A+ 220-1001/2 Review Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many pins on an HDMI port? ______ pins

19 pins

How many pins on a DisplayPort?

20 pins

How many pins on an RJ-11 phone port?

4 pins

In which of the following file extension types would a user expect to see the command. "net use T:\\server\files'? A. .bat B. .vbs C. .js D. .py

A. .bat

How many disk can I lose in a RAID 0 A. 0 B. 1 C. 2 D. 3

A. 0

How many host on a /31? A. 0 B. 1 C. 2 D. 3

A. 0

How many host on a /32? A. 0 B. 2 C. 3 D. 1

A. 0

Each SATA host adapter port supports how many devices A. 1 B. 2 C. 127 D. 15

A. 1

172.30.15.12 in binary A. 10101100 00011110 00001111 00001100 B. 11111111 11111111 00000000 00000000 C. 10101100 00011110 00010000 01100101 D. 10101100 00011111 00010000 01100101

A. 10101100 00011110 00001111 00001100

USB 1.1 supports speeds of A. 12 Mbps B. 480 Mbps C. 5 Gbps D. 10 Gbps

A. 12 Mbps

How many host can i have on each network in a /25 network? A. 126 B. 128 C. 256 D. 254

A. 126

How many pins are on a SATA power connector? A. 15 B. 7 C. 8 D. 24

A. 15

How many pins are in a HDMI Type A connector? A. 19 pins B. 20 pins C. 29 pins D. 15 pins

A. 19 Pins

Match each letter with the correct answer. A. ATX B. Micro-ATX C. Mini-TIX 1. 6.7 inches by 6.7 inches 2. 12 inches wide by 9.6 inches deep 3. 9.6 inch by 9.6 inch

A. 2 B. 3 C. 1

_____ cases are usually used for PC servers. A. Full tower B. Mid tower C. Mini tower D. Slimline

A. Full tower

A sector on a hard disk storing information about partitions configured on the disk. A. MBR B. BCR C. Regedit D. MSinfo32

A. MBR

Information sheet accompanying hazardous products or substances explaining the proper procedures for handling and disposal. A. MSDS B. MSSD C. DSSM D. DSMS

A. MSDS

This provides the interface between the hardware, application programs, and the user. A. OS B. IS C. OI D. SI

A. OS

A system for structuring documents so that they are human- and machine-readable. Information within the document is placed within tags, which describe how information within the document is structured. A. XML B. HTML C. Pascal D. CODA

A. XML

One of the main criminal uses of Trojans is to install spamming software on the ____ PC. A. Zombie B. BotMaster C. CyberNet D. Telnetwork

A. Zombie

With a DDoS attack, the attacker will first compromise a handler machine that then compromise multiple devices that are called what? A. Zombie B. ForgeNet C. WoW D. NES

A. Zombie

A complete loss of electrical power A. blackout B. brownout C. sag D. surge

A. blackout

The provider's ability to control a customer's use of resources through metering is referred to as _______. A. measured service B. resource pooling C. rubber-banding D. elasticity

A. measured service

If a power wire is yellow what is the voltage? A. +5 V B. +12 V C. -12 V D. +3.3 V E. +5 V Standby

B. +12 V

Thunderbolt version 1 supports speeds up to what? A. 5 Gbps B. 10 Gbps C. 15 Gbps D. 20 Gbps

B. 10 Gbps

What network does the Host IP address 10.32.29.24/19 reside on? A. Can't determine base on information given B. 10.32.0.0 C. 10.32.32.0 D. 10.29.0.0

B. 10.32.0.0

How many pins will I find on a second generation i7? A. 1366 B. 1156 C. 1155 D. 2011

B. 1156

Group Policy files for registry-based policy management. The files have the .ADM file extension. A. Administrator account B. Administrative Templates C. AD DS D. app scanner

B. Administrative Templates

The technology used with iOS devices that allow you to play songs on your personal motorized carriage device. A. Android Auto B. Apple CarPlay C. UPlay D. MediaCenter

B. Apple CarPlay

You connect a laptop dock to a large external monitor. Which of the following connections would carry both audio and video with the HIGHEST quality? A. USB 2.0 B. Displayport C. DVI-Digital D. DVI-Integrated

B. Displayport

You need to buy a printer that is capable of printing on both sides. What option do you need on the printer? A. Collate B. Duplex C. Fast draft D. Paper type

B. Duplex

This parameter is the IP address of a router to which packets destined for a remote network should be sent by default. A. gateway B. default gateway C. ip gateway D. static gateway

B. default gateway

Different versions of Linux are also called what? A, Red Hat B. distributions C. SUSE D. Debian

B. distributions

A type of impact printer that uses a set of pins to strike the ribbon to create printed characters and images using combinations of dots. A. tracker fed printer B. dot matrix printer C. thermal printer D. inkjet printer

B. dot matrix printer

Which of the following cables do not support power. A. USB B. eSATA C. Thunderbolt D. Lightning

B. eSATA

What is the term for when a system is no longer supported by its developer or vendor. A. legacy B. end of life system C. dead D. old

B. end of life system

A characteristic that can be associated with a file or folder that provides the operating system with important information about the file or folder and how it is intended to be used by system users. A. file status B. file attribute C. file explorer D. FAT

B. file attribute

An electrical pathway on the motherboard or through cabling that carries the signals is referred to as a _____

Bus

If a power wire is colored Blue what is the voltage? A. +5 V B. +12 V C. -12 V D. +3.3 V E. Ground

C. -12 V

What is the range of port numbers? A. 0 - 65,000 B. 1 - 65,535 C. 0 - 65,535 D. 0 - 65,530

C. 0 - 65,535

What is the broadcast address of 123.123.123.123/24 A. 123.255.255.255 B. 123.123.255.255 C. 123.123.123.255 D. 255.255.255.255

C. 123.123.123.255

Which of the following components on a laptop will typically require reinstallation of the OS? A. Optical drive B. RAM modules C. Hard disk D. CMOS battery

C. Hard disk

You are the admin of a computer. You have other users who need day-to-day access the computer. You put these other users in what group? A. Administrator B. Local User C. Standard Users D. User accounts

C. Standard Users

A magic packet that is sent wireless is know as? A. WoL B. AWoL C. WoWLAN D. BaTMaN

C. WoWLAN

A wireless version of WoL A. AWoL B. WWoL C. WoWLAN D. WTF

C. WoWLAN

This prevents anyone but the user from reading the screen. A. gloss coating B. matte coating C. privacy filter D. illuminance

C. privacy filter

The term for how long the read/write head locates a particular track position. A. latency B. access time C. seek time D. IOPS

C. seek time

How many host on a /30 network? A. 0 B. 1 C. 2 D. 3

C.2

Steps of the Laser Printer Imaging Process in order

processing, charging (conditioning), exposing (writing), developing, transferring, fusing, cleaning

An ownership model for cloud services where the "something" can refer to infrastructure, network, platform, or software. A. IaaS B. SaaS C. PaaS D. *aaS

D. *aaS

What is the Class A private address range A. 10.0.0.0 to 10.254.255.255 B. 10.0.0.1 to 10.255.255.255 C. 11.0.0.0 to 11.255.255.255 D. 10.0.0.0 to 10.255.255.255

D. 10.0.0.0 to 10.255.255.255

Pick the port used for accessing a website with SSL encryption? A. 22 B. 80 C. 110 D. 443

D. 443

What is the transfer rate of USB 2.0? A. 480MBps B. 5Gbps C. 1.5Gbps D. 480Mbps

D. 480Mbps

How much RAM does Windows 10 Enterprise support (MAX) A. 128 GB B. 2 TB C. 512 GB D. 6 TB

D. 6 TB

Web pages use what port numbers? A. 20 and 21 B. 67 and 68 C. 81 and 443 D. 80 and 443

D. 80 and 443

What makes a switch better than a hub? A. A switch routes packets instead of frames to different networks. B. A switch divides bandwidth among connected devices C. A switch broadcast the data frames to every connected device D. A switch sends data frames to the correct connected device

D. A switch sends data frames to the correct connected device

Which of the following is the cheapest media for storing 8 GB of data? A. DVD RW B. CD-ROM C. Tape backup D. DVD+R DL

D. DVD+R DL

What is the term used to describe a pixel that is stuck in solid black? A. Burn-in B. Stuck C. Artifacts D. Dead

D. Dead

An attack that exploits a vulnerability in software that is unknown to the software vendor and user. A. XML B. RootKit C. Logic Bomb D. Zero Day Exploit

D. Zero Day Exploit

The ability of a mobile device to determine connection settings based on the user entering their email credentials. A. back haul B. BIOS C. biometric devices D. autodiscover

D. autodiscover

Roller that turns above a stack of paper to feed a sheet into the feed roller. A. drop roller B. letdown roller C. pickup line D. pickup roller

D. pickup roller

When apps, especially malware or rogue apps, use excessive power and quickly drain the battery of a mobile device this is known as? A. power dump B. power down C. power up D. power drain

D. power drain

A class of malware that modifies system files, often at the kernel level, to conceal its presence. A. logic bomb B. polymorphic virus C. virus D. rootkit

D. rootkit

____ is a security system offered by UEFI. It is designed to prevent a computer from being hijacked by malware. A. boot secure B. bitLocker C. lojack D. secure boot

D. secure boot

A collection of user accounts that can be assigned permissions in the same way as a single user object. A. permission B. stalemate C. security officer D. security group

D. security group

A fuse is rated in max volts (V). True or False

False

By standard the cover to access the internal components of your computer is on the same side as the I/O panel one the mother board. True or False

False

The permissions attached to or configured on a network resource, such as folder, file, or firewall are known as Access Control Lessons True or False

False

Unmanaged switches will work out-of-the-box, but an administrator can connect to it over a management port, configure security settings, and then choose options for the switch's more advanced functionality True or False

False

VGA uses a digital signal to transmit the RGB video True or False

False

Voice processing by a smart speaker is performed internally so these devices can be used without an Internet connection. True or False

False

Volts are the potential for power. Amps are the actual dangerous flow of electrons. Ohms are the rating for overall power. True or False

False

Z-Wave is a wireless communications protocol used primarily for home automation and is open source competitor technology. True or False

False

One-in-All units have all the computer components, except the keyboard and mouse, are contained within the monitor case. True or False

False; All-in-One

Any type of smartphone camera can be used to read a QR code. True or False

True

Disk striping is a technique where data is divided into blocks and spread in a fixed order among all the disks in the array. True or False

True

Heat pipe and spreaders are classified as passive cooling True or False

True

If I am allowing MAC address to connect I can add them to the whitelisting True or False

True

Lightning connector has 8-pins. True or False

True

MDM is a class of management software designed to apply security policies to the use of smartphones and tablets in the enterprise. True or False

True

On mobile devices you can use gestures such as "sweeping" or "pinching" the screen, this means that your device is multitouch supported. True or False

True

Printers use the subtractive color model. True or False

True

The component of the motherboard that connects the chassis power button/reset button/HDD LED is called the FRONT PANEL CONNECTOR. True or False

True

This type of restore removes all user data, apps, and settings. A. factory default reset B. Snapshot C. FlashDrive D. Low level format

A. factory default reset

When a computer starts, the firmware runs a ____ to verify that the system components are present and functioning correctly. A. POTS B. POST C. PAST D. PETS

B. POST

Printer speeds are measured in what? A. DPI B. PPM C. MBps D. GBps

B. PPM

You are tasked with replacing all the APs in an office building to greater speeds. The current location of APs allowed for total coverge of WiFi throughout the office. Which of the following 802.11 standards should be used? A. a B. ac C. b D. g E. n

B. ac

A temporary network mode in which devices connect to each other directly without an intermediary networking device. A. P2P B. ad-hoc mode C. ad-hoc network D. hamhock

B. ad-hoc mode

You are able to access your computer remotely while it is shut off but not unplugged. A. Roaming Aggressiveness B. WoL C. PoE D. Wired Wake on VLAN

B. WoL

In a peer-to-peer network, each computer can be both a server and a client. Each user administers his or her PC and the resources on it. The user can decide to give access to files on his or her PC or to printers that are attached to it. Under Windows, this type of network is described as a _____. A. P2P B. Workgroup C. Homegroup D. Zoo

B. Workgroup

Low-power wireless communications open source protocol used primarily for home automation. Uses radio frequencies in the 2.4 GHz band and a mesh topology. A. Z-Wave B. Zigbee C. ZIFbee D. WWAN

B. Zigbee

Uses the 2.4 GHz frequency band and is an open source competitor technology. A. Z-Wave B. Zigbee C. RFID D. IoT

B. Zigbee

A label containing a UPC code. Can be affixed to tangible assets for identification in an asset management system. A. backup B. barcode label C. MAC label D. RESP

B. barcode label

This HID can read a pattern of different sized parallel bars, typically representing a product number. A. QC reader B. barcode scanner C. line reader D. QVC reader

B. barcode scanner

What command line tool will attempt repair of the boot sector. A. bootrec /fixmbr B. bootrec /fixboot C. bootrec /rebuildbcd

B. bootrec /fixboot

The type of security threat that uses computers or other networks to accept and pass on viruses is called A. phishing B. botnets C. logic bomb D. man-in-the-middle

B. botnets

You left a computer monitor on over the weekend and now notice slight discoloration of the screen. This is called what? A. a failing backlight B. burn in C. a bad inverter D. dead pixels

B. burn in

Your computer is running slow, what is the best command to try and fix the issue? A. dir B. chdsk C. ipconfig D. format

B. chdsk

The network segment in which contention collisions occur. A. broadcast domain B. collision domain C. switch domain D. router domain

B. collision domain

What is an advantage of using 64-bit instruction sets? A. twice the speed B. greater memory addressing C. better graphics D. smaller overhead

B. greater memory addressing

Which of the following below will give you information about a command in the Windows Command Prompt. A. help B. help <command> C. man D. info

B. help <command>

A USB bus consists of a _____ and up to 127 devices A. USB 2.0 B. host controller C. bus controller D. USB 3.0

B. host controller

A basic principle of security stating that unless something has explicitly been granted access it should be denied access. A. implicit allow B. implicit deny C. explicit allow D. explicit deny

B. implicit deny

Private networks using web technologies only for local access are describes as: A. extranets B. intranets C. internets D. sundays

B. intranets

The ____ command-line utility is used to trace the route a packet of information takes to get to its target. A. ping B. ping -a 192.168.1.1 C. tracert D. tracepath

C. tracert

Each platter in a HDD is divided into these. Each one of these contain several sector, with a capacity of 512 bytes. A. sectors B. drives C. tracks D. bits

C. tracks

A software or operating system installation where the configuration information is derived from an input file. A. attended installation B. installation C. unattended installation D. zero touch installation

C. unattended installation

Is a Microsoft peer-to-peer network model in which computers are grouped together with access to shared resources for organizational purposes. A. domain B. homegroup C. workgroup D. peergroup

C. workgroup

A vulnerability that is exploited before the developer knows about it or can release a patch. A.legacy B. No problem C. zero-day D. DDoS

C. zero-day

This uses a magic packet that is sent to the NIC, when received will initiate the computers boot process A. WoL B. AWoL C. LoW D. EoP

A. WoL

The files comprising the hives are stored in the ____ folder. A. %SystemRoot%\System32\Config B. %Root%\System32\Config C. Programs x86 D. System32 - 64x86

A. %SystemRoot%\System32\Config

Match each letter with the correct answer. A. TCP 389 B. TCP 427 C. TCP 443 D. TCP 445 E. TCP 548 F. TCP 3389 1. Server Message Block/Common Internet File System 2. Lightweight Directory Access Protocol 3. Service Location Protocol 4. HTTP Secure 5. Remote Desktop Protocol 6. Apple Filing Protocol

A. 2 B. 3 C. 4 D. A E. 6 F. 5

Match the IP address to Binary equivalent A. 172.30.15.12 B. 255.255.0.0 C. 172.30.0.0 D. 172.30.16.101 1. 10101100 00011110 00010000 01100101 2. 10101100 00011110 00001111 00001100 3. 10101100 00011110 00000000 00000000 4. 11111111 11111111 00000000 00000000

A. 2 B. 4 C. 3 D. 1

Match each letter with the correct answer. A. TCP 20 B. TCP 21 C. TCP 22 D. TCP 23 E. TCP 25 1. Telnet 2. File Transfer Protocol - Data 3. Simple Mail Transfer Protocol 4. File Transfer Protocol - Control 5. Secure Shell

A. 2 B. 4 C. 5 D. 1 E. 3

This type of social engineering attack might spoof a website to imitate a target bank. The attacker then sends out email trying to get you to click the link and direct you to the spoofed website to provide your credentials. A. Phishing B. Surfing C. Spoofing D. Redirection

A. Phishing

You need to quickly destroy data on some hard drives that are no longer wanted. What is the best method? A. Physical destruction B. Quick format C. Low level format D. Overwrite

A. Physical destruction

An office has a regulatory requirement to segregate its PoS system from the office network (both work on separate subnets). The office manager is responsible for updating pricing in the PoS software and also needs the ability to function on both networks. Which of the following devices would allow the office manager that capability? A. Router B. Access point C. Switch D. PoE injector

A. Router

After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. The malware disables the computer's antivirus software and Internet connection. Which of the following would be the BEST tool to remove the malware without risking loss of the user's data? A. Run System Restore B. Reinstall Windows with the Repair Option C. Reinstall Windows on top of itself D. Run System File Checker

A. Run System Restore

The Windows local security account database where local system account information is stored A. SAM B. MAS C. AMS D. ASM

A. SAM

What is used with HTTP to make it secure? A. SSL B. HTTPS C. EFS D. VNP

A. SSL

A friend has attempted to install a new wireless printer on a home network. She can print to it when plugged into a USB cable from the laptop to the printer, however, she cannot print wirelessly. You remotely connect to her laptop to troubleshoot the issue. Which of the following is MOST likely the reason that she cannot print wirelessly? A. The printer does not have an IP address B. The printer is low on toner C. The printer cannot access the network D. The laptop has the wrong print driver installed

A. The printer does not have an IP address

I am using a thin client to access a server that will handle the heavy workload. The only requirement for the Thin Client is to display image from server, play audio from the server, and transfer mouse and keyboard commands to the server. The actual application and processing will be handle at the server in its workspace also called what? A. VDE B. VPN C. VLAN D. STP

A. VDE

A thin client is a PC or appliance designed to act as an interface to applications that run on a network server. The client may be interfacing with particular software applications or with an entire Windows Desktop. This is referred to as what? A. VDI B. IDV C. DVI D. DIE

A. VDI

These are peripherals that enable the user to enter data and select commands. A. Output devices B. Input devices C. Monitors D. VRs

B. Input devices

The term used to describe the global network of personal devices? A. HID B. IoT C. WoT D. Z-Wave

B. IoT

You are given a technician document detailing the switchports that you will need to patch in for a network upgrade. Which of the following documents did you receive? A. Process diagram B. Physical network diagram C. Fiber backbone diagram D. Logical topology diagram

B. Physical network diagram

The term for when you connect a device to your computer and the OS will detect the device automatically configure it. A. Play-and-Plug B. Plug-and-Play C. AutoConfigure D. Drop-and-Roll

B. Plug-and-Play

The basis of this is the identification, prioritization, and ownership of incidents. A. Troubleshooting B. Problem management C. OSI model D. Disaster Recovery Plan

B. Problem management

A set of vendor-independent specifications for fault-tolerant configurations on multiple-disk systems A. RAS B. RAID C. RAD D. ROAD

B. RAID

Your laptop is shutting down unexpectedly. You discover the shutdowns only happen when the laptop is moved from one room to another. You reseated the hard drive, memory, battery, and LCD cable, but the laptop continues to shut down. Which of the following is the MOST probable cause of the issue? A. Residual energy on the motherboard B. System overheating C. Distended capacitors D. Loose battery connection

B. System overheating

A protocol in the TCP/IP suite operating at the transport layer to provide connection oriented, guaranteed delivery of packets. A. UDP B. TCP C. TB D. SkyNet

B. TCP

What is the protocol for SSH (Secure Shell)? A. TCP 21 B. TCP 22 C. TCP 23 D. TCP 20

B. TCP 22

A user states a PC keeps shutting down. The problem started this morning and now the PC powers off after a few minutes. You verify that the PC plugged into a UPS and that the power supply fan functioning properly. What should you check next? A. The thermal compound adequate. B. The CPU cooling fan is working correctly. C. The power cable is seated properly on the motherboard. D. The power supply voltages are correct.

B. The CPU cooling fan is working correctly.

You are having issues with the back cover on your phone. It comes off on its own or will not properly sit on the phone. What is probably the problem? A. The MicroSD card is not installed properly B. The battery needs to be replaced C. The charging port is bent D. The smartphone has a non-OEM cover.

B. The battery needs to be replaced

You are having a problem with printing a specific document type. The network printer shows that the printer is online with no errors. Other users are not having the same issue. You send the document to another printer and the document prints. Which of the following should you do FIRST in troubleshooting the problem? A. Stop and restart the PC print spooler service. B. Verify you are sending the document to the correct printer queue. C. Have each user send the same document to the correct printer queue. D. Stop and restart the print server queues, and then resend the document.

B. Verify you are sending the document to the correct printer queue.

Loads the boot manager, which for Windows is bootmgr.exe A. Master Boot Record B. Volume Boot Record C. Boot Sector Record D. Boot Polish Record

B. Volume Boot Record

A network printer is online and ready. The accounting group is unable to print to this network printer, but other departments can. Which of the following should you do to resolve the problem? A. A replace the printer's network cable B. modify the security setting of the print spooler C. Restart the TCP/IP print spooler service D. Use the manufacturer's maintenance kit

B. modify the security setting of the print spooler

A tool for maintaining packages on Fedora based Linux systems A. scrum B. yum C. XML D. WPA

B. yum

Which of the following statements is true regarding the differences between a 32-bit and 64-bit OS? A. A 32-bit version of the OS will not run on 64-bit hardware, but a 64-bit OS will run on 32-bit hardware. B. A 32-bit version of the OS requires twice the number of CPU clock cycles to write the same amount of data as a 64-bit OS. C. A 64-bit version of the OS will address memory in eight octets. D. A 64-bit version of the OS will write data to disk in block sizes of eight octets

C. A 64-bit version of the OS will address memory in eight octets.

What is equivalent to an IPv6 host record A. A B. 3612:3456:1230:1092:AAAA:0000:1111:2222 C. AAAA D. 192.168.110.225

C. AAAA

Hosts also have a "fallback" mechanism for when the computer is configured to use a DHCP server but cannot contact one. A. PIPA B. APAPA C. APIPA D. IPAPA

C. APIPA

Which of the following is the BEST option to prevent data breaches on lost mobile devices? A. Install a locator application on the mobile device so that it can be traced. B. Apply a restriction to lock the device after a certain number of failed login attempts. C. Configure the device to remote wipe as soon as it is reported lost. D. Utilize the fingerprint scanner and passcode for multifactor authentication.

