. WAN c. Peertopeer d. Clientserver

D - A client server network is one where servers control security for the network, as well as provide resource sharing and management.

What option can you configure on your workstation to increase security when you leave your desk? a. File encryption b. Multifactor authentication c. Single signon d. Screensaver password

D - A screensaver password will require someone to enter your password to gain access to the computer. File encryption won't help if the attacker has access to the computer as you.

You are configuring a new workstation for a user. After configuring the computer to have an Internet connection, what should you do next? a. Install additional software (if applicable) b. Run software and security updates c. Create other user accounts (if applicable) d. Verify the Internet connection

D - After configuring the Internet connection, verify that it works! The next step in the process after configuring and verifying the Internet connection is to install additional software, if applicable.

You have been asked to set up a workstation for a client. You have performed all of the steps up to configuring and verifying the Internet connection. What should you do next? a. Install security software b. Create additional user accounts c. Run software and security updates d. Install additional software

D - After setting up and verifying the Internet connection, the next step is to install additional software (if applicable). If the user does not have any additional software to install, then proceed on to updating security and other software.

Which of the following operating systems are susceptible to viruses? a. Windows b. Windows and Mac OS X c. Windows, Mac OS X, and Linux d. Windows, Mac OS X, Linux, and Android

D - All current enduser operating systems are susceptible to viruses and malware.

Which of the following optical discs will store the most data? a. CDROM b. DVDROM c. DVDROM DS b. DVDROM DL d. BDROM

D - Bluray discs (BDROM) store 25 GB per side per layer. That's far more than DVDs or CDs.

On which OS would you use the Ctrl+Window Switcher key to create a screen capture? a. Windows b. Linux c. Mac OS X d. Chrome OS

D - Chrome OS uses the Windows Switcher key to create a screen capture.

You are using Google Chrome and you want to browse a website but not have the website stored in your browsing history. What should you do? a. Log in as someone else to browse the site b. Configure independent browsing c. Use InPrivate d. Use Incognito

D - Chrome's version of private browsing is called Incognito. Microsoft's version of private browsing is called InPrivate.

What type of network model is also called a domain? a. LAN b. WAN c. Peertopeer d. Clientserver

D - Clientserver networks are also called domains. A server (or multiple servers) manages security and is often called a domain controller.

You are troubleshooting a MacBook Pro. When it turns on, you receive a screen with a flashing question mark. What is the likely cause? a. Device driver failure b. Video card failure c. Memory failure d. Hard drive failure

D - If the hard drive is not detected, or if a specific folder needed to load Mac OS X is not detected, the Mac will display a flashing question mark.

You are setting up a workstation and have configured the screen resolution. After choosing a resolution, the image on the screen appears distorted. What is the most likely cause of the problem? a. The monitor is failing b. The resolution is set too high for the monitor c. The resolution is set too low for the monitor d. The resolution is at the wrong aspect ratio

D - If the image is distorted, it's most likely due to an aspect ratio that is not correct for the monitor. For example, if you selected a standard resolution for a widescreen monitor, the image would be distorted.

Martha has a printer attached to her workstation with a USB cable. Monday morning she calls in sick and her computer is off. Which of the following is true? a. Other users will be able to print to the printer with no problems. b. Other users need to turn the printer on, and then they can print with no problems. c. Other users should map it as a network printer, and then they can print with no problems. d. Other users will not be able to print.

D - If the printer is attached to Martha's local computer, then her system needs to be operational for others to use her printer.

Susan has configured a peer-to-peer network at her company with her four coworkers. Each coworker will share vital files from their computer with everyone else in the workgroup. How many total user accounts are needed on this network? a. 5 b. 10 c. 20 d. 25

D - In this situation, all users will need user accounts on all computers. Five users on five computers means 25 total user accounts.

Which type of printer uses a powdery substance to create images on paper? a. Powder b. Thermal c. Inkjet d. Laser

D - Laser printers use toner, which is an inklike plastic powder. The toner is held to the paper via weak electrical charges and then melted onto the paper via the printer's fuser.