C. Configure the device to remote wipe as soon as it is reported lost.

The term that is used so the CPU knows when it must communicate with a device. A. I/O address B. connections C. Interrupt Request D. driver

C. Interrupt Request

A WISP specializes in what type of network. A. Fiber B. Ethernet C. LoS D. Coaxial

C. LoS

You receive a call from a customer who is confused after upgrading his Windows 7 Home Premium edition computer to Windows 10. The user cannot fins the ALL PROGRAMS menu. What would you tell them? A. Sorry, does not exist any longer. B. Please hold while I escalate the problem. C. Press the Windows Key and type the name of the application D. Mute the phone and laugh at how dumb people can be

C. Press the Windows Key and type the name of the application

IP addresses defined by RFC1918 A. public addresses B. APIPA addresses C. Private addresses D. MAC addresses

C. Private addresses

A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should you employ first when responding to the problem? A. Disable System Restore B. Schedule scans and run updates in safe mode C. Quarantine the system D. Create a System Restore point

C. Quarantine the system

If you have a computer with three hard disks, what type of RAID fault-tolerant configuration will make best use of them? A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 10

C. RAID 5

The term used to describe a socket that requires no pressure on the CPU to install? A. PGA B. LGA C. ZIF D. PIF

C. ZIF

Unauthorized software that directs the devices to launch a DDoS attack. A. Botnet B. Skynet C. Zombie D. Yum

C. Zombie

The term used to circumvent the usual operation of the mobile OS to obtain super-user or root administrator permissions over the device. A. JailBird B. BlueJacking C. BlueSnarfing D. Jailbreaking

D. Jailbreaking

What color is the Microphone input? A. light blue B. lime C. black D. orange E. pink

E. pink

Hold down the _______________ button on the device to ensure the circuits are drained of residual power.

Power

_____ is the main storage area for programs and data when the computer is running. A. System Memory B. SSD C. HDD D. Cache

A. System Memory

What is the newer version of BIOS called? A. UEFI B. EUFI C. FIUE D. FUIE

A. UEFI

The uncontrolled development of more and more virtual machines. A. VM sprawl B. VM escaping C. VM D. SpiNet

A. VM Sprawl

Which of the following number might represent a stick of RAM with ECC capabilities? A. 6 B. 8 C. 10 D. 9

D. 9

How many pins are usually on the power connector that connects to the motherboard to supply the motherboard power? A. 20/24 pin B. 4 pin C. 6/8 pin D. 28 pin

A. 20/24 pin

How many pins do DDR4 DIMMs have? A. 288 B. 300 C. 240 D. 180

A. 288

match the DVD standard to capacity A. DVD-9 B. DVD-18 C. DVD-5 D. DVD-10 1. 4.7 2. 17.1 3. 9.4 4. 8.5

A. 4 B. 2 C. 1. D. 3

What command prompt command can i use to check the drive's partition structure? A. diskpart B. dskpt C. dskpart D. diskparty

A. diskpart

What do firewalls use to allow or disallow traffic through? A. LACs B. CALs C. ACLs D. Inbound

C. ACLs

What is the least volatile type of data storage? A. RAM B. CPU C. HDD D. Cache

C. HDD

What is the minimum number of disks required to implement RAID 10 A. 1 B. 2 C. 3 D. 4

D. 4

What is not an option to boot from? A. USB B. HDD C. Network D. Optical E. PDS

E. PDS

A hardware checking routine built into the PC firmware. A. PAST B. POST C. ROAST D. RUHUNGRY

B. POST

Which of the following offers the greatest latency problems? A. DSL B. Satellite C. Cable D. POTS

B. Satellite

In the DNS hierarchy, the level immediately below the root. A. Web B. TLC C. TLD D. RootFS

C. TLD

After applying a troubleshooting repair, replacement, or upgrade, what should you do next? A. Document the fix B. Identify the fix C. Test the fix D. Try again

C. Test the fix

You have upgraded BIOS and had multiple drives installed. Now you get the error message "Operating system not found". What should you check first? A. The hard drive type settings in the BIOS B. The power supply connections to the hard drives C. The boot sequence settings in the BIOS D. The motherboard SATA connectors

C. The boot sequence settings in the BIOS

Every time you print a document in your laser printer, the document lettering smudges making it unreadable which of the following is the cause? A. The print server is receiving error codes B. The toner cartridge is leaking C. The fuser is not functioning properly D. The ink has not fully dried

C. The fuser is not functioning properly

You replace RAM in your laptop, and R2D2 begins beeping at you when you power up the laptop and does not boot to the OS. What is probably the cause of this issue? A. The new DIMM is not receiving enough power B. The user needs C3PO to translate C. The new DIMM needs to be reseated on the system board D. The user needs to enter BIOS and select the RAM from which to boot.

C. The new DIMM needs to be reseated on the system board

You have a SFF PC and need to buy a NIC for it. What do you need to consider? A. The card's driver compatibility B. The GDDR of the card C. The size of the card D. The cooling solution on the card

C. The size of the card

What type of printer is used for POS terminals? A. Inkjet B. Impact C. Thermal D. Laser

C. Thermal

An ordinary office PC is often referred to as what A. Server B. Thin Client C. Thick Client D. VPN Client

C. Thick Client

The command-line utility that is used to follow the route a packet of information takes to get to its target on a Linux machine. A. tracert B. ping C. traceroute D. ifconfig

C. traceroute

What effect does a worn photosensitive drum have on printing? A. Faint printing B. Smudged print C. Lines on paper D. No image

A. Faint printing

The device that allows two different networks to communicate with one another is: A. a repeater B. a hub C. a router D. an access point

C. A router

A IP address to MAC address mapping A. DNS B. NAT C. ARP D. BAT

C. ARP

A policy that governs employees' use of company equipment and Internet services. A. UAC B. Array C. AUP D. DRP

C. AUP

Wearable fitness tracking devices use which of the following technologies to determine user activity levels? A. Digitizer B. Vortexometer C. Accelerometer D. Inverter

C. Accelerometer

You have 20 laptops in a room they all need to connect wirelessly to the network. What is the best choice? A. Switch B. Router C. Access point D. Hub

C. Access point

You need two monitors connected to your computer. What settings do you need to adjust to ensure you have output on both monitors? A. Plug and external monitor into the USB port. B. Use the Fn and function key combination C. Adjust the monitor display settings D. Enable the DispalyPort

C. Adjust the monitor display settings

You have just finished installing a secondary OS on a workstation. After rebooting the computer, you receive the following error: No OS found. You confirm the boot.ini file is correct. Which of the following is MOST likely causing this error? A. The computer has GRUB Legacy installed B. Windows Startup services are not running C. An incompatible partition is marked as active D. An unsupported version of Windows is installed

C. An incompatible partition is marked as active

You frequently go off-site for recruitment purposes and handle sensitive information. You are concerned about data leaks if your laptop is stolen. Which of the following is the BEST practice to use in this scenario? A. Cable locks B. Biometric security C. Data encryption D. Login time restriction

C. Data encryption

You want to enable hands-free for a smartphone in a car. Which of the following needs to be performed? A. Enable WiFi B. Driver installation C. Device pairing D. Enable NFC

C. Device pairing

Where would you find an ALU? A. RAM B. Northbridge C. LondonBridge D. Central Processing Unit

D. Central Processing Unit

Thunderbolt version 3 supports speeds up to 40 Gbps over a short distance of 2.0 feet. True or False

False

What Windows utility would you use to back up data files in Windows 10? A. File History B. Time Machine C. Migration D. System Restore

A. File History

The file management GUI in macOS. A. Finder B. Explorer C. Firewall D. KeyChain

A. Finder

When securing a mobile device, which of the following types of screen locks is the most secure? A. Fingerprint lock B. Swipe lock C. Passcode lock D. Face lock

A. Fingerprint lock

Match each form factor motherboard with the correlating size! A. LARGEST -1 B. 2 C. 3 D. 4 E. 5 - Smallest 1. Nano-ITX 2. ATX 3. Mini-ITX 4. µATX (Micro ATX) 5. Pico-ITX

A. 2 B. 4 C. 3 D. 1 E. 5

You notice small black dots on an LCD screen. What should be done to resolve the issue? A. replace monitor B. replace video card C. replace video cable D. replace power supply

A. Replace monitor

What is the purpose of MIDI? A. connect Musical Instrument B. connect headphones C. connect Video D. Who cares

A. connect Musical Instrument

Is at the top of the object hierarchy in Explorer, containing the Computer, Documents, Network, and Recycle Bin objects. A. desktop B. top level file C. documents D. EFS

A. desktop

List the troubleshooting model in order. 1. Establish a plan of action to resolve the problem and implement preventative measures 2. Verify full system functionality, and if applicable, implement preventative measures 3. Document findings, actions, and outcomes. 4. Test the theory to determine cause 5. Establish a theory of probable cause 6. Identify the problem

6, 5, 4, 1, 2, & 3

How many pins on an RJ-45 ethernet port?

8 pins

A group of computers which share a common accounts database, referred to as the directory. A. domain network B. domain controller C. domain member D. wide area network

A. domain network

listening in to communications sent over the media A. eavesdropping B. man-in-the-middle C. DDoS D. shoulderdropping

A. eavesdropping

If a power wire is red what is the voltage? A. +5 V B. +12 V C. -12 V D. +3.3V E. +5 V Standby F. Ground

A. +5 V

Match each letter with the correct answer. A. A ___ refers to a PC that is not designed to be used on the move. B. The ___ is a plastic and metal box that houses this second class of components, such as the motherboard, CPU, memory. etc. C. A ___ is designed to sit vertically on a surface, so that it is taller than it is wide. 1. system case 2. desktop computer 3. tower case

A. 2 B. 1 C. 3

Match each letter with the correct answer. A. 10BASE-5 B. 10BASE-2 C. RG-6 D. RG-59 1. Thicker core 2. Thicknet 3. Thinner core 4. Thinnet

A. 2 B. 4 C. 1 D. 3

Match each letter with the correct answer. A. TCP/UDP 53 B. UDP 67 C. UDP 68 D. TCP 80 E. TCP 110 1. BOOTP/DHCP Client 2. Domain Name System 3. BOOTP/DHCP Server 4. Post Office Protocol 5. Hyper Text Transfer Protocol

A. 2 B. 3 C. 1 D. 5 E. 4

SODIMM DDR has how many pins? A. 200 B. 204 C. 260 D. 54

A. 200

Match each letter with the correct answer. A. ____ is a high voltage (potential difference) stored in an insulated body. B. _____ occurs when a path is created that allows electrons to rush from a statically charged body to another with an unequal charge. C. ____ can dissipate static charges more effectively than self-grounding 1. Electrostatic discharge 2. anti-ESD wrist strap 3. Static Electricity

A. 3 B. 1 C. 2

Match the Subnet mask to the Class A B C 1. 255.255.0.0 2. 255.255.255.0 3. 255.0.0.0

A. 3 B. 1 C. 2

Software that creates a model of a physical object using polygons, spline curves, and bezel curves. A. 3D print process B. 3D scanner C. 3D modelling software D. 3D printer

A. 3D modeling software

A customer wants to upgrade a PC's internal storage to have more room to store backups, photos, and videos. The new storage should be large enough to avoid expanding again next year. Which of the following BEST meets these needs? A. 3TB HDD B. 50GB NAS C. 500TB SAN D. 512GB SSD

A. 3TB HDD

Match each expansion slot with the correct description A. PCIe x16 B. PCI C. PCIe x1 D. PCI-X 1. This expansion slot is a mid level expansion option. This can also be used in a PCIe x16, however, it will utilize the entire slot. This is the only serial expansion slot, capable of connecting extremely powerful expansion cards. 2. This is ONLY used on specialized types of servers. This slot is used for low power/low demand expansion cards. 3 This slot is used for low power/low demand expansion cards.. This expansion slot is a mid level expansion option. This can also be used in a PCIe x16, however, it will utilize the entire slot. 4. This is the only serial expansion slot, capable of connecting extremely powerful expansion cards.

A. 4 B. 3 C. 1 D. 2

Match each letter with the appropriate CPU. A. T B. B C. H D. H2 E. H3 F. R 1. 1156 2. 1150 3. 1155 4. 775 5. 1366 6. 2011

A. 4 B. 5 C. 1 D. 3 E. 2. F. 6

What directly powers the CPU voltage regulator? A. 4 pin ATX B. 4 pin Molex C. 4 pin Berg D. 4 pin ITX

A. 4 pin ATX

Older HDD used what type of connector for power A. 4 pin Molex B. 15 pin SATA C. 8 pin PCI D. 24 pin ATX

A. 4 pin Molex

USB 3.0 and 3.1 can deliver how many Watts of power A. 4.5 B. 4.6 C. 5.0 D. 13.0

A. 4.5

Match each video display standard with its Resolution and Aspect Ratio A. WXGA (Widescreen XGA) B. SXGA (Super XGA) C. HD D. WSXGA E. HD+ F. Full HD G. QHD (Quad HD) H. 4K UHD (Ultra HD) 1. 1440x900 (16:10) 2. 1600x900 (16:9) 3. 1280x1024 (5:4) 4. 3840x2160 (16:9) 5. 1280x800 (16:10) 6. 1366x768 (16:9) 7. 2560x1440 (16:9) 8. 1920x1080 (16:9)

A. 5 B. 3 C. 6 D. 1 E. 2 F. 8 G. 7 H. 4

Match each letter with the correct answer. A. UDP 123 B. UDP/TCP 137 - 139 C. TCP 143 D. UDP 161 E. UDP 162 1. Simple Network Management Protocol Trap 2. Internet Mail Access Protocol 3. NetBIOS over TCP/IP 4. Simple Network Management Protocol 5. Network Time Protocol

A. 5 B. 3 C. 2 D. 4 E. 1

How many host on a /23 network? A. 510 B. 512 C. 514 D. 254

A. 510

How many pins are on a SATA data cable? A. 7 B. 15 C. 24 D. 8

A. 7

You need to set up wireless printer that only supports 54Mbps in the 5GHz range. What setting should you configure on the wireless router? A. 802.11a B. 802.11b C. 802.11g D. 802.11c

A. 802.11a

PoE powered devices can draw up to about 13 W over the link. A. 802.3af B. 802.3at C. 802.3ta D. 802.3fa

A. 802.3af

What can you type if you need help with command prompt? A. <command> /? B. /? <command> C. man D. info

A. <command> /?

How do you visually determine the difference between an IDE connector and a floppy connector? A. A floppy connector is missing a pin on the side, while the IDE connector is missing a pin in the center. B. Diet coke is delicious. This isn't the right answer.

A. A floppy connector is missing a pin on the side, while the IDE connector is missing a pin in the center.

You completed a fresh Windows 7 installation, you want to ensure the OS files are hidden and protected from accidental deletion or alteration. Which of the following locations should you view to make this change? A. Control Panel - folder options B. Insert Windows disc - i386 folder C. Start menu - run - REGEDIT D. Right-click desktop - view

A. Control Panel - folder options

What type of network topology is used by protocols such as Zigbee and Z-Wave? A. A wireless mesh network topology B. A wired mesh network topology C. A star mesh topology D. A wired switch topology

A. A wireless mesh network topology

A policy that governs employees use of company equipment and Internet services. A. Acceptable Use Policy B. Common Law Policy C. Business Continuity Policy D. Disaster Recovery Policy

A. Acceptable Use Policy

You need to set up 20 laptops for a small meeting. They all need to communicate with each other. There is no switch or corporate network to connect to. What do you need to do? A. Adhoc network B. Bluetooth network C. Serial network D. USB network

A. Adhoc network

What Tab of Task Manager in Windows 7 shows applications currently running in a desktop windows? A. Applications B. Processes C. Services D. Performance

A. Applications

A means for a user to prove their identity to a computer system. A. Authentication B. Authorization C. Accounting D. Auditing

A. Authentication

Which of the following describes the most powerful AMD CPU socket? A. BULLDOZER B. SKULLCRUSHER C. WIDOWMAKER D. i-SERIES E. CANYON

A. BULLDOZER

In change management, the team responsible for approving or denying RFCs. A. CAB B. Lyft C. Uber D. CA

A. CAB

Which of the following Internet connection types is probably going to use a coaxial connector? A. Cable B. DSL C. Fiber D. ISDN

A. Cable

The principal microprocessor in a computer or smartphone responsible for running operating system and applications software. A. Central Processing Unit B. Solid State Drive C. Random Access Memory D. Read Only Memory

A. Central Processing Unit

You set up a new WAP in your kitchen and are experiencing intermittent connectivity issues. What should you check first? A. Channels B. Frequency C. Antenna power level D. SSID

A. Channels

Commands displayed in a vertical bar on the right side of a Windows 8 Start Screen. A. Charms B. Live Tiles C. Start Menu D. Active Bar

A. Charms

A company has very strict rules regarding proprietary information leaving the premises. All computers host proprietary information. You are called to repair a computer on-site at the company's corporate office. You identify the troubleshooting steps to create a plan of action. You determine the computer needs to be taken off-site for repair. What should you do next? A. Check corporate policies for guidance. B. Get authorization from the manager. C. Delete proprietary data before leaving the building. D. Remove the HDD and send the device for repair.

A. Check corporate policies for guidance.

Several computers are having network connectivity issues. Two of the computers are wired and are not having any issues. You verify that none of the computers having issues have been assigned a static IP. Which of the following should you check NEXT? A. Check the closest AP for the area. B. Check each wireless adapter switch C. Check the group's network switch. D. Check the DHCP server.

A. Check the closest AP for the area.

A projector's image begins to flicker during a presentation. The laptop display does not produce this issue. When you change the resolution on the laptop, the issue persists. Which of the following is the NEXT step you should take? A. Check the connectivity of the VGA cable. B. Check the connectivity of the power cable. C. Change the aspect ratio on the laptop. D. Change the settings of the projector.

A. Check the connectivity of the VGA cable.

A mobile user comes to you with an issue about there phone no longer charging. You put the phone on a wireless charger and it charges fine. You use the cable on another device and the cable seems to be fine. What will probably fix the problem? A. Clean out the charging port on the device B. Replace the mobile device's battery C. Issue a new charging cable to the employee D. Send the device for service and give the employee a loaner

A. Clean out the charging port on the device

A Google account on an Android device by default will synchronize to which of the following locations? A. Cloud B. SSD C. PC desktop D. MicroSD

A. Cloud

This type of cable uses two conductors that share the same axis. The core signal conductor is enclosed by plastic insulation. A. Coax B. STP C. Ethernet D. Fiber

A. Coax

You are having issues typing in directions on a navigation website, the map is not viewable in a newer web browser. You run updates to Java, but are still unable to view the map. You should change which of the following Internet Options? A. Compatibility view B. Manage add-ons C. Clear browser cache D. Pop-up blocker

A. Compatibility view

On older computers applied power to the RAM that was responsible for storing BIOS settings. A. Complementary Metal-Oxide Semiconductor Battery B. ROM Battery C. COMS battery D. Random Access Memory Battery

A. Complementary Metal-Oxide Semiconductor Battery

Means that certain information should only be known to certain people. A. Confidentiality B. Integrity C. Availability D. Accounting

A. Confidentiality

What OS tool gives you access to other applets such as System and Security, User Accounts and Family Safety, Network and Internet, Appearance and Personalization, Hardware and Sound and other applets? A. Control Panel B. Control Tower C. C2 D. Command Panel

A. Control Panel

If I want to pay decent money to have fiber ran all the way to my house and not just a fiber backbone this is known as what? A. FTTP B. Cat 10 C. Cat 5e D. RADIUS

A. FTTP

A printer stops working in the billing department and cannot be repaired. A new printer has been ordered and you are tasked with allowing other users to print to the billing manager's printer until the new printer arrives. The manager's printer is currently used via USB connection, and there are no network jacks available for use. Which of the following is the BEST way for you to allow access to the printer? A. Create a share on the manager's computer and give the users rights to the share. B. Install the printer on the users' desktops and point it to the IP address of the manager's computer. C. Purchase a wireless printer so the users can access the printer via network. D. Provide flash drives to the users so they can transfer data to the manager's computer for printing.

A. Create a share on the manager's computer and give the users rights to the share.

You need a list of all static IP addresses in the building. Which of the following server roles would you MOST likely review to find that information? A. DHCP server B. DNS server C. File server D. Proxy server

A. DHCP server

A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents. A. DRP B. AUC C. ERP D.. EPR

A. DRP

Uses the higher frequencies available in a copper telephone line as a communication channel. The use of a filter prevents signals from contaminating voice traffic. A. DSL B. Cable C. POTS D. Satellite

A. DSL

You receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue? A. Date and time B. UEFI boot mode C. Logon times D. User access control

A. Date and time

You just imported a lot of large files from another device. Now it is taking a long time to open them. What can you do to fix the issue? A. Defragment the physical drive B. Perform a zero fill of the hard drive C. Conduct a quick format of the affected hard drive D. Run a surface-level scan on the hard drive

A. Defragment the physical drive

The top level of the user interface is the ____. It is displayed when Windows starts and the user logs on. A. Desktop B. Start Screen C. Start Menu D. I Don't Know

A. Desktop

What are the two popular Graphics APIs used? A. DirectX and OpenGL B. Crossfire and SLI C. Peanut butter and Jelly D. Rick and Morty

A. DirectX and OpenGL

What Fn key would be used to toggle the video feed between the built-in laptop display, the built-in display and an external monitor (dual display), and an external monitor only. A. Display B. Screen orientation C. Screen brightness D. Media options

A. Display

You are tasked with providing security to laptops, laptops are able to charge, access to LAN, and use different removable hardware. What will meet your needs? A. Docking station B. Port replicator C. Thunderbolt D. USB hub

A. Docking station

The agreement governing the installation and use of proprietary software. A. EULA B. DRP C. DCP D. AUP

A. EULA

You are configuring a SOHO wireless router for a small business with three employees. After the three employees' laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. You enable WPA2 on the wireless router. Which of the following additional settings should you change? A. Enable MAC filtering B. Disable SSID broadcast C. Reduce radio power level D. Update router firmware

A. Enable MAC filtering

You are configuring wireless for a home office. You wants to prevent others from accessing the wireless network. You have a small number of devices on the network and do not want to have to remember a complicated password. Which of the following should you configure? A. Enable MAC filtering B. Disable SSID broadcast C. Assign static IP addresses D. Turn on content filtering

A. Enable MAC filtering

You need to ensure increased security on your SOHO router, what setting should you configure? A. Encryption B. IP addressing C. MAC filtering D. Hidden SSID

A. Encryption

You are setting up a new wireless network at a branch office that previously had only wired connectivity with statically assigned IP addresses. After setting up the network, you configure a server to provide IP addresses to wireless clients. During testing, you are unable to access the Internet or named network resources. You receive a valid IP address from the DHCP server and can ping the default gateway. Which of the following should you check NEXT to resolve this issue? A. Ensure the options are configured to provide a DNS server. B. Verify the Windows Firewall is turned off. C. Configure the wireless network's SSID to be hidden. D. Enable file and printer sharing in the OS.

A. Ensure the options are configured to provide a DNS server.

The full name of any host is called _____. Example: http://www.widget.com A. FQDN B. DSN C. DHCP D. HTTP

A. FQDN

This reflects the hierarchy, from most specific (the host) to least specific (the top level domain followed by the root). A. FQDN B. HTTP C. URL D. OS

A. FQDN

What two types of biometric authentication mechanism are supported on smartphones? A. Fingerprint recognition and facial recognition B. User Name and Password C. Fingerprint and Password D. Facial recognition and PIN

A. Fingerprint recognition and facial recognition

A modern disk partitioning system allowing large numbers of partitions and very large partitions sizes A. GPT B. MBR C. DiskPart D. CheckDisk

A. GPT

If you are making changes outside the command prompt in Windows, the interface you use is known as what? A. GUI B. Windows C. GIMP D. Unity

A. GUI

You are setting up a kiosk. You need to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. You must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password. Which of the following account types would you MOST likely set up on this kiosk machine? A. Guest B. Administrator C. Power User D. Remote Desktop User

A. Guest

Provides a connection point for internal mass storage devices, such as hard drives, optical drives, and tape drives to motherboard and manages transfer of data. A. HBA B. SATA C. PATA D. ATA

A. HBA

You have a PC with RAID configuration and notice slow computer performance. You use the manufacture's diagnostic software, and the computer passes all tests. You then uses a defragmentation tool and hear clicking noises. Which of the following should you identify and replace? A. Hard drive B. System fan C. SSD D. RAID controller

A. Hard drive

What is an advantage of using static IP addresses for a business? A. High availability B. Simplifies IP management C. Lower security risk D. Scalability for upgrades

A. High availability

You need to upgrade a media workstation so that is can be used for graphically intense presentations, slideshows, and video gaming tournaments. What should you make priority? A. High-end video, high-end audio, multicore processor B. Minimum RAM required, network connectivity, high-end cooling C. Media streaming, file sharing, gigabit NIC, dual monitors, TV tuner D. Network connectivity, TV tuner, surround sound audio, dual monitors

A. High-end video, high-end audio, multicore processor

RIP uses what as its metric A. Hop Count B. Bandwidth C. Speed D. What ever the admin configured

A. Hop Count

This type of updates is available only to selected customers and usually for a limited problem. A. Hotfixes B. Updates C. Patches D. Unix

A. Hotfixes

You must install a device that will proactively stop outside attacks from reaching the LAN. Which of the following devices would BEST meet the organization's needs? A. IPS B. IDS C. Proxy server D. Authentication server

A. IPS

With a VPN, TCP/IP communications are encrypted and then packaged within another TCP/IP packet stream. Such encryption of data or packets is typically implemented by using a protocol suite called what? A. IPSec B. SSL/TLS C. WPA2 D. WPA

A. IPSec

A file that contains all of the contents from an optical disc in a single file which can be mounted to the file system as though it were a physical optical drive. A. ISO file B. ITIL file C. HTML file D. kill file

A. ISO file

A means of provisioning IT resources such as servers, load balancers, and Storage Area Network (SAN) components quickly. A. IaaS B. SaaS C. PaaS D. NaaS

A. IaaS

Which monitor technology provides the widest viewing angle with rich colors and backlighting? A. In-plane Switching B. Plasma C. Twisted Nematic D. Cold Cathode Fluorescent Lamp

A. In-plane Switching

Which of the following is an advantage of wearable technology over standard accessories? A. Incoming call notifications B. Longer battery life C. Easily set wake-up alarms D. Ability to check the time

A. Incoming call notifications

Which of the devices listed can carry potentially dangerous levels of power? A. Inverter card B. PCIe card C. CPU D. CMOS Battery

A. Inverter card

One function of a CMOS battery is to: A. Keep the BIOS clock running B. Preserve the master boot record C. Provide backup power during a blackout D. Ensure data is safely written during shutdown

A. Keep the BIOS clock running

If my computer gets stolen what can i use to track it? A. LoJack B. MoJack C. FoJack D. LoMack

A. LoJack

You have purchased a new mobile device that uses a different OS than your previous one. You want to copy your contacts and appointments from your corporate account with the least amount of work. Which of the following would be the BEST way for you to accomplish this? A. Log into the same email provider on the new device, and restore the contacts and dates. B. Create a Bluetooth connection between your devices, and copy your contacts and calendar. C. Back up the old mobile device to a PC, and import the contacts and schedule from the PC. D. Use NFC to transfer all compatible data from one device to the other.

A. Log into the same email provider on the new device, and restore the contacts and dates.

A piece of office equipment that performs the functions of a number of other specialized devices. A. MFD B. MDF C. FMD D. DMF

A. MFD

You are using a Windows 8.1 RT operating system and want to add additional programs to the computer. What do you have available for installing more applications? A. Microsoft Store B. DVD C. Google Play D. iTunes

A. Microsoft Store

During an inspection, it was found that data racks were not properly grounded. To pass the inspection and address a growing concern to protect data cabling and equipment, you must make sure all racks are properly grounded. Which of the following tools should you use to verify this has been completed? A. Multimeter B. Cable tester C. Tone generator D. Voltmeter

A. Multimeter

A want to quickly share pictures between mobile devices. The devices will be in close proximity so each other so networking devices are not needed. What is the best choice? A. NFC B. USB C. IR D. WiFi

A. NFC

A remote file access protocol used principally on UNIX and Linux networks. A. Network File System B. Network Access Control C. Network Address Port Translation D. Network Topology

A. Network File System

You are having color issues with your monitor. It seems that the red colors are not being displayed. You disconnect from VGA and use a HDMI cable. This issues is fixed. What is most likely the issue? A. One of the pins on the VGA cable was damaged. B. The monitor did not support VGA input C. PC configured to output to HDMI D. The video card drivers were out of date

A. One of the pins on the VGA cable was damaged.

You want an antivirus software for a home PC, but you do not want to pay for a license. Pick the best choice. A. open license B. personal license C. corporate license D. enterprise license

A. Open license

This type of software can be used to convert scanned text into digital documents, ready for editing. A. Optical Character Recognition B. Cold Cathode Recognition C. Word Recognition D. SkyNet Recognition

A. Optical Character Recognition

A device designed to provide power to devices that require power, and may or may not support remote monitoring and access. A. PDU B. PUS C. BPS D. SPU

A. PDU

Which of the following is considered government-regulated data? A. PII B. End-user license agreement C. digital millennium copyright act D. DRM

A. PII

The protocol used to retrieve mail from the mail server with TCP port 110 A. POP3 B. IMAP C. SMTP D. SNMP

A. POP3

What answer is false concerning RAID 1? A. Performance B. Fault tolerant C. Mirroring D. Min 2 disks

A. Performance

A hardware connection interface on a personal computer that enables devices to be connected to the computer. A. Port B. Interface C. PNAC D. Cable

A. Port

Means that the router takes requests from the Internet for a particular protocol (HTTP/port 80) and sends them to a designated host on the LAN A. Port forwarding B. Port mirroring C. Port dropping D. Port dripping

A. Port forwarding

_____ is used to set up applications that require more than one port. When the firewall detects activity on outbound port, it opens the inbound port for a set period. A. Port triggering B. Port forwarding C. Port mirroring D. Firewall

A. Port triggering

This tool is used to connect wires to a 66, 110, or Krone block. A. Punch-down tool B. Crimpers C. Wire stripper D. Wire tester

A. Punch-down tool

This type of AAA server used to manage remote and wireless authentication infrastructure. A. RADIUS B. Domain Controller C. PXE D. PSK

A. RADIUS

Striping without Parity is also known as A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 10

A. RAID 0

What connector is used for POTS A. RJ-11 B. RJ-12 C. RJ-43 D. RJ-10

A. RJ-11

A serial port that uses a 25-pin male D connector. A. RS-232 B. DB-9 C. DB-15 D. DB-24

A. RS-232

The battery that powers the chipset that keeps track of date and time for the system. A. RTC battery B. CMOS C. TLC battery D. SkyNet battery

A. RTC battery

The ability to scale cloud computing resources quickly to meet peak demand and just as quickly remove resources if they are not currently needed. A. rapid elasticity B. rubberbanding C. force shaping D. virtualization

A. Rapid elasticity

You are getting a black screen. You try to restart the computer but the OS still does not load. You patched the computer the evening prior. What should you do next? A. Reboot into safe mode and roll back the updates. B. Repair the Windows Registry C. Configure boot options in the BIOS D. Disable Windows services and applications

A. Reboot into safe mode and roll back the updates.

The period following a disaster that a system may remain offline. A. Recovery Time Objective B. RSSI C. RSoP D. SAM

A. Recovery Time Objective

WPA and WPA2 can implement enterprise mode authentication, where the access point passes authentication information to a _____ for validation. A. Remote Authentication Dial-In User Service B. Circumference C. Remote Access Server D. One ring to control them all

A. Remote Authentication Dial-In User Service

If Remote Desktop is used to connect to a machine that has been compromised by malware, the credentials of the user account used to make the connection become highly vulnerable. A. Remote Credential Guard B. Remote Assistance Guard C. Remote Desktop Guard D. Remote Care Gaurd

A. Remote Credential Guard

You discover that a cell phone application is loading slowly and not functioning properly. Which of the following should you do first to remedy this issue? A. Remove and reinstall the application B. Hard reset the cell phone C. Reconnect the wireless network connection D. Close all running applications

A. Remove and reinstall the application

Your PC is taking a long time to boot. What action can you take to fix this without spending money? A. Remove application from startup B. Install additional RAM C. Install a faster hard drive D. Run the Disk Cleanup utility

A. Remove application from startup

Two drives have failed in a RAID 5 what will you need to do to fix this? A. Replace the failed drives and restore the data from backup to the RAID B. Replace one of the failed drives and run the RAID repair C. Replace the failed drives and format the RAID using the quick option D. Replace one of the failed drives and repair the RAID using system utilities

A. Replace the failed drives and restore the data from backup to the RAID

In a virtual environment, which of the following allows all the VMs to have RAM allocated for use? A. Resource pooling B. Measured service C. Virtual application streaming D. Synchronization

A. Resource pooling

A network device that links dissimilar networks and can support multiple alternate paths between locations based upon the parameters of speed, traffic, loads, and cost. A. Router B. Switch C. Layer 2 Switch D. Layer 2 Router

A. Router

Which component is a Hot swappable interface A. SATA B. PATA C. IDE

A. SATA

This fiber has a small core and is designed to carry a long wavelength, usually generated by a laser. A. SMF B. MMF C. DSM D. SLL

A. SMF

What chip reports the configuration of memory module installed in a particular slot on the motherboard? A. SPD B. PDS C. DPS D. DSP

A. SPD

You are tasked to set up a specialized computing system for video editing. Which of the following should the you install on the workstation to BEST meet the specifications? A. SSD B. Hypervisor C. Gigabit NIC D. NAS

A. SSD

Bayonet-style twist-and-lock connector for fiber optic cabling A. ST Connector B. BNC C. FC Connector D. SC Connector

A. ST Connector

Motherboards now use a type of system firmware called UEFI. There is an option called ____, which restricts OS installation to trusted software. A. Secure Boot B. Secure Bot C. Boot Rec D. Secure Signed

A. Secure Boot

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? A. Server rack B. PoE phone C. Desktop printer D. Modem

A. Server rack

One of the main functions of an OS is to provide an _____ between the user and the computer hardware and software. A. Shell B. BASH C. Box D. Linux

A. Shell

Which of the following tools is used to type or paste recovery commands directly into a Linux box? A. Shell/terminal B. Backup/time machine C. Command/cmd D. Restore/snapshot

A. Shell/terminal

What Windows Shutdown options will close all open programs and services before powering off the computer? A. Shutdown B. Standby C. Hibernate D. Log off

A. Shutdown

Which of the following is an advantage of using DHCP for network addressing? A. Simplified configuration. B. More addresses are available C. Faster connection speeds D. Lower latency times

A. Simplified configuration

Memory with one 64-bit bus between the CPU and RAM A. single-channel memory B. memory C. double channel memory D. DDR

A. Single-channel memory

You are required to input a username and password to access a system. Which of the following authentication methods is being requested? A. Single-factor B. Multifactor C. RADIUS D. TACACS

A. Single-factor

Laptop DDR SDRAM are packaged in small modules called what? A. Small Outline Dual Inline Memory Module B. SOODIMM C. Small Inline Dual Outline Memory Module D. SIDOMM

A. Small Outline Dual Inline Memory Module

A measure by which to evaluate compliance with a policy. A. Standard B. SOP C. SSID D. Squid

A. Standard

Push/pull connector used with fiber optic cabling. A. Subscriber Connector (SC) B. Square Connector C. Straight Tip Connector D. British Naval Connector

A. Subscriber Connector (SC)

Which of the following devices is BEST to use when designing a SOHO network to ensure the least amount of collisions? A. Switch B. Bridge C. Hub D. Access point

A. Switch

A condition where two or more physical CPUs that share a common OS and memory execute instructions simultaneously. A. Symmetric Multiprocessing B. SOHO processing C. Single Mode Fiber D. Assymmetric Multiprocessing

A. Symmetric Multiprocessing

A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information. A. TPM B. BitLocker C. EFS D. UEFI

A. TPM

A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information. Essentially, it functions as a smart card embedded on a motherboard. A. TPM B. BIOS C. UEFI D. TSP

A. TPM

A customer brings in a PC that recently stopped working. The technician begins diagnosis and finds the following symptoms: The PC turns on and all fans spin normally. No display output is given either from onboard video or a PCIe video card. There are no POST beep codes even with the CPU and RAM fully removed. Which of the following is the MOST accurate conclusion based on these finding? A. The PSU wattage is rated too low for the components. B. The CMOS battery is dead and needs replacement. C. The PSU has its voltage switch set to 240V. D. The motherboard has failed and needs replacement.

A. The PSU wattage is rated too low for the components.

A printer in your office has stopped printing. All workstations are manually configured to print to the printer over the network. You start to troubleshoot the problem. You can still see the printer in the network directory. You print a self-diagnostic page with no issues. Which of the following is most likely the cause? A. The printer's IP address has changed. B. The network print spooler service has been restarted C. "Perform Printer Maintenance" message is displayed on the printer's LCD panel D. Two or more users sent print jobs simultaneously, causing a print collision.

A. The printer's IP address has changed.

If you see these directory names HKEY_LOCAL_MACHINE, HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_USERS, and HKEY_CURRENT_CONFIG, where do these reside at? A. The registry B. The System 32 C. The System 64 D. The BASH

A. The registry

You have purchased a new Android phone and are attempting to access a public hotspot. When you get a message indicating the page cannot be displayed. You notice there is a "?" in the radio icon in the toolbar. You have verified Bluetooth is active, airplane mode is off, and tethering is turned on. You use the cell phone to call a technician for assistance. Which of the following are you experiencing? A. There is unauthenticated wireless connectivity B. You have exceeded the data allowance C. The phone is only 3G capable D. It is an unrooted phone

A. There is unauthenticated wireless connectivity

A user needs to be able to access the central employee data repository to run reports, but does not need access to any local applications used to create, edit, and manage the employee data. The employee data is managed on a server that can be accessed with a log in. What type of client is best in this case? A. Thin client B. Virtualization workstation C. Thick client D. Graphics workstation

A. Thin client

You are building a workstation what will only be used to connect remotely to a server. What type of build is best for the this? A. Thin client B. Home server PC C. CAD workstation D. AV workstation

A. Thin client

You want to restore an application's security settings to an iOS device, but an Internet connection is unavailable. Which of the following tools can assist with mitigating this issue? A. Time machine B. Apple Configurator C. Device stage D. iCloud

A. Time machine

Why would a user be likely to disable cellular data access but leave Wi-Fi enabled? A. To avoid data charges B. To avoid incoming messages C. To speed up connections D. To login to store

A. To avoid data charges

What protocol ensures reliable delivery of data that use acknowledgement messages that inform the sender the data was successfully received. A. Transport Control Protocol B. User datagram protocol C. 21 D. File transfer protocol

A. Transport Control Protocol

Which of the following is a security threat that disguises itself as legitimate software? A. Trojan B. Worm C. Virus D. Spyware

A. Trojan

You downloaded a game onto your phone. When not in use it dials random numbers and downloads new content. You just fell for what? A. Trojan horse B. Spyware C. Social engineering D. Worms

A. Trojan horse

DHCP utilizes what ports? A. UDP 67 and 68 B. TCP 67 and 68 C. UDP 67 and TCP 68 D. TCP 67 and UDP 68

A. UDP 67 and 68

You are performing an OS upgrade and provided with an ISO installation file. The customer's computer is running Windows 8. The computer does not have an internal optical drive. Which of the following boot methods would be the best to perform the upgrade with the latest amount of effort? A. USB B. SSD C. PXE D. CDR

A. USB

Which of the following installation types would require the use of an answer file to install the OS? A. Unattended B. Clean C. Repair D. Upgrade

A. Unattended

You are using a smartphone for navigation while driving. As you drive an icon frequently appears on the screen informing you additional information is required to log in. Which of the following is causing this? A. Unintended WiFi connections B. Cellular data roaming notifications C. Weak cellular signal D. Unintended Bluetooth connections

A. Unintended WiFi connections

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should you recommend? A. Uninterruptible power supply B. Surge protector C. Power strip D. Power distribution unit

A. Uninterruptible power supply

Which of the following devices can be used to connect multiple devices within a network without broadcasting to every network port? A. Unmanaged switch B. HUB C. Firewall D. Cable modem

A. Unmanaged switch

If I need to connect HDMI cable to a DVI-I port what can I do? A. Use a HDMI to DVI-I adapter B. Use a Crossover cable C. Use another HDMI cable D. Nothing you cannot connect HDMI to DVI-I

A. Use a HDMI to DVI-I adapter

You are setting up a WiFi-enabled thermostat for a customer, but the customer is concerned about IoT devices getting hacked. Which of the following BEST address the customer's concerns? A. Use the latest encryption standard on the wireless network and set a strong password. B. Enable two-factor authentication for the IoT device's cloud account, if it is available. C. Disable wireless access on the thermostat to make it unshakable. D. Upgrade the customer's router to the latest version to improve network security

A. Use the latest encryption standard on the wireless network and set a strong password.

This was implemented to make administering computer as an administrator easier. It will pop up a window asking if these changes to the computer can precede or not. A. User Account Control B. Run As C. User Account Authorization D. Command Line <.exe.>

A. User Account Control

A virtual environment in which users can customize and update the environment as if it was a physical environment. A. VDE B. VDI C. VR D. vBox

A. VDE

MacOS version of RDP but provides no connection security. A. VNC B. HyperV C. Remote Assistance D. TCP

A. VNC

Remote access tool and protocol. Is the basis of macOS screen sharing. A. VNC B. BNC C. CVS D. VTN

A. VNC

A headset worn like goggles to interact with images displayed in the headset A. VR headset B. Army C. SkyNet D. GoogleGlassDoor

A. VR headset

Satellite systems provide far bigger areas of coverage than can be achieved using other technologies. A ____ microwave antenna is aligned to an orbital satellite that can either relay signals between sites directly or via another satellite. A. VSAT B. SAT C. BAT D. RAS

A. VSAT

CPU vendors have built special instruction set extensions to facilitate virtualization. The Intel technology for this is called ____ A. VT-x B. AMD-V C. Hyper-V D. VirtualBox

A. VT-x

You receive a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should you perform first? A. Verify data connectivity B. Reformat the MicroSD card C. Replace the SIM card D. Perform a soft restore

A. Verify data connectivity

You want to upgrade a workstation by adding a USB 3.0 card, and upgrading the video card, sound card, and NIC. Which of the following upgrades would MOST likely require upgrading the power supply? A. Video card B. USB 3.0 card C. Sound card D. Network card

A. Video Card

If i choose not to print to a print device but instead choose to Print to File, what type of printer am I using. A. Virtual Printer B. Laser Printer C. InkJet Printer D. File Printer

A. Virtual Printer

A user, Ann, receives a phone call from the company's mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced? A. Virus infection B. Man-in-the-middle attack C. Phishing attack D. Rootkit attack

A. Virus infection

Loads the boot manager, which for Windows is bootmgr.exe A. Volume Boot Record B. Variable Boot Record C. Volume Boost Record D. Variable Boost Record

A. Volume Boot Record

Techniques to prevent a user being overwhelmed with spam. A. email filtering B. email tracking C. email smishing D. email spoofing