Which of the following operating systems can you freely modify if you choose? a. OS X b. iOS c. BlackBerry d. Linux

D - Linux is the only opensource OS discussed in this book.

You receive an email from your bank, telling you that your account has been compromised and you need to validate your account details or else your account will be closed. You are supposed to click a link to validate your information. What is this an example of? a. A security breach at your bank that needs to be resolved b. Spam c. Ransomware d. Phishing

D - Phishing is a form of social engineering where an attacker sends an email asking for personal information to use in an attack. This might also be considered spam, but phishing is more specific here.

Rachel is using her iPad to view pictures. She turns the iPad 90 degrees and the image turns as well. Which sensor allowed this to happen? a. Accelerometer b. Magnetometer c. Turnometer d. Gyroscope

D - The gyroscope detects rotational movement within a mobile device.

You are installing a new computer, and have just created additional user accounts. What is the next step you should perform? a. Update security and software b. Configure peripherals c. Configure and verify Internet connection d. Perform cable management

D - The last step in the workstation setup process is to perform basic cable management tasks, such as moving them out of the way and securing them.

You enabled file encryption on your local computer. While you were on vacation, one of your coworkers managed to get on your computer and share your important files with other users. How did they do this? a. They logged on and disabled encryption. b. They used the Disk Recovery tool to access the encrypted files. c. All users logging into the system have access to encrypted files. d. They logged on with your username and password.

D - The only plausible answer is that someone else had your username and password and logged onto the computer as you.

You are setting up a new WiFi connection on your Android phone. What step do you take after turning on WiFi? a. Verify wireless capabilities. b. Enter the wireless password. c. Verify the Internet connection. d. Locate SSID.

D - The proper steps in order are to verify wireless capabilities, turn on WiFi, locate SSID, enter the wireless password, and verify the Internet connection.

Which motion while using an iPhone allows you to zoom in on a map? a. Tap b. Double tap c. Pinch d. Reverse pinch

D - To zoom in on a map, you use reverse pinch.

If your computer runs low on RAM, what will it use instead? a. Cache b. SSD c. Optical drive d. Virtual memory

D - Virtual memory is hard drive space used as extra memory, if your system runs low on physical memory. It's slower than physical memory, though.

Your friend Maria asks you which of the following are the most secure. What do you tell her? a. 802.11n b. Infrared c. Cellular d. UTP

D - Wired connections are more secure than wireless ones, and the only wired connection listed is UTP.

You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts you realize you forgot your password. What can you do? a. Use the password reset option in your router configuration utility. b. Unplug the router and plug it back in. c. Use the default password of admin. d. Hold the reset button down for 30 seconds to reset the router.

D - Wireless routers will have a reset button on their bottom or back. Press and hold the button for about 30 seconds and the router will reset to factory specifications. If you never changed the password, then using admin would work, but I am hoping you changed the password!

With which of the following file systems can you not rename a file when it's open? a. ext3 b. ext4 c. XFS d. NTFS

D - With the FAT and NTFS file systems, you cannot rename a file, or change any of the metadata, while the file is open or in use.

Your coworker Rachel has recently discovered that when she starts typing her name into a field in a web browser, her whole name appears as well as her address in the appropriate boxes. What is this due to? a. Adware infection b. Single signon c. Suspicious hyperlinks d. Autofill

D -Rachel is experiencing Autofill, which is a feature in a browser that automatically populates your information in the right fields when you start entering any of the information. It can be convenient, but it can also be a potential security risk.

Which of the following are activities that a hacker might attempt? a. Stealing usernames and passwords b. Modifying website content c. Disrupting network communications d. Analyzing network traffic e. All of the above

E - Hackers may have different motivations, but their activities can include stealing usernames and passwords, modifying website content, disrupting network communications, and analyzing network traffic.


Ensembles d'études connexes

Test 4 Chapter 9: The Russian Domain

View Set

Adaptive Quizzing - Endocrine System

View Set

Prep U Chapter 34: Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set

BLAW Chapter 13 and 14 12:20 Study Guide

View Set

Accounting 101 Chapter 7 (Practice Multiple-Choice Questions)

View Set