A. email filtering

With a VPN, TCP/IP communications are _____ and then packaged within another TCP/IP packet stream. A. encrypted B. hashed C. monster D. mash

A. encrypted

An _____ requires all visitors to sign in and out when entering and leaving the building. A. entry control roster B. ACL C. UAC D. FOB

A. entry control roster

A network that spans multiple geographic locations A. WAN B. WLAN C. WOL D. LAN

A. WAN

What type of network spans multiple geographic locations? A. WAN B. MAN C. PAN D. CAN

A. WAN

Encryption system based on the RC4 cipher. You can select different key sizes 64-bit or 128-bit. A. WEP B. WPA C. WPA2 D. HASH

A. WEP

What is the most secure? A. WPA2/AES B. WPA2/TKIP C. WEP D. WPA

A. WPA2/AES

The automation process of setting up an access point securely is known as: A. WPS B. SSID C. WPA D. WEP

A. WPS

The term for when the screen and print output are supposed to be the same. A. WYSIWG B. WWAN C. WWJD D. WWH30D

A. WYSIWG

You are going to travel outside the United States. What should you check first on your laptop to ensure power compatibility before traveling? A. Wall adapter B. Battery C. Power supply D. Digitizer

A. Wall adapter

You are having issues with your laptop picking up a wireless connection in certain areas of your building. Other users working on their laptop in common areas have Internet connectivity. What is probably the reason? A. Weak RF signals B. Out of date Ethernet driver C. Enabled MAC filtering D. duplicate IP addresses

A. Weak RF signals

An address added to this list is permitted to connect to any port. A. Whitelisting B. Blacklisting C. ACL D. Dora

A. Whitelisting

In Linux commands the (* and ?) can be used as what? A. Wildcards B. Options C. Arguments D. Help

A. Wildcards

Which of the following below does not support SMP (Symmetric Multi-processing) or "Multiple CPUs". A. Windows 10 Home B. Windows 10 Pro C. Windows 10 Education D. Windows 10 Enterprise

A. Windows 10 Home

In Windows, handles the display and print functions for compatible applicaitons. A. Windows Presentation Foundationr B. Windows Media Center C. Hello World D. SkyNet

A. Windows Presentation Foundation

A Windows feature that prevents essential system files, folders, and registry keys from being replaced to help prevent application and operating system failure. A. Windows Resource Protection B. WPS C. Firewall D. IPS

A. Windows Resource Protection

Windows comes with a _____ mechanism to prevent damage to or malicious use of system files and registry keys and files. The manual interface for verifying system files and restoring them from cache if they are found to be corrupt or damaged is known as System File Checker A. Windows Resource Protection B. AUC C. CMD D. WINSxS

A. Windows Resource Protection

This type of Internet access refers to using an adapter to link to a cellular phone provider's network via the nearest available transmitter (base station). A. Wireless Wide Area Network B. CWAN C. Cellulose Network D. Wireless Fidelity Network

A. Wireless Wide Area Network

The wireless version of WoL A. WoWLAN B. WoLW C. WWoL D. ROFLOL

A. WoWLAN

What is the little triangle that might be in the corner of the CPU chip? A. alignment mark B. whether it is a PGA or LGA C. The model of CPU D. There are no marks

A. alignment mark

Which of the following devices provides protection against brownouts? A. battery backup B. surge suppressor C. rack grounding D. line conditioner

A. battery backup

What command line tool can be used to attempt repair of the MBR? A. bootrec /fixmbr B. bootrec /fixboot C. bootrec /rebuildbcd

A. bootrec /fixmbr

If you experience an error such as "BCD missing" when booting the computer, what action could you take? A. bootrec /rebuildbcd B. bootrec /fixmbr C. bootrec /takebcd

A. bootrec /rebuildbcd

You are notified of file system errors on an external hard drive. What is the best tool to use to repair common errors on the drive? A. chkdsk B. diskpart C. format D. sfc

A. chkdsk

A device found on Laser Printers that remove any remaining toner particles from the drum is called what? A. cleaning blade B. fuser assembly C. transfer roller D. corona wire

A. cleaning blade

In this cable, the core signal conductor is enclosed by dielectric then a second wire mesh conductor serves both as shielding from EMI and as a ground. A. coax B. fiber C. ethernet D. HDMI

A. coax

You need to create Internet access for customers while onsite. You need to prevent the customers from accessing any corporate data. What can you do? A. configure a guest wireless network B. implement a DMZ C. disable NAT on the wireless network D. assign static IPs for all devices

A. configure a guest wireless network

This scanner works by shining a bright light, usually from a cold cathode fluorescent lamp at the object which is placed on a protective glass surface. A. flatbed scanner B. flatbed printer C. flatbed2pie D. appleBedScanner

A. flatbed scanner

You are trying to use an external hard drive with an incompatible file system. Which of the following tools will allow you to change the file system on the hard drive? A. format B. defrag C. bootrec D. chkdsk

A. format

What is the name of the IPv6 address that is the same as the IPv4 public addresses? A. global address B. link-local address C. private D. broadcast

A. global address

The Windows Registry is made up of _____. Each one contains a discrete body of configuration data corresponding to an aspect of the system. A. hives B. files C. folder D. batch files

A. hives

Installing the OS on top of an existing version of the OS, retaining applications, user settings, and data files. A. in-place upgrade B. factory reset C. migration D. incineration

A. in-place upgrade

You have a desktop computer that will go with you around the world. What is the most important to consider when you choose your power supply? A. input voltage B. efficiency rating C. 12V rail amperage D. number of SATA connectors

A. input voltage

The point at which two devices connect and communicate with each other A. interface B. port C. orifice D. MDK

A. interface

One way of categorizing types of buses is to divide them into internal and external. An internal bus, or ___ bus, connects core components, such as the CPU, memory, and the system controllers. A. local B. host C. external D. expansion

A. local

A switch that you can configure security settings and other options on A. managed switches B. unmanaged switches C. OOBE switches D. HOSO switches

A. managed switches

One way to make instruction execution more efficient is to improve the way the pipeline works. The basic approach is to do the most amount of work possible in a single clock cycle. A. multitasking B. double data rate C. overtime D. speed duplexing

A. multitasking

The feature that allows users to store files in cloud-based when necessary, but can be removed when space is freed up, is known as: A. on-demand B. resource pool C. synchronization application D. shared resources

A. on-demand

Data that has nominally been deleted from a disk by the user can often be recovered using special tools. This is the best way to shred data without physically destroying a disk. A. remnant removal B. shredding C. burning D. degassing

A. remnant removal

A user who has access rights to all files and resources on the system and is the default administrative account on a Linux system. A. root user B. admin user C. super user D. SU

A. root user

A text file containing commands or instructions that are performed by a program on the computer rather than by the computer itself. A. script file B. system file C. app file D. resource file

A. script file

A _____ is a Windows process that does not require any sort of user interaction and runs in the background. A. service B. task C. priority D. event

A. service

In this type of scanner the paper is passed over a fixed scan head. A. sheet-fed scanner B. scanner C. faxxer scanner D. impact scanner

A. sheet-fed scanner

Memory with one 64-bit bus between the CPU and RAM A. single-channel memory B. dual-channel memory C. RAM D. DDR

A. single-channel memory

refers to capturing and reading data packets as they move over the network A. sniffing B. scanning C. tapping D. reading

A. sniffing

A hacker gains useful information about an organization by deceiving its users or by exploiting their unsecure working practices A. social engineering B. impersonation C. domination D. charm

A. social engineering

You changed the MAC address of a laptop to gain access to a network. A. spoofing B. brute force C. man-in-the-middle D. a botnet

A. spoofing

A 3D printing method which uses a resin or photopolymer to create objects which are cured using an ultraviolet laser. A. stereolithography B. wafer C. pla D. esb

A. stereolithography

Under 802.1X, the device requesting access to a network A. supplicant B. AAA C. CIA D. replicator

A. supplicant

Used in UNIX and Linux, log files that allow for centralized collection of events from multiple sources. A. syslog B. serverlog C. eventlog D. sysprep

A. syslog

A stream of instructions generated by a software application. Most applications run a single process in a single ____. A. thread B. sector C. belt D. auc

A. thread

When someone other than an authorized user gains access to an online account. A. unauthorized account access B. user account control C. unauthorized installation control D. unauthorized system restore access

A. unauthorized account access

Match each RAM type A. DDR-200 B. DDR-266 C. DDR-333 D. DDR-400 1. PC-2700 2. PC-1600 3. PC-2100

A.2 B. 3 C. 1

Match the Wireless security feature to its type A. WEP B. WPA C. WPA2 1. Advanced Encryption Standard 2. 64-bit or 128-bit key 3. TKIP (Temporal Key Integrity protocol)

A.2 B. 3 C. 1

Match each letter with the correct answer. A. Hard Disk Drive (HDD) B. Solid State Drive (SSD) C. Hybrid 1. flash memory technology offering much faster performance and less weight and power consumption 2. an HDD with a large cache of flash memory, offering a performance boost 3. magnetic disk technology offering low cost per gigabyte storage

A.3 B. 1 C. 2

The ping utility uses what protocol to request status messages from hosts. A. DNS B. ICMP C. Route D. TCP/IP

B. ICMP

What is the pin layout of an EIA/TIA 568 B Standard? A 1 - Green w/stripe 2 - Green 3 - Orange w/stripe 4 - Blue 5 - Blue w/stripe 6 - Orange 7 - Brown w/stripe 8 - Brown B 1 - Orange w/stripe 2 - Orange 3 - Green w/stripe 4 - Blue 5 - Blue w/stripe 6 - Green 7 - Brown w/stripe 8 - Brown C 1 - Brown 2 - Brown w/stripe 3 - Orange 4 - Blue w/stripe 5 - Blue 6 - Orange w/stripe 7 - Green 8 - Green w/stripe

B 1 - Orange w/stripe 2 - Orange 3 - Green w/stripe 4 - Blue 5 - Blue w/stripe 6 - Green 7 - Brown w/stripe 8 - Brown

How many pins on a VGA port A. 9 B. 15 C. 25 D. 1

B. 15

What sampling rate from a sound card would you require if you want to be able to record CD-quality sound? A. 8-bit @ 44.1 KHz B. 16-bit @ 44.1 KHz C. 24-bit @ 44.1 KHz D. 32-bit @ 44.1 KHz

B. 16-bit @ 44.1 KHz

What IP address indicates an APIPA address? A. 10.10.1.1 B. 169.254.0.1 C. 172.168.1.1 D. 192.169.1.1

B. 169.254.0.1

With a RAID 10 how much storage would I have available if I used 4 drives each with 10 GB space. A. 10 B. 20 C. 30 D. 40

B. 20

You want to block remote logins to a switch. Which of the following ports should be blocked? A. 21 B. 23 C. 80 D. 443

B. 23

What is the subnetmask for a /13 network? A. 255.255.0.0 B. 255.248.0.0 C. 255.192.0.0 D. 255.260.0.0

B. 255.248.0.0

You need the minimum amount of drives that offers parity and performance? A. 2 B. 3 C. 4 D. 5

B. 3

What is the transfer rate of SATA 2.0? A. 1.5Gbps B. 3.0Gbps C. 6.0Gbps D. 16Gbps

B. 3.0Gbps

A printing process that builds a solid object from successive layers of material A. 3D modelling software B. 3D print process C. 3D printer D. 3D scanner

B. 3D print process

Hardware device capable of small scale manufacturing. A. 3D modelling software B. 3D printer C. 3D print process D. 3D scanner

B. 3D printer

What is the Maximum amount of RAM for a 32-bit Windows 7 Home Basic Edition A. 2 GB B. 4 GB C. 512 GB D. 128 GB

B. 4 GB

HDMI version 2.1 supports what bandwidth? A. 32 Gbps B. 48 Gbps C. 12 Gbps D. 100 Gbps

B. 48 Gbps

Tablets are normally what size? A. 1" to 5" B. 7" to 10" C. 50" to 65" D. 2" to 6"

B. 7" to 10"

A user wants to implement a wireless router that will have the fastest data speeds and operate over the 5GHz frequency. Which of the following standards should the user select? A. 802.11a B. 802.11ac C. 802.11g D. 802.11n

B. 802.11ac

Injecting a false IP:MAC lookup into the victim's address resolution protocol cache. A. IP poisoning B. ARP poisoning C. MAC poisoning D. Spoofing

B. ARP poisoning

_____ is the skill of listening to an individual so that you give them your full attention and are not trying to argue with, comment on, or misinterpret what they have said. A. Feedback B. Active listening C. Open questions D. Professionalism

B. Active listening

In Windows 8.1, \\E$ is an example of which of the following types of share? A. EFS B. Administrative C. Local D. NAS

B. Administrative

Android smartphone are typically different from other smartphone devices in that: A. Android devices use apps that are more secure than other devices. B. Android devices use open source operating systems. C. Android devices can only operate with a proprietary operating system. D. Android devices can receive apps from different sources.

B. Android devices use open source operating systems.

You find that any URL entered redirects to the same web page. You concludes that your computer has been compromised. Which of the following tools would you use to resolve the issue? A. Last known good configuration B. Anti-malware C. System restore D. Rouge antivirus

B. Anti-malware

This is a more limited type of VDI. It runs an application hosted on the server instead of running the whole desktop as a virtual platform. A. Virtual Desktop Infrastructure B. Application virtualization C. Hyper-V D. Virtual Box

B. Application virtualization

Term used to describe unexpected objects or patterns appearing on the screen. A. Burn-in B. Artifacts C. Dead pixels D. Reflection

B. Artifacts

You need to copy a database that is 97GB in size for multiple users. What is the best choice of media format. A. BD-RE DL B. BDXL C. BD-RE D. BD-R

B. BDXL

A process that requires no user interaction can run in the _____ A. BackLog B. Background C. Service D. Space

B. Background

What is the shell called in Linux? A. PowerShell B. Bash C. KDE D. Gnome

B. Bash

You need to attend several day-long conferences and want to ensure your mobile device will have enough power for these events. You are concerned about wall outlet availability at the conferences and needs to continuously use your device for important updates. Which of the following should you do? A. Wireless charging pad B. Built-in battery case C. Extra charging cords D. Airplane mode

B. Built-in battery case

Which of the following is not a term describing the firmware embedded onto a standard motherboard? A. BIOS (Basic Input Output System) B. CMOS (Complementary Metal-Oxide Semiconductor) C. UEFI (Unified Extensible Firmware Interface)

B. CMOS (Complementary Metal-Oxide Semiconductor)

A small office owner has asked you to ensure all users in the office have the ability to access the wireless network but that the network is not accessible outside the building. Which of the following should you recommend? A. Change the static IP addresses B. Change the antenna placement C. Change the default SSID D. Change the encryption type E. Change the content filtering settings

B. Change the antenna placement

A user is experiencing email problems and explains to you that all emails with graphics or images do not display. What could correct this problem? A. Change the email settings in antivirus B. Change the security settings of the email client C. Change the firewall security settings D. change the email proxy settings E. change the trusted sites in the browser settings

B. Change the security settings of the email client

You have been notified that recent vulnerabilities have been discovered related to a type of SOHO router. You have verified that all connections and settings are appropriate. Which of the following actions should you take next? A. Change the router firewall settings B. Check for and apply a firmware update C. Reconfigure the QoS settings D. Change router user-names and passwords

B. Check for and apply a firmware update

When you browse to a favorite website on a Windows laptop, a different website opens.You install an additional web browser, but it also opens to the same unfamiliar site. You reset the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should you complete next? A. Change the browser's home page B. Check the host file C. Update the default web browser D. Restore Windows to a previous date

B. Check the host file

You need pages 1-10 separated from pages 11-20 done by the printer. What setting do you need to configure? A. Duplex B. Collate C. Orientation D. Quality

B. Collate

A customer asks whether an iOS app that your company developed will also work on her Apple macOS computer. What issue does this raise? A. No issues B. Compatibility C. It is not Windows or Linux D. Why ask Why

B. Compatibility

The fundamental security goal of keeping information and communications private and protecting them from unauthorized access. A. Availability B. Confidentiality C. Integrity D. Encryption

B. Confidentiality

A workstation has a network link light, but it cannot access internal network resources. Which of the following is the most likely cause of the issue? A. Slow transfer speeds B. IP address conflict C. Incorrect gateway D. Packet collisions

B. IP address conflict

The use of IT services and devices to disrupt national, state, or organization activities, especially when used for military purposes. A. Cyber Security B. Cyber Warfare C. Cyber Bully D. Cyber Dancer

B. Cyber Warfare

A attack that uses multiple compromised computers to launch the attack to shutdown services. A. DoS B. DDoS C. Botnet D. Zombie

B. DDoS

You have been informed that multiple users are receiving duplicate IP address warnings on their workstations, and they are unable to browse the Internet. Which of the following server types should you log in to in order to resolve the problem? A. DNS server B. DHCP server C. Proxy server D. RADIUS server

B. DHCP server

You are troubleshooting an issue with a wireless adapter. When yo open Device Manager, you find the device's icon is shown with a down arrow superimposed. What does this mean? A. Error B. Disabled C. Broke D. No problem

B. Disabled

DDR stands for what? A. Dual Data Rate B. Double Data Rate C. Disk Drive Reader D. Double Drive Rate

B. Double Data Rate

When i want to mirror a display from one screen to the next what is the drop down I would select? A. Extend these displays B. Duplicate these displays C. Find displays D. Use a mirror and hold it so that the display can be mirrored

B. Duplicate these displays

Which of the following Windows features would be used to encrypt a single file or folder? A. FES B. EFS C. NTFS D. Encryption

B. EFS

You are investigating latency on a WiFi network. You discover a number of unidentified devices connected and wishes to limit access to only authorized users. Which of the following will best meet the requirement? A. Assign static IP addresses B. Enable MAC filtering C. Disable SSID broadcast D. Limit the DHCP scope

B. Enable MAC filtering

The crucial step in enforcing wireless security is to _____ A. Disable SSID B. Enable encryption C. Use channel 1, 6, 11 D. Pass the Hash

B. Enable encryption

If you do not have all the answers to fix a problem you can do what? A. Ignore it B. Escalate it C. Take your time and try to figure it out on your own D. Tell them to call Geek Squad

B. Escalate it

What causes a fuse to blow? A. Excess volts B. Excess current C. Excess power D. no power

B. Excess current

You can unlock your phone with your face, Apple refers to their system as what? A. Apple ID B. Face ID C. Face Apple Time D. Face Time

B. Face ID

A biometric mechanism where the hash is computed from a picture of the user's face. A. Hello World B. Face Lock C. Fingerprint D. Swipe Lock

B. Face Lock

You want to use multifactor authentication on your phone. A. Passcode lock and swipe lock B. Fingerprint lock and passcode lock C. Picture passcode and pin lock D. Face lock and fingerprint lock

B. Fingerprint lock and passcode lock

When someone refers to AAA security and needs a device that performs the first A what type of device are we talking about? A. Video camera B. Fingerprint scanner C. Keylock D. Emergency lights

B. Fingerprint scanner

A safety device, that when the flow of electricity exceeds the rating it will trip and break the circuit. A. Diode B. Fuse C. Capacitor D. Transistor

B. Fuse

You want to build a server for home use. The server will store and stream video files to other devices over your local network and you would require some fault tolerance for data loss. What below is most important? A. Multiple display support B. Gigabit NIC C. HDMI output D. Compact form factor

B. Gigabit NIC

When working on a system, you needs to prevent computer component failure by following a few simple rules. You are handling internal components but not using an ESD strap. After opening the computer, which of the following should you do NEXT? A. Remove dust from the system B. Ground himself to the chassis C. Unplug the power cable D. Use an antistatic bag

B. Ground himself to the chassis

A block of copper or aluminum with fins used to dissipate heat from a chip. A. Thermal paste B. Heat sink C. Heat exchanger D. Liquid cooling

B. Heat sink

What is the term used for being able to remove a drive while power is applied? A. Hot spare B. Hot swappable C. Cold spare D. Cold swappable

B. Hot swappable

Which of the following resources is the most critical when using cloud file-storage synchronization applications? A. Disk speed B. I/O bandwidth C. RAM utilization D. CPU utilization

B. I/O bandwidth

Which of the following resources is the most important when using cloud file-storage synchronization applications? A. Disk speed B. I/O bandwidth C. RAM utilization D. CPU utilization

B. I/O bandwidth

You are given this IP address 192.168.15.2/32. Describe this address. A. IPv4 address in subnet mask format B. IPv4 address in CIDR format C. IPv6 address in CIDR format D. IPv6 address in subnet mask format

B. IPv4 address in CIDR format

You are troubleshooting a laptop/projector combination that is displaying artifacts on the screen. When a different laptop is connected to the projector, the image appears to be correct but is very dim. Which of the following steps should you take to address the second issues? A. Update the video drivers on the laptop. B. Increase the projector contrast. C. Replace the original laptop. D. Change the aspect ratio on the projector.

B. Increase the projector contrast

A user's computer was recently installed with a new optical drive. The user now reports a "chassis" error message after the POST sequence. What might be the cause? A. BitLocker enabled in the BIOS B. Intrusion detection is enabled in the BIOS C. LoJack enabled in the BIOS D. Supervisor password enabled in the BIOS

B. Intrusion detection is enabled in the BIOS

Your display has suddenly become very dim. You try adjusting the brightness but it does not improve anything. What needs to be replaced? A. LCD panel B. Inverter C. Video card D. Digitizer

B. Inverter

You are running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, you restart the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check? A. Visit the Microsoft Update website to see if there is an issue with a specific update B. Look up the error number associated with the failed update C. Look at the system Event Viewer to find more information on the failure D. Download the failed update to install manually

B. Look up the error number associated with the failed update

What type of interface would allow a software program running on the PC to operate a synthesizer connected as a peripheral device? A. USB B. MIDI C. DNS D. MIID

B. MIDI

The 802.11n standard provides substantially more bandwidth than the legacy standards. It multiplexes the signals from 2 - 4 separate antennas in a process call ______. A. MU/MIMO B. MIMO C. MOMO D. MUMU

B. MIMO

You recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. You confirm the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? A. Administrative share permissions B. Mapped drives C. Group Policy hours restriction D. Disable proxy settings

B. Mapped drives

What MOBO form factor is 9.6 square A. ATX B. Micro-ATX C. Mini-ITX D. SFF

B. Micro-ATX

___ cases are used for high-end user PCs. A. Full tower B. Mid tower C. Mini tower D. Slimline

B. Mid tower

A power connector that is used to supply power to PATA drives, optical drives, and SCSI drives A. SATA B. Molex C. ATX D. Berg

B. Molex

Which of the following peripheral types is MOST likely to be used to input actions into a PC? A. Webcam B. Mouse C. Monitor D. Optical drive

B. Mouse

Which of the following provide the most security for PCs and mobile devices? A. Access control lists B. Multifactor authentication C. Organizational unit D. Trusted software sources E. Pre-shared key

B. Multifactor authentication

A network service provided by router or proxy server to map private local addresses to one or more publicly accessible IP addresses. A. ARP B. NAT C. SNOT D. Not this one, if not sure pick A

B. NAT

You find that your PC will not boot. You confirm the memory, power supply, and monitor are all working. You run internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following messages will be displayed? A. NTLDR not found B. No boot device available C. Operating system not found D. BIOS ROM checksum error

B. No boot device available

This is an older style connection that used parallel data transfers. A. SATA B. PATA C. USB D. SSD

B. PATA

You need to upgrade 20 PCs that have the same hardware specifications. The PCs must be configured with identical settings tailored for the network. Which of the following provides the best solution with the least administrative effort? A. PC backup and multiboot setup B. PC backup and system image deployment C. PC backup and OS upgrade D. PC backup and clean install

B. PC backup and system image deployment

You are having issues with large files taking a long time to open or save. And it gets worse over time. You check the hard drive and it is fine. What could you do next? A. Install the latest drivers from the hardware vendor B. Perform a scan of the drive for file fragmentation C. Run chkdsk on the workstation's hard drive D. Reformat the drive and reinstall the OS.

B. Perform a scan of the drive for file fragmentation

To access files and folders on a volume, the administrator of the computer will need to grant these to the user or groups. A. Resources B. Permissions C. Firewall D. Bagging

B. Permissions

A wireless adapter will be configured to drop the connection speed (use lower bandwidth) if the ____ is not at a minimum required level. A. IC B. RSSI C. SSID D. Port aggregation

B. RSSI

A wireless adapter will be configured to drop the connection speed if the ____ is not at a minimum required level. A. Sending Signal Strength Indicator (SSSI) B. Received Signal Strength Indicator (RSSI) C. Rolling Signal Sent Indicator (RSSI) D. When the signal flares up

B. Received Signal Strength Indicator (RSSI)

Which of the following is the proper way to dispose rechargeable batteries? A. Shred B. Recycle C. Dispose in trash D. Incinerate

B. Recycle

A user calls to say he is trying to sign on to his online banking service, but the browser reports that the certificate is invalid. What has probably happened? A. Malware B. Redirection C. Virus D. Worm

B. Redirection

What connector is used with 4-pair twisted cables and connect NICs? A. RJ-11 B. Registered Jack-45 C. Ethernet D. UTP

B. Registered Jack-45

A tool that you can send an invitation as a file, via email, or using Easy Connect that will allow the other person to provide a service if you are stuck and need help and that person can access your computer. A. Remote desktop B. Remote assistance C. Remote services D. Remote VPN

B. Remote assistance

This allows a remote user to connect to their desktop machine A. Remote assistance B. Remote desktop C. VPN D. File share

B. Remote desktop

You receive a message at bootup: OS not found. You notice a flash drive inserted. What should you do next? A. Reinstall the OS B. Remove the USB device C. Reformat the hard disk D. Modify the boot.ini file

B. Remove the USB device

A RAID utility reports that the volume is degraded. What should you do? A. Rebuild a new RAID B. Replace disk as soon as possible C. Nothing is just a bottleneck D. Buy SSD

B. Replace disk as soon as possible

You have a restricted user account and receive the following error message: Windows Update cannot currently check for updates because the service is not running. What should you do? A. Reboot the computer B. Restart the network services C. Roll back the device drivers D. Rebuild the Windows profiles

B. Restart the network services

When sending and receiving e-mail between users this security features ensures that the email is encrypted until the recipient receives and opens it. A. MDM B. S/MIME C. AES D. WPA2-AES

B. S/MIME

A high-quality audio port that uses coax cabling with RCA connectors or fiber optic cabling and connectors. A. SATA B. S/PDIF C. RCA D. Fiber

B. S/PDIF

Motherboards and connectors that are designed to take up less space. A. SPF B. SFF C. FFS D. EFS

B. SFF

Which of the following protocols would be used for file sharing between MAC OS and Windows OS workstations on a LAN? A. IMAP B. SMB C. SSH D. RDP

B. SMB

Which of the following Internet connection types is known to have a significantly higher latency than the others? A. Cable B. Satellite C. DSL D. Fiber

B. Satellite

You turn on your laptop and receive a message saying that IP address is already in use. What would you do A. Remove the static default gateway from the desktop B. Set laptop to automatically assign IP address C. Replace the network card D. Bridge the LAN connection between the laptop and the network

B. Set laptop to automatically assign IP address

You are tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives? A. Recycling B. Shredding C. Overwriting D. Reformatting

B. Shredding

You need to suggest to your boss a solution that does not have to be connected to WiFi so he can perform video conferencing. What would you suggest to her? A. Web camera B. Smartphone C. Smart watch D. Smart glasses

B. Smartphone

You are on a business trip and discover the WiFi hotspot on your phone is extremely slow. You run a speed test from a laptop connected to the hotspot and gets 2000 Kbps. A coworker with whom you are travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15 Mbps. You check the hotspot settings on your phone and see the following: Network name:My Hotspot Security:WPA2/PSK Password:hotspot Band:2.4 GHz Client DHCP start address:192.168.23.1 Which of the following is the MOST likely cause of the problem? A. You should be using WEP security on your hotspot for faster throughput B. Someone else is using your hotspot due to a weak password C. Your hotspot gave you an invalid IP address D. Your network name should be encrypted

B. Someone else is using your hotspot due to a weak password

Which of the following types of attack is associated with man-in-the-middle? A. Brute force B. Spoofing C. DDoS D. Zero-day

B. Spoofing

In terms of system hardware, what is the main advantage of a 64-bit version of Windows? A. Supports less than 4 GB RAM B. Supports more than 4 GB RAM C. Supports less than 6 GB RAM D. Supports more than 6 GB RAM

B. Supports more than 4 GB RAM

If i need to do full drive encryption what is required on the motherboard? A. BitLocker B. TPM C. Cache D. USB

B. TPM

You are troubleshooting an issue with a wireless adapter. When you open Device Manager, you find the device's icon is shown with a down arrow superimposed. What does this mean? A. That the device is down for anything B. The device has been disabled C. The device is OK D. The device has the blues

B. The device has been disabled

Which of the following BEST reason for replacing a hub with a switch? A. The hub did not provide PoE B. The hub had too many collisions C. The hub was out of ports D. The hub had a bad port

B. The hub had too many collisions

A catalog of devices and drivers that have been tested to ensure they are compatible with Windows 7 operating system. A. Compatibility List B. Windows Logo'd Product List catalog C. Access Control Lists D. Windows Certified Products List

B. Windows Logo'd Product List catalog

A type of printer that uses a print head to fuse or transfer wax-based ink onto paper or selectively heats specially treated paper to form the image. A. thermal paper B. thermal printer C. thermal shock D. thermal wax

B. Thermal printer

You are required to build a PC that is capable of running the standard Microsoft Windows 10 OS. You do not need any additional hardware for gaming or video editing. A. Thin clients B. Thick clients C. SFF D. Home server

B. Thick clients

Rising energy costs and environmental legislation are placing power efficiency at the top of the agenda for IT buyers. In terms of CPU performance, more speed means greater power consumption and heat production. To deal with these issues, CPU can implement power management to enter lower power states, referred to as _____. A. QoS B. Throttling C. SLAT D. Sleep

B. Throttling

You are the owner of a MAC and your system becomes corrupted with malware and has wrecked havoc on your files. You need to access data that was previously stored on your MAC. What should you use? A. Snapshot B. Time Machine C. System Restore D. Boot Camp

B. Time Machine

Which of the following is the MAIN reason that corporate policies protect access to PII? A. To protect proprietary company data B. To reduce the likelihood of identity theft C. To maintain the integrity of knowledge management systems D. To limit access to those who "need to know"

B. To reduce the likelihood of identity theft

A laptop is configured for extended desktop. You want to configure it so that the display is the same on both screens. What is the quickest way to accomplish this? A. Look for the setting in control panel B. Toggle the dual display function key C. Change the screen orientation D. Reboot the laptop

B. Toggle the dual display function key

You tasked with finding and labeling where a network connection terminates in a patch panel. Which of the following tools would be BEST for you to use? A. Ethernet cable tester B. Tone generator and probe C. RJ-45 loopback plug D. Patch panel punchdown tool

B. Tone generator and probe

You installed a popular archive utility. Antivirus software flagged the software because it was also exhibiting malicious behavior. This is an example of which of the following? A. Rootkit B. Trojan C. Spyware D. Worm

B. Trojan

This will protect the system from malware running with elevated administrator privileges. A. ACL B. UAC C. Runas D. Defender

B. UAC

Resources on the Internet are accessed using an addressing scheme known as a ____, it contains all the information necessary to identify and access an item. A. HTTP B. URL C. HTTPS D. FQDN

B. URL

A USB standard that operates at up to 480 Mbps. A. USB 1.0 B. USB 2.0 C. USB 3.0 D. USB 3.1

B. USB 2.0

USB standard that operates at up to 480 Mbps. A. USB 1.0 B. USB 2.0 C. USB 3.0 D. USB 3.1

B. USB 2.0

What serial interface has speed of 10Gbps? A. USB 3.0 B. USB 3.1 C. FireWire D. eSATA

B. USB 3.1

A USB standard that allows a port to function as either a host or as a device A. BitLocker to Go B. USB OTG C. USB autoconfig D. USBXfer

B. USB OTG

A laser printer jams and has been jamming more frequent. What can you do to fix the problem? A. Clean and inspect the laser drum assembly B. Use the printer maintenance kit to replace parts C. Replace the paper exit assembly switch D. Clean and replace the paper out sensor E. Clean the fuser cold roller and verify fuser operation

B. Use the printer maintenance kit to replace parts

This environment all data is stored on the server or in the cloud. The thin client computer only has to be powerful enough to display the screen image, input commands over the network. A. VDI B. VDE C. VNIC D. VBOX

B. VDE

A secure tunnel created between two endpoints connected via an unsecure network. A. VLAN B. VPN C. VPN concentrater D. WoL

B. VPN

You need connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should you use to gain access to the secure network? A. SSH B. VPN C. SFTP D. RDP

B. VPN

You spill liquid on a laptop. You want the device to be fixed and would like to know how much it will cost. Which of the following steps should you take NEXT to verify if the device is repairable before committing to a price? A. Remove the case and organize the parts. B. Verify if the warranty is still active C. Consult colleagues for advice D. Place the device in rice for a few days

B. Verify if the warranty is still active

You have a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would you check on the host to repair the problem? A. The cable connected to the network B. Virtual host network adapter C. USB host adapter D. The domain of the virtual machine

B. Virtual host network adapter

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach. A. Threat B. Vulnerability C. Risk D. CEH

B. Vulnerability

A mechanism for encrypting data sent over a wireless connection. Is considered flawed. A. WPA B. WEP C. WPA2 D. WMN

B. WEP

You are required to implement a WiFi hot-spot for the public. Which of the following should be used for secure access? A. WEP and TKIP B. WPA2 and AES C. WPA and static IPs D. WPA2 and MAC filtering

B. WPA2 and AES

As setting up an access point securely is relatively complex, vendors have developed a system to automate the process called what? A. WEP B. WPS C. WPA2 D. WPA

B. WPS

Provides client access using the HyperText Transfer Protocol or its secure version A. Active Directory server B. Web server C. VoIP server D. DHCP server

B. Web server

A form of phishing that targets individuals who are known or hare believed to be wealthy. A. Spear phishing B. Whaling C. Pharming D. Phat

B. Whaling

Technology that enables two mobile devices to connect to each other without a wireless access point. A. WAN B. Wi-Fi Direct C. Tethering D. VLAN

B. Wi-Fi Direct

What edition of Windows 10 is designed for domestic consumers and Small Office Home Office (SOHO) business use? A. Windows 10 Pro B. Windows 10 Home C. Windows 10 Enterprise D. Windows 10 Education

B. Windows 10 Home

What edition of Windows 10 is designed for small and medium-sized businesses. It comes with networking and management features designed to allow network administrators more control over each client device. A. Windows 10 Home B. Windows 10 Pro C. Windows 10 Enterprise D. Windows 10 Education

B. Windows 10 Pro

____ is a touchscreen-enabled "app" interface for managing a Windows 10 computer. A. Control Panel B. Windows Settings C. Charms D. Metro-UI

B. Windows Settings

You log in to your computer and receive an error that states this IP address is already in use. All the computers are assigned dynamic IP addresses. What should you do next? A. ipconfig B. ipconfig /release C. ipconfig /flushdns D. ipconfig /renew E. ipconfig /all

B. ipconfig /release

The provider's ability to control a customer's use of resources through metering is referred to as _____. A. elasticity B. measured service C. resource pooling D. SkyNet

B. measured service

Used when an existing switch does not support PoE. A. line conditioner B. power injector C. PoE+ D. PoE

B. power injector

Rules and formats enabling systems to exchange data. A single network will involve the use of many different ones. Some can define header fields to describe each packet, maximum length for the payload, and methods of processing information from the headers. A. port B. protocol C. QC D. PVR

B. protocol

A collection of several protocols used for networking are designed to work together. A. protocol group B. protocol suite C. protocol shoot D. protocol spoof

B. protocol suite

A benefit of cloud computing is that it can scale quickly to meet peak demand. A. measured service B. rapid elasticity C. resource pooling D. PaaS

B. rapid elasticity

When the user tries to open a web page but is sent to another page. A. phishing B. redirection C. replay attack D. popup

B. redirection

Gaining privileged level or root level access to an Android device to enable modifying code or installing software not intended for the device. A. jailbreaking B. rooting C. grounding D. lawncharing

B. rooting

The term given to the regularly sized subdivision of a drive track. A. vector B. sector C. track D. platter

B. sector

A Windows PC suffered a bad update, so a systems administrator removed the update. Which of the following tools should the systems administrator run to ensure the Windows files are not corrupted? A. MSConfig B. sfc C. defrag D. chkdsk

B. sfc

A Virtual machine does what for you? A. increase 32-bit machines to 64-bit B. share hardware resources C. Increase the network download speed D. Use less memory in the machine

B. share hardware resources

You need to connect to a branch location 20km away. What cabling is the best? A. shielded twisted pair B. single-mode fiber C. unshielded twisted pair D. multimode fiber

B. single-mode fiber

Used in UNIX and Linux, log files that allow for centralized collection of events from multiple sources. A. system log B. syslog C. event viewer D. AAA

B. syslog

In Microsoft terminology, is the bootable partition on the hard disk. This is usually, but not always separate to the boot partition, which contains the operating system. It is usually hidden from File Explorer. A. system files B. system partition C. boot partition D. tail partition

B. system partition

Using the cellular data plan of a mobile device to provide Internet access to a laptop or PC using a USB. A hotspot B. tethering C. tarand D. feathering

B. tethering

A sophisticated type of color printer that uses heat to diffuse dye from color ribbons onto special paper or transparency blanks to produce continuous-tone output similar in quality to a photographic print. A. thermal printer B. thermal dye transfer printer C. dot matrix printer D. laser printer

B. thermal dye transfer printer

You are tasked to install a new client machine. You notice the machine is not getting any network connectivity. You test the network cable between the PC and the network jack and confirm it is good. You go to the network closet and find several network cables not connected to the switch. Which of the following tools would you use to determine which cable goes back to the correct network jack? A. loopback plug B. toner probe C. WiFi analyzer D. Punchdown tool

B. toner probe

What command is used to view the routes/number of hops between the host and remote systems? A. nbstat B. tracert C. nslookup D. netstat

B. tracert

With this approach only a small piece of the application is installed on the end user device. Just enough for the end user device to be recognized as an authorized user. This only requires just a small portion of the application to be downloaded. A. Virtual NIC B. virtual application streaming C. container virtualization D. virtual desktops

B. virtual application streaming

A ____ character allows you to use unspecified characters with the command. A. wildhogs B. wildcards C. wildsymbols D. call of the wild

B. wildcards

Which of the following is a public IP address? A. 10.45.x.x B. 169.254.x.x C. .173.16.x.x D. 192.168.x.x

C. 173.16.x.x

The ranges of Private IP addresses are defined by what RFC. A. 1916 B. 1917 C. 1918 D. 1919

C. 1918

What is the minimum number of disk required for a RAID 0? A. 0 B. 4 C. 2 D. 3

C. 2

Thunderbolt version 2 supports speeds up to what? A. 5 Gbps B. 10 Gbps C. 15 Gbps D. 20 Gbps

C. 20 Gbps

A standard BD has a capacity of ____ GB per layer. A. 15 B. 20 C. 25 D. 30

C. 25

How many pins in a HDMI Type B connector? A. 30 B. 31 C. 29 D. 28

C. 29

An end user reports a printer error that states "Replace filament". With which of the following types of printer is the end user MOST likely having problems? A. ink jet B. laser C. 3-D D. thermal

C. 3-D

You are setting up Bluetooth speakers in your house. What is the average range of the speakers? A. 10 feet (3 meters) B. 15 feet (5 meters) C. 30 feet (9 meters) D. 45 feet (14 meters)

C. 30 feet (9 meters)

What printer uses a Print bed/build plate? A. Laser B. Impact C. 3D D. Thermal

C. 3D

How many expansion slots can an ATX board have A. 5 B. 6 C. 7 D. 8

C. 7

How many pins on a SATA connector? A. 5 B. 6 C. 7 D. 9

C. 7

PoE powered devices can draw up to about 25 W. A. 802.3af B. 803.2af C. 802.3at D. 803.2at

C. 802.3at

Which of the following is NOT a description of an Intel CPU? A. i7 B. Xeon C. 940 D. Sandybridge E. Pentium F. LGA

C. 940

An Android phone feature that allows users to interact with their phone using voice commands and a vehicle's built-in display. A. iCar B. AndroidCar C. Android Auto D. Link-A-Go-Go

C. Android Auto

Android devices require a Google Account, Microsoft requires Live Account what does iOS require? A. SSO B. KeyLocker C. Apple ID D. MacOS

C. Apple ID

What is the user account required for iOS called that you need to sign on. A. iOS ID B. keyLocker C. Apple ID D. MacID

C. Apple ID

The fundamental security goal of ensuring that systems operate continuously and that authorized individuals can access data that they need. A. Confidentiality B. Integrity C. Availability D. Resource Pooling

C. Availability

The fundamental security goal of ensuring that systems operate continuously and that authorized individuals can access data that they need. A. Integrity B. Accounting C. Availability D. Responsibility

C. Availability

Many Trojans will create these to allow an attacker to access the PC, upload files, and install software on it. A. Rootkit B. Pyware C. Backdoor D. Malware

C. Backdoor

Which of the following provide the BEST security for a server room? A. Badge reader B. Bollard C. Biometric lock D. Cable lock E. USB token

C. Biometric lock

Enable the user to encrypt all the information on a disk drive. A. EFS B. BranchCache C. BitLocker D. NTFS

C. BitLocker

complete loss of electrical power A. Brownout B. Whiteout C. Blackout D. Surgeout

C. Blackout

An enterprise might have computers installed at different geographic locations needing to view and update data at a central office. What would you use? A. BitLocker B. Cache C. BranchCache D. CacheBranch

C. BranchCache

A textual interface based on the operating system, where a user typically enters commands at the command prompt to instruct the computer to perform a specific task. A. CI B. LFI C. CLI D. FBI

C. CLI

Which of the following Ethernet cables can support 600 Mbps while saving you the most money? A. Cat 3 B. Cat 5 C. Cat 5e D. Cat 6

C. Cat 5e

If the text DPI is to small what can you do to fix this? A. Change Font B. Change your glasses C. Change the size of text D. Throw your computer in the trash and upgrade

C. Change the size of text

You are trying to install Windows from the setup disc, but the computer will not boot from the CD. What should you do? A. Check BIOS for a password B. Check BIOS for USB enable devices C. Check BIOS for boot order D. Check BIOS for boot size (if it is 12 or larger order bigger boots)

C. Check BIOS for boot order

What class of fire extinguisher is meant for electrical fires? A. Class A B. Class B C. Class C D. Class D E. Class K

C. Class C

A user's smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to best resolve this issue? A. Reset to the smartphone to factory default. B. Uninstall any unused apps. C. Close all running apps. D. Charge the smartphone.

C. Close all running apps.

The default management console with multiple snap-ins to configure local users and groups, disks, services, devices, and so on. A. Component Services B. Disk Management C. Computer Management D. SAD

C. Computer Management

An updated type of SDRAM where data is transferred twice in one cycle. A. ASDRAM B. DRB SDRAM C. DDR SDRAM D. DBL SDRAM

C. DDR SDRAM

A hierarchical system for resolving names to IP addresses A. SDN B. DHCP C. DNS D. URL

C. DNS

A video adapter designed to replace the VGA port used by CRT monitors. Can support digital only or digital and analog-signaling. A. HDMI B. DisplayPort C. DVI D. DVD

C. DVI

Which of the following does not support digital transmission. A. DVI-D B. DVI-I C. DVI-A

C. DVI-A

You need to install a Wireless AP and there is not a power outlet . What can you use? A. Stand switch B. router C. PoE injector D. repeater

C. PoE injector

If i have been using a HDD drive a lot and it steadily takes longer and longer to to load applications what is one tool I can use. A. Device manager B. Performance monitor C. Disk defragmentation D. Disk fragmentation

C. Disk defragmentation

Your computer has detected a S.M.A.R.T error. Which of the following should you run to diagnose the issue? A. Scheduled disk maintenance B. System Restore utility C. Disk maintenance utilities D. Driver/firmware updates

C. Disk maintenance utilities

A network attack that aims to disrupt a service, usually by overloading it. A. DiS B. DaS C. DoS D. DrM

C. DoS

A ___ is software that creates an interface between the device and the operating system. A. Host controller B. Connection C. Driver D. Putter

C. Driver

Social engineering technique of discovering things about an organization based on what it throws away. A. Eavesdropping B. Shoulder Surfing C. Dumpster Diving D. Trash Thrashing

C. Dumpster Diving

You need a solution to conserve paper without degrading the print quality. Which of the following printer settings would BEST enable you to accomplish this request? A. Density B. Collate C. Duplex D. Color management

C. Duplex

You need to print a job on both the front and back sides of the paper. What setting should you change in the printer settings? A. Collate B. Orientation C. Duplex D. Transparency

C. Duplex

You are attempting to manually migrate a user's profile from one Windows PC to another. Files in the user's My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur? A. exFAT B. Compressed C. EFS D. NTFS

C. EFS

The LEDs are arranged around the screen rather then behind it. A. LCD Backlights B. Backlit C. Edge lit D. OLED

C. Edge lit

Which of the following will help to protect an organization from further data exposure after a list of user passwords has already been leaked due to policy breach? A. Require strong passwords B. Enable file encryption C. Educate end users D. Restrict user permissions

C. Educate end users

You are experiencing buffering and delays while streaming video with too many people on the network. What can you do to fix the issue? A. disable SSID broadcast B. Setup UPnP C. Enable QoS D. Configure DMZ

C. Enable QoS

Multiple users have reported latency issues. After troubleshooting the issue, the technician finds that bandwidth is saturated by non-corporate applications. Which of the following should resolve this issue? A. Assign static IP addresses B. Enable MAC filtering C. Enable content filtering D. Configure an IPS

C. Enable content filtering

This is used to encrypt file or folders A. BitLocker B. BitLocker To Go C. Encrypting File System D. BranchCache

C. Encrypting File System

The 32-bit file system that allows approximately 4 GB partitions A. FAT B. FAT16 C. FAT32 D. NTFS

C. FAT32

Components that are easily user-replaceable are referred to as ____. A. FRI B. FRO C. FRU D. FRY

C. FRU

A condition where a system denies entry when it should have granted it. A. False positive B. False access C. False negative D. True negative

C. False negative

____ provides hierarchical access to the system objects, drives, folders, and files stored on the computer. A. EFS B. NTFS C. File Explorer D. Disk Management

C. File Explorer

The process of adding geographic location metadata to captured media such as pictures or videos A. LoJacking B. Geotracking C. Geotagging D. Forensics

C. Geotagging

Which of the following built-in accounts was removed in Windows 10? A. Power User B. Administrator C. Guest D. Standard user

C. Guest

Which of the following does NOT directly connect to the Northbridge chipset? A. PCIe x16 B. Random Access Memory (DIMM slots) C. HDD (Hard Drive) D. CPU (Processor)

C. HDD (Hard Drive)

Which of the following types of media connectors carries digital video as well as audio? A. DVI-D B. DVI-A C. HDMI D. VGA

C. HDMI

What shutdown options save the current session to disk before powering off the computer? A. Shut down B. Standby/Sleep C. Hibernate D. Log off

C. Hibernate

Which of the following would need to be enabled on a mobile phone to share its Internet connection with multiple devices simultaneously? A. NFC B. Bluetooth C. Hotspot D. Tethering

C. Hotspot

What is the name given to the part of the motherboard that is visible from the back of the chassis? A. BIOS B. GUI C. I/O D. UEFI

C. I/O

IP-level protocol for reporting errors and status information supporting the function of troubleshooting utilities such as ping. A. ICBM B. IMCP C. ICMP D. PCIe

C. ICMP

PING and TRACERT use what protocol for error messages. A. DMZ B. LCD C. ICMP D. STP

C. ICMP

What type of monitor delivers better color reproduction at a wider range of viewing angles. A. LCDs B. TN C. IPS D. Plasma

C. IPS

This file contains all of the contents from an optical disk in a single file. These files are often used to install virtual machine operating systems. A. PSO B. MSO C. ISO D. TXT

C. ISO

You want to install Windows 7 64-bit OS on a VM but keep getting errors. This is what is configured, Two 1 GHz CPUs, 2 GB of memory, 15GB hard drive, 800x600 screen resolution. Which should you change to fix the problem? A. Increase the number of CPUs B. Increase the amount of memory C. Increase the amount of hard drive space D. Increase the screen resolution

C. Increase the amount of hard drive space

What is an advantage of UDP over TCP? A. It is connection based B. It uses QoS C. It transfers packets faster D. It uses a three-way handshake

C. It transfers packets faster

macOS app for managing passwords cached by the OS and supported browser/web applications A. Keyholder B. Keycrypter C. Keychain D. Keyfob

C. Keychain

What protocol is used with Windows Active Directory or any other X.500 directory? A. SMS B. DPLA C. LDAP D. MIMO

C. LDAP

An account that is only associated with the computer on which it was created. A. Guest B. Standard User C. Local D. Admin

C. Local

You need to recycle PCs to be reused for another business. What is the best method for ensuring data has been removed? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning

C. Low-level formatting

Overloading the switch's MAC cache using a tool such as Dsniff or Ettercap to prevent genuine devices from connecting and potentially forcing the switch into hub or flooding mode. A. MAC spoofing B. MAC filtering C. MAC flooding D. Big MAC

C. MAC flooding

Any device that performs more than one function. A. AFB B. SFD C. MFD D. BBF

C. MFD

You hate buying new equipment for your computer if it still works. But you have finally decided to upgrade your old CD-ROM drive with a new Blu-ray player. Which will most likely be required to power the drive? A. HDMI to Displayport adapter B. Molex to ATX 12v adapter C. Molex to SATA adapter D. USB serial adapter

C. Molex to SATA adapter

You are troubleshooting a desktop with intermittent issues locking up and system errors. You suspect that the motherboard is not getting enough power. Which is the best tool to determine if the hypothesis is correct? A. POST card B. Loopback plug C. Multimeter D. Cable tester

C. Multimeter

This type of storage is usually found on a LAN and can attach to unused ports on a switch. Usually dedicated for file sharing between host on the same network. A. DAS B. SAN C. NAS D. NSA

C. NAS

What type of storage allows for easily creating shared folders for different host machines? A. SAN B. DAS C. NAS

C. NAS

What type of wireless communication has a very short distance? A. Bluetooth B. 802.11a C. NFC D. 802.11b

C. NFC

Which component does not make use of a fan? A. Graphics card B. Computer case C. NIC card D. Central Processing Unit

C. NIC card

The _____ created a standardized definition for cloud computing. A. IEEE B. IANA C. NIST D. SaaS

C. NIST

Type 1 hypervisor is installed where? A. On the host OS B. On the guest OS C. On the Host PC D. On the guest PC

C. On the PC

You want to configure your smartphone to save all attachments from an Outlook.com email to a cloud-based service. Pick the best choice? A. Google Drive B. iCloud C. One Drive D. FTP

C. One Drive

__ is software that also makes the program code used to design it available. A. Freeware B. DRM C. Open source D. PHI

C. Open source

You are in a Remote Assistance session, sharing a user's desktop. While trying to map a shared network drive for the user, an "access denied" error is encountered while using the user's credentials. Which of the following should you do next? A. Ensure the user's account is not locked out B. Use the fully qualified domain name of the share C. Open the location with administrator privileges D. Try mapping with a different drive letter

C. Open the location with administrator privileges

The data link protocol used for DSL (Digital Subscriber Line) A. PoE B. PPoE C. PPPoE D. PPoEE

C. PPPoE

Motherboards used to use a simple error detection method called ____. Each byte of data in memory is accompanied by a ninth bit. A. ECC B. Bit check C. Parity checking D. Free Willy

C. Parity checking

The act of dividing a physical disk into logically separate storage areas. A. Formatting B. Exposing C. Partitioning D. Defragmenting

C. Partitioning

Another name for each dot that can be produced on a monitor? A. Resolution B. Contrast C. Pixel D. DPI

C. Pixel

A grade of cable that does hot give off noxious or poisonous gases when burned. A. UTP B. STP C. Plenum D. Freedom

C. Plenum

Used to set up applications that require more than one port. When the firewall detects activity on outbound port destined for a given external IP address, it opens inbound access for the external IP address on a port for a set period. A. Port mirroring B. Port Security C. Port triggering D. Port Opening

C. Port triggering

A filter to fit over a display screen so that it can only be viewed straight-on. A. IPS B. privacy screen C. privacy filter D. cover

C. Privacy filter

If i have a drive with SMART it will do what? A. Provide a method a automatically configuring itself for data storage. B. Let me know if it is a SATA or IDE drive C. Provide early warning about drive failure D. Want to play if is is Smarter than a 5th grader.

C. Provide early warning about drive failure

What RAID require minimum 4 drives A. RAID 1 B. RAID 5 C. RAID 10 D. RAID 0

C. RAID 10

If i need to create a storage that offers performance as well a fault tolerance which RAID would I create? A. RAID 0 B. RAID 1 C. RAID 5

C. RAID 5

A tag containing a radio frequency identification chip programmed with asset data. A. RF B. RFID C. RFID tag D. Multifactor authentication

C. RFID tag

Which of the following will terminate a coaxial cable? A. DB9 B. RJ45 C. RG-59 D. RS-232

C. RG-59

You run a cable for a new computer and the requirement is CAT6. What should you use when terminating the cable? A. BNC B. RJ-12 C. RJ-45 D. ST E. F-connector

C. RJ-45

What is not a part of the HDD? A. Platters B. Spindle C. ROM manager D. Actuator

C. ROM manager

Which of the following cloud computing concepts allows scalable services to be provided to the client? A. On-demand B. Metered C. Rapid elasticity D. Resource pooling

C. Rapid elasticity

The portion of the system case with cut out slots aligned with the position of adapter card slots. A. Blank plates B. Front panel C. Rear panel D. PCIe

C. Rear panel

You have a CD burner labeled as 24x/16x/52x what does this tell you? A. Spin/Burn/Play speed B. How much data can be retrieved at one time C. Record/Rewrite/Read speed D. That it can handle three sizes of disc

C. Record/Rewrite/Read speed

A layer 1 device that takes a signal and repeats it to the devices that are connected to it. A. Broadcaster B. Spellcaster C. Repeater D. Cheater

C. Repeater

A user complains that their Bluetooth keyboard, which has worked for the last year, has stopped functioning. What would you suggest is the problem? A. Replace Bluetooth NIC B. Buy new keyboard C. Replace batteries D. Replace User

C. Replace batteries

Where the attacker intercepts some authentication data and reuses it to try to re-establish a session. A. Forward attack B. Remote attack C. Replay attack D. Attack of the killer tomatoes

C. Replay attack

A cloud provider's data center hardware is not dedicated or reserved for a particular customer account, allowing the provider to provision more resources through management software rather than physically altering hardware to allocate or deallocate resources for a customer. A. Resource spreading B. Strawberry spreading C. Resource pooling D. Car pooling

C. Resource pooling

When your NIC adapter starts to move out of range of one access point, it might try to connect to another one with a better signal. This is known as? A. Transmit Power B. Wake On LAN C. Roaming Aggressiveness D. Port Aggregation

C. Roaming Aggressiveness

A /30 network is usually used to connect what devices? A. Switches B. Bridges C. Routers D. Hubs

C. Routers

This type of 3D printer fuses layers together using a pulse laser. The object is created from a powder and lowered into a tank as each layer is added. The powder can be plastic or metal. A. SLA B. SLI C. SLS D. SMB

C. SLS

You need access to a shared mailbox inside cloud-based email. What protocol do you use? A. IMAP B. S/MIME C. SMTP D. SNMP

C. SMTP

A small network that provides connectivity and resource sharing for a tiny office or for the users home. A. SSHO B. SSID C. SOHO D. SOP

C. SOHO

You log onto facebook and apply your credentials. You then log into other applications that use those same credentials to gain access. A. Head unit B. Multiple sign on C. SSO D. Synchronization

C. SSO

You need to run multimode fiber and only need to run about 152 meters. What is the best connector choice? A. BNC B. LC C. ST D. F

C. ST

When power supply entering a computer's components dips briefly below that which is required A. Spike B. Surge C. Sag D. Spat

C. Sag

The ____ is a simple name (case sensitive 32-bit alphanumeric string) for users to identify the WLAN. A. Virtual Private Network B. WiFi C. Service Set Identifier D. SIID

C. Service Set Identifier

Any type of persistent digital storage technology that does not use mechanical parts. A. Hard Disk Storage B. Solid Disk Storage C. Solid State Storage D. Hybrid Storage

C. Solid State Storage

A ___ is used to identify the Network and host portion of an IP address A. Default Gateway B. NetMask ID C. Subnet Mask D. IP address

C. Subnet Mask

A AAA server that is Cisco proprietary, similar to RADIUS. But mainly used for admin access to routers and switches. A. Kerberos B. RADIUS C. TACACS+ D. CIA

C. TACACS+

Application facilitating backup operations in MacOS A. Rewind B. Time Traveler C. Time Machine D. Restore

C. Time Machine

A program usually harmful that is packaged as something else. A. Virus B. Worm C. Trojan D. Rootkit

C. Trojan

A bare metal virtual platform means that the hypervisor is installed directly onto the computer and manages access to the host hardware without going through a host OS. A. Type 1 Virtual Machine B. Type 2 Virtual Machine C. Type 1 Hypervisor D. Type 2 Hypervisor

C. Type 1 Hypervisor

When the VM is installed directly on the Hardware A. Type 1 Supervisor B. Type 2 Hypervisor C. Type 1 Hypervisor D. Type 2 Hypervisor

C. Type 1 Hypervisor

This is used so that changes to your computer just don't happen first but you are notified through a pop up windows asking whether you would like these changes to continue or ask for admin level credentials. A. ACU B. CAU C. UAC D. Firewall

C. UAC

A type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security. A. BIOS B. ROMOS C. UEFI D. FUILE

C. UEFI

A type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security. A. BitLocker B. BIOS C. UEFI D. CMOS

C. UEFI

ACLs and port forwarding/port triggering are challenging for end users to configure correctly. Many users would simply resort to turning the firewall off in order to get a particular application to work. As a means of mitigating this attitude, services that require complex firewall configuration can use the _____ framework to send instructions to the firewall with the correct configuration parameters. A. PnP B. RootConfig C. UPnP D. ROS

C. UPnP

The main type of connection interface used on PC's. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. A. URL B. HDMI C. USB D. Lightning

C. USB

You need to install software on a netbook. What is most likely needed in order to install the software? A. Lightning port B. Bluetooth adapter C. USB optical drive D. NFC chip

C. USB optical drive

A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue? A. Slow data speeds B. Defective SD card C. Unauthorized root access D. Signal drop or weak signal

C. Unauthorized root access

A _____ is the principal means of controlling access to computer and network resources and rights or privileges. A. Group policies B. Network policies C. User account D. UAC

C. User account

You are tasked with adding more networks to your business. What is the cheapest options to implement this new requirement? A. Adding extra router B. Adding extra switches C. VLAN D. VPN

C. VLAN

A ____ uses a protocol such as IPsec or Secure Sockets Tunneling Protocol (SSTP) to create a tunnel through a carrier network. A. STP B. VLAN C. VPN D. NBC

C. VPN

Is a "tunnel" through the Internet A. SPN B. VLAN C. VPN D. DNS

C. VPN

A computer-generated, simulated environment experienced via a headset connected to a PC or powered by a smartphone. A. AR B. AK C. VR D. VPN

C. VR

You are determining the best method to keep the organization's Windows PCs up to date with OS security patches. Which of the following options would be most appropriate to deploy? A. Invest in a server solution to deploy virtual hosted desktops for all users B. Enable Windows updates to be installed manually by users C. Validate OS security patches in a test environment before pushing them to user machines D. Outsource OS security patch management to a third-party solution provider

C. Validate OS security patches in a test environment before pushing them to user machines

Identifier for a value that can change during program execution. Are usually declared with a particular data type. A. Static B. Change C. Variable D. Proxy

C. Variable

You get called to check on a projector that is only displaying "No video signal". What is the first thing to check? A. Adjust the laptop's screen brightness B. Replace the projector's bulb C. Verify the VGA cable is connected D. Ensure secondary display is enabled

C. Verify the VGA cable is connected

You are notified of an inkjet printer not printing properly. The computer has the printer software loaded and not displaying any errors. A test print was performed, with one of the colors not printing properly. What should you perform first? A. replace cartridges B. run a cleaning page C. clean heads D. clean fuser assembly

C. clean heads

You have a printer on the second floor that is not printing for anyone. You check the printer and it has power and is ready to go. Paper is in the tray and toner was just changed. It is connected to the network. You check local machines and jobs are being queued on the local machines. What should you do next? A. Move the printer to a known good port and connect to the network. B. Replace the network cable to the printer C. Verify the server's print spooler service is running D. Attach the printer directly to the laptop and print a test page

C. Verify the server's print spooler service is running

What systems builds require the most use of RAM? A. Gaming Machines B. Video Editing Machines C. Virtual Machines D. Home Servers

C. Virtual Machines

An area on the hard disk allocated to contain pages of memory. When the operating system doesn't have sufficient physical memory to perform it can use the hard disk to store some memory A. VNC B. VM spawl C. Virtual memory D. Virtualization

C. Virtual memory

What device below would be best for video conferencing? A. Smart Watch B. Digital Cameras C. Webcam D. IP Phone

C. Webcam

Which of the following integrated devices in a laptop allows the users to capture images and audio? A. Digitizer B. TV tuner C. Webcam D. Biometric scanner

C. Webcam

A machine receives an IP address starting with 169.254.x.x when which of the following occurs? A. When the machine is using IPv6 B. When the next IP range begins with 169.253 C. When the DHCP server does not respond D. When the operating system is Unix or Linux

C. When the DHCP server does not respond

What Windows 10 edition is similar to the Pro edition but designed for volume licensing by medium and large enterprises. A. Windows 10 Home B. Windows 10 Pro C. Windows 10 Enterprise D. Windows 10 Education

C. Windows 10 Enterprise

Designed to repeat the signal from an access point to extend the range of a WLAN A. WMN B. WISP C. Wireless Range Extender D. Wireless Range Repeater

C. Wireless Range Extender

What type of network topology is used by protocols such as Zigbee and Z-Wave? A. Wired mesh network topology B. Wired star network topology C. Wireless mesh network topology D. Wireless P2P backbone network topology

C. Wireless mesh network topology

A step-by-step instruction for performing an installation or configuration task using a specific product to technology and credentials. A. SOP Answered B. MACs C. Work instruction D. RFC

C. Work instruction

This type of malware does not require user action to replicate itself over the network while consuming everything in its path. A. Virus B. Trojan Horse C. Worm D. DDoS

C. Worm

An answer file is an ____ text file that contains all of the instructions that the Windows Setup program will need to install and configure the OS without any administrator intervention. A. answer file B. text C. XML D. HTML

C. XML

What is a file format based on XML that describes one or more pages and how the information should appear on the page? A. XML B. HTTP C. XPS D. PDF

C. XPS

You are assisting a laptop user. While she was away from her desk, the laptop has powered off. The user was in the middle of working on a file and had forgotten to save changes. Can you reassure her that she has nothing to worry about? A. Yes, you saw a remote assistance save her work for her B. No, tell her she will learn next time to leave her computer turned on an have her plan ahead. C. Yes, her computer was configured to hibernate and all her data will be intact D. No, because you hit the power down button for making you wait to long that her computer got bored and went to sleep

C. Yes, her computer was configured to hibernate and all her data will be intact

In mobile devices this is used to detect movement of the device A. tilt screen B. digitizer C. accelerometer D. movement sensor

C. accelerometer

Circuit board providing additional functionality to the computer system (video, sound, networking, modem, and so on). A. ad-hoc card B. NIC C. adapter card D. ADF

C. adapter card

Installable programs that extend the functionality of a mobile device. It must be written and compiled for the particular operating system used by the mobile device. A. aptts B. bins C. apps D. appelets

C. apps

What is a common issue for a dim display. A. sleep enabled B. it's dark outside C. backlight set to lowest setting D. failure to turn on phone

C. backlight set to lowest setting

Metal strips that cover unused adapter slots in the case so that proper air flow is maintained within the system case. A. blanking strips B. blanking tabs C. blanking plate D. CPU Fan

C. blanking plate

You are troubleshooting a computer for a "Non System Disk" or "Disk Error" because you failed to load from it. What command tool can you use to attempt to fix the problem? A. bootrec.exe B. bootrec /fixmbr C. bootrec /fixboot D. bootrec /rebuildbcd

C. bootrec /fixboot

You need to set up a workstation in a new location. You find that you have no network connectivity and the NIC has not link lights. You verify that the wall socket is labeled properly. What should you use next? A. A multimeter B. tone generator C. cable tester D. punchdown tool

C. cable tester

What command prompt tool can I use to see if a disk has errors? A. checkdisks B. bootreg C. chkdsk D. wmic

C. chkdsk

Any solution designed to run on desktops or workstations in which the user interacts with the virtualization host directly. A. server-side virtualization B. user-side virtualization C. client-side virtualization D. desktop-side virtualization

C. client-side virtualization

The following command does what? net user dmartin Pa$$w0rd /add /fullname: "David Martin" /logonpasswordchg: yes A. create a password for user named dmartin B. create a password for user dmartin that requires them to use Pa$$w0rd as their password C. create an account for user named David Martin and requires them to change password on first logon D. create an user account named dmartin for user David Martin with the password Fred

C. create an account for user named David Martin and requires them to change password on first logon

A disk array access pattern where data is written to two or more disks, for performance A. disk mirroring B. disk raiding C. disk striping D. disk wiping

C. disk striping

Using software to ensure that old data is destroyed by writing to each location on the media, either using zeroes or in a random pattern. A. degaussing B. formatting C. disk wiping D. remote clean

C. disk wiping

A condition where a system grants entry when it should have denied it. A. false negative B. true negative C. false positive D. true positive

C. false positive

The printing material for a 3D printer is supplies as a spool of _____. A. wire B. cable C. filament D. ink

C. filament

A series of characters at the end of a file name, OS uses it to identify the software application that will be associated with the file. A. file type B. folder extension C. file extension D. folder manager

C. file extension

Finger movements on a trackpad or mouse that enable a user to scroll, zoom, and navigate desktop, documents, and application content. A. gloves B. sign language C. gestures D. forensics

C. gestures

What device is considered passive cooling? A. Water cooler B. Heat shrink C. heat sink D. fan

C. heat sink

A private network storage area located in a shared network server folder in which users can store personal files. A. homegroup B. work folder C. home folder D. workgroup

C. home folder

You need to install the latest OS on your computer. You want to keep all of the settings and files to remain intact during the installation. What would be the best method to use. A. network installation B. clean install C. in-place upgrade D. image deployment

C. in-place upgrade

If you are taking a desktop computer to different countries you need to ensure that the PSU is set to the correct ____. A. input amperage B. input Ohms C. input voltage D. SkyNet

C. input voltage

You have restarted the DHCP server following a network problem. What command would you use to refresh the IP configuration on Windows 7 client workstations? A. ifconfig /renew B. DNS /flush C. ipconfig /renew D. ipconfig /flush

C. ipconfig /renew

A device that adjusts voltages in under-voltage and over-voltage conditions to maintain a 120 V output. A. line interrupter B. line shampooer C. line conditioner D. line eraser

C. line conditioner

A printed circuit board, that houses the processor, chipset, memory, and expansion slots. (choose the incorrect answer) A. motherboard B. mobo C. motherbase D. system board E. main board

C. motherbase

When a client authenticates to a server, and a server authenticates to a client is known as: A. multifactor authentication B. singlefactor authentication C. mutual authentication D. onboarding

C. mutual authentication

Where would you most likely use a punchdown tool? A. router B. repeater C. patch panel D. PoE injector

C. patch panel

To access files and folders on a volume, the administrator of the computer will need to grant these to the user or groups. A. authorizations B. accountings C. permissions D. changes

C. permissions

When the firewall detects activity on outbound port 'A' destined for a given external IP address, it opens inbound access for the external IP address on port 'B' for a set period A. port mirroring B. port security C. port triggering D. port rolling

C. port triggering

In Windows, is a process that checks the print queue (%SystemRoot%\System32\Spool\Printers\) for print jobs. When they arrive, they are processed, if necessary, then passed via a print port to the print device. A. printer B. print device C. print monitor D. print languages

C. print monitor

The loud clicking noise coming from a faulty hard drive is most likely created by: A. the coil reversing polarity in an endless loop. B. one or more bad spindle motor bearings C. repeated motion of the read/write head armature parallel to the platter D. the solid state read/write head scratching the platter surface.

C. repeated motion of the read/write head armature parallel to the platter

Junk messages sent over email. A. cram B. phishing C. spam D. skynet

C. spam

You are troubleshooting an application install on a Linux PC and cannot install the application. Which of the following would be the BEST tool for you to use to install the application? A. pwd B. su C. sudo D. sfc

C. sudo

The computer's timing mechanism that synchronizes the operation of all parts of the computer and provides the basic timing signal for the CPU. A. system case B. system bus C. system clock D. TCO

C. system clock

What is used between a heat sink and CPU A. tooth paste B. water paste C. thermal paste D. thermal gel

C. thermal paste

You just installed a new processor to your motherboard. What do you need to apply to ensure proper cooling? A. hyper-threading B. temperature sensor C. thermal paste D. heatshrink

C. thermal paste

You connect a tone generator to an RJ-45 drop. Why? A. to validate proper wiring of the network jack B. to confirm continuity of the conductors C. to locate the position of the cable on a patch panel D. to test the transmission quality of the connection

C. to locate the position of the cable on a patch panel

A display screen combined with a digitizer that is responsive to touch input A. touchpad B. VR C. touchscreen D. traces

C. touchscreen

You install a 2.4GHz wireless router for your home. You discover that your neighbors are broadcasting out on channels 1 and 6. What channel should you use? A. 1 B. 5 C. 10 D. 11

D. 11

port number for the protocol that receives e-mail but does not keep it on the server A. 143 B. 53 C. 25 D. 110

D. 110

USB 1.1 supports what speeds A. 10 Mbps B. 11 Mbps C. 12 MBps D. 12 Mbps

D. 12 Mbps

How many pins on a VGA port? A. 9 B. 10 C. 7 D. 15

D. 15

How many pins in a displayport connector? A. 21 pins B. 22 pins C. 25 pins D. 20 pins

D. 20 pins

How many pins are on a USB-C 3.1 connector? A. 4 B. 5 C. 9 D. 24

D. 24

How many pins do DDR2 and DDR3 have? A. 200 B. 220 C. 230 D. 240

D. 240

If a single physical disk is divided into three partitions, how many different file systems can be supported? A. 0 B. 1 C. 2 D. 3

D. 3

You are configuring four 120 GB drives in a RAID 5 array. How much space will be available? A. 300 GB B. 400 GB C. 480 GB D. 360 GB

D. 360 GB

A scanner that can gather data about the shape and appearance of a physical object and save that information to a computer. A. 3D modelling software B. 3D print process C. 3D printer D. 3D scanner

D. 3D scanner

How many pins are used for analog signal on a DVI-A and DVI-I connector? A. 24 B. 20 C. 8 D. 4

D. 4

An entry within an ACL, a record of subjects and the permissions they hold on the resource. A. ACL B. ACPI C. ActiveX D. ACE

D. ACE

When two systems communicate using IP, an IP address is used to identify the destination machine. The IP address must be mapped to a device using a MAC address. This resolves the IP address tot he hardware adress. A. NAT B. DHCP C. DNS D. ARP

D. ARP

Allows clients with wireless radio adapters to connect to the network A. Ethernet switch B. Internet modem C. Internet router D. Access point

D. Access point

In security terms, the process of tracking and recording system activities and resource access. A. Confidentiality B. Integrity C. Availability D. Accounting

D. Accounting

A Microsoft Windows user account that can perform all tasks on the computer, including installing and uninstalling apps, setting up other users, and configuring hardware and software. A. Standard Account B. SUDO Account C. Guest Account D. Administrator Account

D. Administrator Account

An XML text file that contains all of the instructions that the Windows Setup program will need to install and configure the OS without any administrator intervention, including the product key. A. Answer text B. PXE boot C. Unattended Installation D. Answer File

D. Answer File

You report that your PC periodically logs you off and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue? A. Time of day restrictions are enabled on the machine B. Scheduled antivirus scans and updates are enabled on the machine C. Remote desktop is enabled and an administrator has logged into the machine D. Automatic Windows Update is enabled on the machine

D. Automatic Windows Update is enabled on the machine

What type of imaging input device would be most useful for a Point-of-Sale (POS) system? A. CMOS scanner B. RFID scanner C. Fingerprint scanner D. Barcode scanner

D. Barcode scanner

An address added to this list is prohibited from connecting to any port. A. Whitelist B. Graylist C. Red Team D. Blacklist

D. Blacklist

How could you install Windows OS on a MAC OS computer without using third-party software? A. Terminal B. Boot Disk C. Disk Utility D. Boot Camp

D. Boot Camp

An enterprise might have computers installed at different geographic locations needing to view and update data at a central office. What is the best option to use? A. BitLocker B. BitLocker to Go C. EFS D. BranchCache

D. BranchCache

Which media type allows you to write to an optical disc only once? A. CD-ROM B. DVD-RW C. CD+RW D. CD-R

D. CD-R

Secure information has three properties, often referred to as the ____ triad. A. AAA B. ABC C. AIC D. CIA

D. CIA

On older computers this stored the PC's basic configuration and any settings made via the system firmware setup program. A. CMOC B. SMOC battery C. CMOS battery D. CMOS

D. CMOS

A technician is connecting a PoE enabled phone and needs to run the drop from the switch that is 55 meters away. Which of the following cables types would be the MOST suitable for this purpose? A. Fiber B. Coaxial C. CAT3 D. CAT6

D. Cat6

This records where, when, and who collected the evidence, who has handled it subsequently, and where it was stored. A. ROE B. Chain Letter C. BOI D. Chain of Custody

D. Chain of Custody

Data type supporting storage of a single character A. String B. Integer C. Boolean D. Character

D. Character

The best tool for dislodging dust from difficult to reach areas. A. Vacuum B. Screwdriver C. Gloves D. Compressed Air

D. Compressed Air

is the science of collecting evidence from computer systems to a standard that will be accepted in a court of law. A. Chain of custody B. Chain of evidence C. Computer Chain D. Computer forensics

D. Computer forensics

A networking service that allows a client to request an appropriate IP configuration from a server. A. DNS B. FQDN C. Cache D. DHCP

D. DHCP

When I select Obtain an IP address automatically option within the General tab of the Internet Protocol Version 4 (TCP/IPv4) Properties window. I am using what protocol A. NAT B. DNS C. ARP D. DHCP

D. DHCP

You are installing a wireless router to be used as an access point. One of the requirements is that the company firewall will assign IP addresses to devices on the wireless network. What setting do you need to disable on the router? A. NAT B. DMZ C. PAT D. DHCP

D. DHCP

You want to deploy a solution that will detect and prevent sensitive information from being saved on external storage. Which of the following should you implement? A. IPS B. FTPS C. TPM D. DLP

D. DLP

What server role resolves UNC/FQDN to appropriate IP addresses? A. DHCP B. Proxy C. Web server D. DNS

D. DNS

Which of the following Internet connection types is a digital form that runs over standard telephone wiring? A. Fiber B. Dial-up C. Cable D. DSL

D. DSL

Your PC is taking a long time to boot. What is the cheapest was that you can possibly fix this? A. Install additional RAM B. Install a faster hard drive C. Run the Disk Cleanup utility D. Defragment the hard drive

D. Defragment the hard drive

You have contractors come in to perform maintenance a few times a year. You supply laptops for them. A security policy states that when the maintenance is done the contractors should not be able to log in until next time. What is the best choice? A. Delete the user accounts B. Restrict the user accounts C. Reset the user accounts D. Disable the user accounts

D. Disable the user accounts

If a disk can be recycled or repurposed, destruction is obviously not an option what can you do? A. Disk Degaussing B. Disk Shredding C. Disk Cleaning D. Disk Wiping

D. Disk Wiping

Before connecting a device, you may need to install its ____ using the vendor supplied software. A. PnP B. Wizard C. OS D. Driver

D. Driver

A server needs a RAM upgrade, you have been tasked with retrieving the RAM from storage and then installing it. Which of the following is the BEST RAM type for you to retrieve? A. SoDIMM B. DDR4 C. Single Channel D. ECC

D. ECC

Under NTFS, files and folders can be encrypted to ensure privacy of the data. Only user who encrypted the file can open it. A. BitLocker B. Bit:Locker To Go C. AES D. EFS

D. EFS

A high voltage (potential difference) stored in an insulated body that is released from one charged body to another with an unequal charge. A. Lightning B.. Volts C. Spark D. ESD

D. ESD

Your boss wants remote access to a server after hours and on weekends to check data. Before you grant access what is important step you should take to protect against possible infection? A. Create a policy to remove Internet access from the server during off hours B. Set the local antivirus software on the boss computer to update and scan daily C. Educate the manager on safe Internet browsing practices D. Ensure the server is patched with the latest security updates

D. Ensure the server is patched with the latest security updates

Which one is not a type of file system? A. FAT B. FAT 32 C. NTFS D. FAT 64

D. FAT 64

An adapter or other component that can be replaced by a technician on-site. A. FRY B. FRI C. FRO D. FRU

D. FRU

What protocol allows clients to upload and download files from a remote server? A. STP B. ATP C. ETP D. FTP

D. FTP

A biometric mechanism, that uses the hash being computed from a picture of the user's face rather than a scan of their fingerprint. A. FacePalm B. FacePlant C. FaceTime D. Face Lock

D. Face Lock

Where would you go if you wanted to create inbound and outbound rules for your computer? A. User Account Control B. Event Viewer C. Control Panel D. Firewall

D. Firewall

Which of the following prevention methods is considered to be digital security? A. RFID badge B. Mantrap C. Biometrics D. Firewalls

D. Firewalls

You are upgrading to a 4TB hard drive and wants to have six partitions. Which of the following allows a Windows boot partition to meet these requirements? A. Primary B. NTFS C. FAT32 D. GPT

D. GPT

The term when one service accepts the credentials from another service. Choose the incorrect answer A. Mutual authentication for multiple services B. Single Sign On C. Federated Identify Management D. Google Keychain

D. Google Keychain

This type of workstation requires upgraded graphics cards as well as high CPU power. A. Home server B. Thick client C. Thin client D. Graphics and CAD/CAM design

D. Graphics and CAD/CAM design

Uses a proprietary 19-pin (Type A) connector A. USB B. DVI C. DisplayPort D. HDMI

D. HDMI

The file system used by Apple Mac workstations and laptops A. NTFS B. ReFS C. Ext4 D. HFS+

D. HFS+

A type of firewall that inspects the headers of IP packets and can perform filtering on IP address, protocol type, and port numbers. A. Application Filtering B. MAC Filtering C. Port Filtering D. Packet Filtering

D. Packet Filtering

You are building a server for home use. The server will store and stream video files to other devices over the local network and should have some built-in data redundancy. Which of the following is MOST important to meet the requirements? A. Compact form factor B. 7.1 surround sound C. HDMI output D. Hardware RAID

D. Hardware RAID

A firewall that is implemented as software on the PC/Server A. Network Firewall B. Hardware Firewall C. UTM D. Host Firewall

D. Host Firewall

Most devices that connect over USB can be added or removed while the power is switched on, the term for this is? A. Hot Spare B. Cold Swappable C. Cold Spare D. Hot Swappable

D. Hot Swappable

A drive that is both an SSD and HDD A. SSD flash drive B. HDD remote drive with embedded SD cards C. Hybrid topology D. Hybrid Drive

D. Hybrid Drive

Every device in the PC has its own set of unique memory addresses in an area called the ____ map. This is a means for the CPU to communicate with a device. A. IRQ B. driver C. connections D. I/O address

D. I/O address

What type of LCD panels on monitors produce better color reproduction at a wider range of viewing angles, but slightly worse response times? A. TFT B. TN C. CCFL D. IPS

D. IPS

You reimaged several computers in a test lab with a test subnet of 10.1.5.1. The PC name was properly assigned, but you did not configure DHCP prior to shipping the computer to the customer. The customer's corporate network has IP ranges of 10.1.1.1-10.1.5.255. The customer is unable to connect to any network resources or the Internet. Which of the following is most likely the error message being displayed? A. Duplicate hostname B. Intermitted connectivity C. Computer account disabled D. Internet protocol conflict

D. Internet protocol conflict

What allows multiple computers to be controlled via a single keyboard, mouse, and monitor. A. USB ports B. Video connector HUB C. VM sprawl D. KVM

D. KVM

An operating system OS is made up of a number of core files called what? A. GUIs B. device driver C. Kennal D. Kernel

D. Kernel

Uses keys to input commands A. Mouse B. VR Headset C. Lockpad D. Keyboard

D. Keyboard

An open-source operating system supported by a wide range of hardware and software vendors. A. MaC OS B. iOS C. Windows D. Linux

D. Linux

What security system allows system boot to be disabled if the computer is reported stolen? A. BoJackson B. LoJake C. BitLocker D. LoJack

D. LoJack

You are troubleshooting your laptop because it just will not keep an IP address. When it gets an IP address, it releases it and cycles through repeatedly. You have replaced the cable, plugged into a known good network jack, and successfully connected a different laptop. Which of the following tools should you try next? A. Tone generator B. Multimeter C. Cable tester D. Loopback plug

D. Loopback plug

On a switch I can say what devices are allowed or not allowed to connect to a port based on their Media Access Control address. This is known as what A. ACL B MDM C. EAP D. MAC filtering

D. MAC filtering

What network will usually span a city? A. WAN B. LAN C. CAN D. MAN

D. MAN

An Apple trackpad with a larger work surface than the Magic Mouse. A. Magic Pad B. Magic Johnson C. Magic Mike D. Magic Trackpad

D. Magic Trackpad

Is a catch-all term to describe malicious software threats and social engineering tools designed to vandalize or compromise computer systems. A. Heatwave B. Virus C. Social Engineering D. Malware

D. Malware

What printer permission level do you need to restart or cancel jobs. A. Delete B. Full control C. Modify D. Manage documents

D. Manage documents

RAID 1 Specs? A. Min 2 disks 100 Storage from all disk Fault tolerant B. Min 3 disks 50% storage from all disk Fault tolerant C. Min 2 disks 50% storage from all disk No fault tolerant D. Min 2 disks 50% storage from all disk Fault tolerant

D. Min 2 disks 50% storage from all disk Fault tolerant

_____ cases are usually used for office or home PCs where the requirements for additional internal devices and adapter cards is limited. A. Full tower B. Mid tower C. Slimline D. Mini tower

D. Mini tower

What Dynamic Volume Type has one disk stores a copy of the other disk? A. Simple B. Spanned C. RAID 5 D. Mirrored

D. Mirrored

You discover malware on a your system. What should you do next according to malware removal best practices? A. Enable System Restore and create a restore point so no data is lost B. Educate the yourself on how to avoid malware in the future C. Update the computer through the network WSUS D. Move the infected system off the network

D. Move the infected system off the network

You are setting up a SOHO wireless network for a new office. They require the highest level of wireless security and various levels of desktop authentication to access cloud resources. What is the best choice? A. SSO B. RADIUS C. TACACS D. Mutlifactor

D. Mutlifactor

A display type that uses organic technology A. LED B. LCD C. RED D. OLED

D. OLED

Close range networking allowing communications between personal devices, such as smartphones, laptops, and printers/peripheral devices. A. MAN B. CAN C. WAN D. PAN

D. PAN

You have a power supply with an 8-pin connector on it. What is this usually used for? A. CPU power B. HDD power C. I/O power D. PCIe power

D. PCIe power

____ refers to medical and insurance records, plus associated hospital and laboratory test results. A. PII B. SCI C. NCIS D. PHI

D. PHI

The number assigned to a process A. SID B. CID C. RID D. PID

D. PID

What component supplies power to the motherboard? A. PUS B. UPS C. USP D. PSU

D. PSU

Which of the following is not the same as a RS-232 A. Communications port B. DB-9 C. Serial Port D. Parallel Port

D. Parallel Port

In this type of network there are no servers, instead each computer acts as both a server and a client. A. Star topology B. Ring Topology C. Peer-Hoc-Mode D. Peer-to-peer

D. Peer-to-peer

You were called to check an unexpected clicking noise on a desktop that has become more frequent every time a video editing application is loaded. The system fans have been replaced, but the clicking noise remains. Diagnostics have been run on the video card. Which of the following should you do FIRST? A. Replace the hard drive B. Replace the video card C. Do a System Restore D. Perform a full data backup E. Scan the system for viruses

D. Perform a full data backup

Before you make any system configurations as part of troubleshooting what should you do first? A. Power down the PC B. Unplug the PC C. Call Herb D. Perform backups

D. Perform backups

The term for a device that can be added to the computer and the operating system will detect the device automatically and prompt you to configure it using a hardware or device setup wizard. A. UTP B. PPn C. P2P D. PnP E. STP

D. PnP

The following are possible symptoms of what? * The computer fails to boot or experiences lock ups. * Unexpected or threatening messages or graphics appear on the screen. * Performance at startup or generally is very slow. * Network performance is slow or Internet connections are disrupted. A. Bad CPU B. Hard drive failure C. RAM not installed correctly D. Possible malware infection

D. Possible malware infection

Where would you look to find software built around a 32 bit architecture that you have installed on your machine? A. Program Files B. Program Files (x32) C. Program Files (x64) D. Program Files (x86)

D. Program Files (x86)

Within Internet Options what tab is used to set IE as the default browser? A. General B. Security C. Content D. Programs

D. Programs

____ are a particular type of 2D barcode that have been widely adopted for consumer-oriented uses. Instead of bars it uses a square image that can be read by your phone, or other digital camera. A. Bar Code B. Slat Reader Code C. Quite Response Code D. Quick Response Code

D. Quick Response Code

You are talking to end users about the specifications for an upgraded application server. The users of the application report that there cannot be any unscheduled downtime or data loss. Additionally, they would like the performance of the application to improve over the previous server in any way possible. The previous server running RAID 5. Which of the following RAID solutions should be implemented in this scenario? A. RAID 0 B. RAID 2 C. RAID 6 D. RAID 10

D. RAID 10

The principal storage space for computer data and program instructions and is volatile A. SSD B. HDD C. RAID D. RAM

D. RAM

This type of malware tries to extort money from the victim A. Worm B. Rootkit C. Adware D. Ransomware

D. Ransomware

You need to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How can you accomplish this? A. Primary partition B. System refresh C. Format D. Recovery partition

D. Recovery partition

What is the literal location of the temporary holding area for deleted files? A. Recycle Can B. Recycle Shelf C. Recycle File D. Recycle Bin

D. Recycle Bin

You are preparing to replace a laptop screen. This laptop has a touch screen. Which of the following is the first step the technician should perform? A. Remove the laptop bezel B. Document and label each cable and screw location C. Organize the replacement parts D. Refer to the manufacturer's documentation

D. Refer to the manufacturer's documentation

You are installing a private PC in a public workspace. Which of the following password practices should you implement on the PC to secure network access? A. Remove the guest account from the administrators group B. Disable single sign-on C. Issue a default strong password for all users D. Require authentication on wake-up

D. Require authentication on wake-up

The time taken for a pixel to change color, that can be measured in milliseconds (ms) A. Refresh rate B. resolution rate C. resistor rate D. response rate

D. Response rate

You have issues logging on to a vendor's website. Another user, is able to log in successfully with his credentials. However, when he attempts to log in from your office, The user experiences the same issue. You have questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps you should take to resolve the issue? A. Try your credentials again to verify and log on to the vendor's website from your laptop B. Verify your laptop has the correct browser settings C. Attempt to log on to another vendor's website from your laptop D. Review the notification and review the installed programs

D. Review the notification and review the installed programs

A network device that links dissimilar networks and can support multiple alternate paths between locations based upon the parameters of speed, traffic loads, and cost. A. Unmanaged switch B. managed switch C. HUB D. Router

D. Router

If you suspect improper handling during installation has caused damage to a RAM module, how could you test that suspicion? A. Run Chkdsk B. Run ping C. Run Disk Derangement D. Run Memory Diagnostic

D. Run Memory Diagnostic

You are unable to access websites and have connectivity issues with pop-ups on the screen. You remove malware, and ping the router and access the websites. What should be your next step. A. Document finding, actions, and outcomes B. Reboot the device to verify the fix C. Verify settings in ipconfig D. Run a virus scan

D. Run a virus scan

Email encryption standard using certificates for confidentiality and integrity. A. MIME B. S/MINE C. MINE D. S/MIME

D. S/MIME

This technology superseded the legacy Parallel ATA technology. A. PATA B. SETA C. SATE D. SATA

D. SATA

A fiber connector with a push/pull design that allows for simpler insertion and removal. There are simplex and duplex versions, but not as small as the LC connector. A. ST B. LC C. FC D. SC

D. SC

The protocol used to send mail between hosts on the Internet. A. POP3 B. IMAP4 C. IMAP3 D. SMTP

D. SMTP

Memory that is half the size of DIMMs, are available in 32- or 64-bit data paths, and are commonly found in laptops and iMac systems. A. DDR DIMMs B. SDDR C. ADDR DIMMs D. SODIMM

D. SODIMM

Pick the fiber connector? A. RJ-11 B. F-connector C. BNC D. ST

D. ST

A type of network cabling used where protection from interference is required. Insulation is installed around all four pairs of twisted cables. A. UTP B. UPS C. BUNs D. STP

D. STP

Was originally 800x600 at 4 or 8-bit color. A. WXGA B. SXGA C. VGA D. SVGA

D. SVGA

A ____ is a digital imaging device, designed to create computer file data from a real-life object. A. CCFL B. Digitizer C. 3D printer D. Scanner

D. Scanner

____ is a security system offered by UEFI. It is designed to prevent a computer from being hijacked by malware. A. Secure EFS B. Secure ROM C. Secure Bootleg D. Secure Boot

D. Secure Boot

A _____ is a collection of user accounts that can be assigned permissions in the same way as a single user object. A. User Accounts B. Administrators C. Users D. Security Groups

D. Security Groups

These type of updates are installable collections of patches and software improvements. A. Hotfixes B. Patches C. Updates D. Service Packs

D. Service Packs

You need to load an OS on every PC with a blank SSD on the network. You would like to go home for the weekend and not have to go to each computer on your scheduled day off. A. Clone the operating system from an image onto optical media B. Use the original software media to load the operation system on every PC C. Create an image and copy it from a USB drive using an unattended answer file D. Set up a central image that the PCs can load from a PXE boot.

D. Set up a central image that the PCs can load from a PXE boot.

You need to perform a backup while a system is running. A. Robocopy B. Xcopy C. System restore D. Shadow copy

D. Shadow copy

_____ cases require low-profile adapter cards but can be oriented horizontally or vertically. A. Full tower B. Mid tower C. Mini tower D. Slimline

D. Slimline

Which of the following explains why it is important to secure Personally Identifiable Information (PII)? A. So phishing attacks are not launched against employees of the organization. B. So sensitive information, such as corporate passwords, is not stolen. C. So man-in-the-middle attacks are not launched against the organization. D. So sensitive information, such as social security numbers, is not stolen.

D. So sensitive information, such as social security numbers, is not stolen.

Is a program that monitors user activity and sends the information to someone else. A. Malware B. Adware C. Scareware D. Spyware

D. Spyware

You need to change cables on a patch panel. You are following company standard and using TIA/EIA 568A wiring standard and connecting to the distribution network switch. What cable should you use? A. Crossover Ethernet cable with RJ-11 connector B. Straight-Through Ethernet cable with RJ-11 connector C. Crossover Ethernet with RJ-45 connector D. Straight through Ethernet cable with RJ-45 connector

D. Straight through Ethernet cable with RJ-45 connector

An IP address consists of a Network ID and a HOST ID. This is used to distinguish these two components within a single IP address. A. Network ID B. Broadcast ID C. Host ID D. Subnet mask

D. Subnet mask

Uses multiple speaker positioned around the listener to provide a "cinematic" audio experience. A. Mono B. Stereo C. HiFi D. Surround sound

D. Surround sound

SSH replaced what protocol that only sent in plain text. A. TCP 20 B. TCP 21 C. TCP 22 D. TCP 23

D. TCP 23

You are called by a customer complaining that there computer is getting slower over time. You check the CPU utilization and it varies between 95% and 100%. You close some programs and the CPU drops to 20%. The next day the same customer calls back with the same problem. What tool will you use to resolve the issue? A. MSTSC B. MSConfig C. PerfMon D. Task Manager

D. Task Manager

Jamie has to upgrade a desktop using old RAM in a storage room. The motherboard she is upgrading has 8 DIMM slots. There are already 4 modules of 2GB DDR3-1333 installed. She installs one module of DDR3-2400, one module of PC3-800, and one module of PC3-1600. Which of the following is true regarding the performance of this PC? A. Most of the RAM is DDR3-1333, so the system will be close to 1333 Mhz refresh on the DIMM modules. B. The system will not function as the PC3 RAM is not compatible C. The entire system will run faster based on the pure increase in volume of RAM D. The entire DIMM bank will be throttled to 100 MHz

D. The entire DIMM bank will be throttled to 100 MHz

What makes WPA2 better than WEP? A. The use of RC4 B. The use of IEEE 802.11 C. The use of SSID D. The use of AES

D. The use of AES

A user reports the computer network seems slow. The user's office had one network port available, but the user needed to add more network devices. The user located an older network device that allowed multiple connections. However, the network performance decreased due to collisions. Which of the following explains the cause of this issue? A. The user connected a bridge B. The user connected a router C. The user connected a switch D. The user connected a hub

D. The user connected a hub

A laptop user is complaining about typing on their new laptop. They claim that the cursor jumps randomly from place-to-place. What might be the cause of this? A. The user needs to update a driver for the keyboard B. The user should use sticky keys C. The user should replace the keyboard D. The user should disable the touch pad.

D. The user should disable the touch pad.

A client has requested a workspace environment configuration that will allow employees to work in a virtual space for specific projects, but when working on other projects, allow them to work locally. Which of the following is the BEST solution for this virtual configuration? A. Multiheaded client B. Thin client C. Zero client D. Thick client

D. Thick client

It can be used as a display interface (like DisplayPort) and as a general peripheral interface (like USB 3). The latest version uses USB-C connectors. A. Lightning B. USB C. SATA D. Thunderbolt

D. Thunderbolt

What external drive connection offers the fastest transfer speeds? A. eSATA B. USB 3.0 C. SATA D. Thunderbolt

D. Thunderbolt

Why might you run the shutdown command with the /t switch? A. To TRACK programs as they shutdown B. To send TRAP messages before shutdown C. To TEMPORARY shutdown the computer D. To delay the time the computer takes to shutdown

D. To delay the time the computer takes to shutdown

Which is considered a multifactor authentication A. User Name and Password B. User Name and PIN C. Smart Card and Token D. Token and Password

D. Token and Password

When using Linux commands, what would the results be for the following two commands? "ls -l file.data" and "ls -L File.data" A. They would be the same output B. The first command does not work C. The second command does not work D. Two different outputs

D. Two different outputs

A protocol in the TCP/IP suite operating at the transport layer to provide connection-less, non-guaranteed communication with no sequencing of flow control. A. SOP B. TCP C. HTTP D. UDP

D. UDP

Which of the following connectors are non-directional? A. Micro-USB B. Mini-USB C. USB-A D. USB-C

D. USB-C

This device combines a firewall, malware scanner, and intrusion detection/prevention. A. ITM B. ATM C. IPS D. UTM

D. UTM

These are made freely available by the software manufacturer to fix problems in a particular software version. A. Downloads B. Pitches C. Coldfixes D. Updates

D. Updates

When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. What type of infrastructure is being deployed? A. VM B. Hyper-V C. VirtualBox D. VDI

D. VDI

A video projector shows the image from a laptop, but everything is colored blue. What is probably the reason? A. Dead pixels B. Video resolution C. Failing lamp D. VGA connection

D. VGA connection

On a switch when I want to create more LANs without the need of buying a new switch what can I use? A. IETF B. TCP/IP C. VWAN D. VLAN

D. VLAN

A guest operating system installed on a host computer using virtualization software. A. VLAN B. VR C. VPN D. VM

D. VM

VMware, Hyper-V, VirtualBox are examples of what? A. OS B. Machines C. KVM D. VM

D. VM

Malware running on a guest OS jumping to another guest or to the host. A. VM sprawl B. VNC C. Virtual assistant D. VM escaping

D. VM escaping

A user reports being unable to log in. Which of the following should be the first step in troubleshooting? A. Change the user's domain password. B. Verify the User's Windows domain credentials. C. Verify the resource to which the user is unable to log in. D. Verify the user's domain account is unlocked.

D. Verify the user's domain account is unlocked.

Which of the following combinations provides the STRONGEST authentication security? A. Hardware token B. Username and password C. Smart card with PIN D. Voice then fingerprint recognition

D. Voice then fingerprint recognition

What is the weakest form of security encryption on wireless networks? A. PEW B. WPA C. WPA2 D. WEP

D. WEP

What was introduced to fix most of the problems with Wired Equivalent Privacy A. AES B. TKIP C. WEP D. WPA

D. WPA

You are setting up a SOHO wireless network for a new office. They require the highest level of wireless security and various levels of desktop authentication to access cloud resources. What is the best choice? A. WPA B. WEP C. TKIP D. WPA2

D. WPA2

The Mechanism for auto-configuring a WLAN securely for home users. A. WEP B. WPA C. WSP D. WPS

D. WPS

This type of Internet access refers to using an adapter to link a cellular phone provider's network via the nearest available transmitter. A. WAN B. CAN C. MAN D. WWAN

D. WWAN

This application is designed to support a site survey, to identify nearby networks that may be causing interference problems, and to measure signal strength A. Wi-Fi Breather B. Wi-Fi Analysis C. Wi-Fi Diagram D. Wi-Fi Analyzer

D. Wi-Fi Analyzer

What Windows 10 Editions is a variant of the Enterprise and Pro editions designed for licensing by schools and colleges. A. Windows 10 Home B. Windows 10 Pro C. Windows 10 Enterprise D. Windows 10 Education

D. Windows 10 Education

This Microsoft app allowed the computer to be used as a home entertainment appliance, It was not included in Windows 7 Home Basic but other Windows 7 editions had it, it then became a paid add-on with Windows 8/8.1 and no longer supported in Windows 10. A. BitLocker B. EFS C. Mobile App D. Windows Media Center

D. Windows Media Center

What Microsoft app allows the computer to be used as a sort of home entertainment appliance. A. Windows To Go B. Windows DVD Player C. Windows Video Streaming D. Windows Media Center

D. Windows Media Center

This OS is used widely on private network servers and Intranet servers running web, email, and social networking apps. A. Microsoft Windows B. Linux C. RedHat D. Windows Server

D. Windows Server

A wireless communications protocol used primarily for home automation. Creates a mesh network topology from one appliance to another. A. RFID B. NFC C. Zigbee D. Z-Wave

D. Z-Wave

What is the term for a socket that requires no pressure on the CPU to install? A. WIA B. FIZ C. MIA D. ZIF

D. ZIF

In Microsoft terminology, the partition that contains the operating system (the \WINDOWS folder). A. partition B. bootrec C. mbr D. boot partition

D. boot partition

You are investigating a disk problem. The system can no longer access the C: drive. What command could you use to try to repair the error? A. bootrec /fixslb B. bootrec /fixnbr C. bootrec /fixrtb D. bootrec /fixmbr

D. bootrec /fixmbr

PCI supports ____ , meaning that the device can control the bus to transfer data to and from memory, without requiring the CPU. A. bus traveling B. bus driving C. bus stopping D. bus mastering

D. bus mastering

A small block of high-speed memory that enhances performance by pre-loading code and data from relatively slow system memory and passing it to the CPU on demand. A. bache B. SSD C. RAM D. cache

D. cache

The amount of space available on storage media A. capacitor B. storage C. TB D. capacity

D. capacity

What does CMOS stand for? A. Computerized metal-oxide semiconductor B. complementary metal-oxygen semiconductor C. complementary metal-oxide semicomputer D. complementary metal-oxide semiconductor

D. complementary metal-oxide semiconductor

In Linux, the location on the file system that you are accessing at any point in time. A. top file access B. directory C. parent directory D. current working directory

D. current working directory

Configuring security controls on hosts as well as providing network security, physical security, and administrative controls. A. perimeter defense B. defense in length C. upper level defense D. defense in depth

D. defense in depth

A small piece of code that is loaded during the boot sequence of an operating system. Provides access to a device from the OS kernel. A. device manager B. device flow C. device interpreter D. device driver

D. device driver

A ____ is a voice interface designed to respond to natural language commands and queries. A. digital professor B. virtualization C. Google Alexa D. digital assistant

D. digital assistant

You are configuring a new Windows computer for a home office. Which of the following steps should you take to secure the workstation? A. run gpupdate tool B. disable windows update C. configure single sign-on D. disable guest account

D. disable guest account

This command prompt command does the same as the interface underlying the Disk Management tool. A. Disk B. PartDisk C. formatNTFS D. diskpart

D. diskpart

Any Windows-based server that provides domain authentication services and maintain a master copy of the database of network resources. A. domain member B. domain forest C. domain tree D. domain controller

D. domain controller

Unlike a tablet, an ____ is designed for the sole purpose of reading digital books and magazines. A. notebook B. word C. tablet D. e-reader

D. e-reader

An external interface for SATA connections, enabling you to connect external SATA drives to PCs A. SATA B. PATA C. SATAe D. eSATA

D. eSATA

You are working on a computer when the PC suddenly experiences a blue screen and restarts before you can note the error message. The computer boots up normally, and you now wants to know which error message was displayed. Which of the following should you use to help troubleshoot the issue? A. sfc B. msconfig C. regedit32 D. event viewer E. msinfo32

D. event viewer

The attacker created a malicious wireless access point masquerading as a genuine one, enabling the attacker to harvest confidential information as users connect via the AP. A. sniffing B. beatbox C. pharming D. evil twin

D. evil twin

If you are are troubleshooting a monitor display issue and you have verified that the graphics card is good connecting another display. You check the bad monitor and notice that you have a very dim image. What could possibly be the reason? A. touchscreen is faulty B. out of date drivers C. room to bright D. faulty inverter/ backlight

D. faulty inverter/ backlight

What command can you type to view a list of commands? A. /? B. /? help C. man D. help

D. help

You change to point the new intranet website to friendly name instead of an IP address. You do not want to wait for the change to replicate across the network. Which of the following commands should you use? A. ipconfig /all B. ipconfig /release C. ipconfig /? D. ipconfig /flushdns

D. ipconfig /flushdns

A secure entry system with two gateways, only one of which is open at any one time. A. sandtrap B. parenttrap C. beartrap D. mantrap

D. mantrap

Which command line tool will show this single line output? Proto Local Address Foreign Address State PID TCP 10.1.0.100:49764 10.1.0.192:3000 ESTABLISHED 4280 A. Ping B. Tracert C. ipconfig D. netstat

D. netstat

What type of memory does not require to have power applied to keep it stored? A. volatile B. Hot spare C. Hot swappable D. non-volatile

D. non-volatile

A directory that is one level above your current working directory. A. child directory B. father directory C. mother directory D. parent directory

D. parent directory

Part of the printer that will pick up a paper from the stack. A. feed roller B. separation roller C. duplex roller D. pickup roller

D. pickup roller

You are having to install a WAP in a small crowded building. Which of the following is the best solution to increases security of the wireless network? A. reduce the channel availability B. disable the DHCP server C. enable QoS management D. reduce the transmit power

D. reduce the transmit power

You are unable to show an Android smartphone display on a TV. What should you check to fix the issue? A. multi-window B. air view C. air browse D. screen mirroring

D. screen mirroring

An IP address consists of a Network ID and a Host ID. This is used to distinguish these two components within a single IP address. A. fallout mask B. SkyNet mask C. halloween mask D. subnet mask

D. subnet mask

What is not an advantage that UEFI has over BIOS? A. Full GUI system utilities B. Mouse support C. pre-OS boot authentication D. supports <2.2TB

D. supports <2.2TB

Term for unlocking a device by tracing a predetermined on screen pattern or joining dots on screen. A. swap lock B. fingerprint lock C. pin lock D. swipe lock

D. swipe lock

Effective network management often entails capturing logs from different devices. It is much easier to review logs and respond to alerts if the logs are consolidated on a single system. What below best describes this? A. Legacy B. EMS C. tier1support D. syslog

D. syslog

Before attaching the heat sink, dots of ____ should be applied to the surface of the CPU so that placing the heat sink spreads the paste into a thin layer. A. heat sink B. thermal toothpaste C. thermal tape D. thermal paste

D. thermal paste

Specially formulated compound to impart dye to paper through an electrographic process. A. ink B. resin C. aps D. toner

D. toner

When data is written onto a drive, it is stored as magnetic changes in the structure of the disk. These alterations are written as concentric rings as the disk spins. These rings are called a : A. sector B. spindle C. platter D. track

D. track

You are having issues with your notebook performing some random mouse actions requiring you to make a lot of typing corrections. What can you do to solve the issue? A. adjust the mouse settings so the mouse moves slower B. reverse the buttons on the mouse pad C. adjust the mouse settings so the mouse moves faster D. use function keys to disable the mouse pad

D. use function keys to disable the mouse pad

A large format display in which the image is projected onto a screen or wall using a lens system A. video card B. video killed the radio star C. video graphics D. video projector

D. video projector

An area on the hard disk allocated to contain pages of memory. A. VHD B. VDI C. VM D. virtual memory

D. virtual memory

Any weakness that could be triggered accidentally or exploited intentionally to cause a security breach. A. virus B. VNC C. threat D. vulnerability

D. vulnerability

A type of virus that spreads through memory and network connections rather than infecting files. A. virus B. polymorphic virus C. trojan D. worm

D. worm

You have applied a Group Policy that restricts the installation of USB devices. You need to exempt this policy for a computer that needs to have a USB digital camera installed. Once you exempt the computer from the policy, which of the following is the best command for you to run locally on the computer so the digital camera can be installed without waiting? A. grupdate /? B. grupdate /bootings C. grupdate /force D. grupdate /logoff E. grupdate /sync

E. grupdate /sync

A software RAID solution means that creating volumes from an array of physical disks is an operation supported by a plug-in controller card or by the motherboard, independently of the installed operating system. True or False

False

If I add virtualization to my ordinary desktop this is known as Server-Side Virtualization True or False

False

If a application is using a background service , the service is running in its own window. True or False

False

If an existing switch does not support PoE, a device called a Power Sourcing Equipment (PSE) is used. True or False

False

If you are trying to configure an Alternate Configuration for an IP address, you need to make sure that you have a static IP address configured in the general tabs True or False

False

If you are using an anti-static floor mat, you do not need any other anti-ESD service equipment? True or False

False

Keyboard and pointing devices are the standard output devices for personal computers these days, but there is an ever-growing number of input devices available for the user to interact with in a variety of ways. As well as command input, security systems often require different ways for users to input credentials to access an account or authorize a payment. True or False

False

PARALLEL data transmission is faster than SERIAL data transmission due to many bits being sent at one time. True or False

False

RAM is a non-volatile type of memory. True or False

False

System memory is the main storage area for programs and data when the computer is running, it is also non-volatile. True or False

False

TCP provides unreliable, non-guaranteed transfer of packets. True or False

False

The ATX form factor is larger, so the smaller ITX will fit into a standard ATX chassis. True or False

False

The Partition utility can be used to format any disk to use the FAT, FAT32, or NTFS file system, but the process deletes any existing data or directory structure on the drive. True or False

False

The purpose of a KVM switch is to connect multiple keyboard, monitors, and mouse to a single computer. True or False

False

A firewall that is implemented as software on an individual PC or server is called a Host Firewall. True or False

True

A record-able version of the CD (CD-R) features a layer of photosensitive dye. True or False

True

After POST the next step is identify a boot device and passes control to the operating system's boot loader process. True or False

True

An HTTP application secured using the SSL/TLS protocol should use a different port for unencrypted HTTP True or False

True

Display and print functions for compatible applications are handled by the Windows Presentation Foundation (WPF) True or False

True

Each version of Windows has an Administrative Tools shortcut folder in Control Panel. True or False

True

The Apple Filing Protocol performs a similar file sharing function to SMB but for Apple Networks running Mac OS, Is uses two port UDP/TCP port 427 and TCP port 548 True or False

True

The HR manager's client computer must meet the recommended requirements to run Windows 10 so that she can access and use all of the HR-related applications used by the organization. In this case, the best client option is a thick client. True or False

True

The purpose of a ground is to create a path of least resistance. True or False

True

The speed at which memory or a disk drive can be addressed and utilized is know as access time True or False

True

The transfer rates of Thunderbolt generations are: Thunderbolt 1.0: 10Gbps Thunderbolt 2.0: 20Gbps Thunderbolt 3.0: 40Gbps True or False

True

Older systems used the Northbridge and Soutbridge chipset, but on newer systems the memory controller and graphics controller are incorporated on the same chip as the CPU itself (referred to as "on _____

die


Set pelajaran terkait

prehospital care 10th edition chapter 32

View Set

GPHY 141 Exam 2 Study Guide Part 2

View Set

Texas Principles of Real Estate 1 - Chapter 2

View Set

Chapter 11 Quiz **one is wrong***

View Set

Digital forensic Quiz assessment

View Set

020301hA - Survey Equipment - Part A

View Set

Quiz 5 Information Security Fundamentals

View Set