Documente Academic
Documente Profesional
Documente Cultură
Which of following should be entered within the run command window to start a console prompt on
a windows device?
A. cmd. C. nslookup.
B. ipconfig. D. whois.
2. A user downloads and installs free games from the internet. Then, the home page of the users
browser changes, search results and hijacked, and numerous pop-up web ads are displayed. Which of
the following threats has MOST likely occurred?
6. An administrator has received a new computer that is preloaded with various software. Which of the
following should the administrator do?
7. Joe, a user, drops his laptop and the screen cracks. He calls the manufacturer and is told they will not
warranty the repair. Which of the following explains why the manufacturer will not cover the repair?
9. While the airport, an employee verifies online bank transactions. Which of the following is the MOST
secure connections?
A. Use the airport's SSID. C. Use the fastest connection via Wi-Fi.
B. Use a wired network Connection. D. Use the corporate VPN connection.
10. A user upgrades operating systems and discovers some advanced features of the printer are no
longer working. Which of the following should the user do to BEST solve this problem?
11. A new small business is deciding on its windows update patching routine for small flecks of laptops
which of the following best practice patch schedules would be MOST appropriate?
A. Schedule updates to occur overnight during the first week of the next month
B. Stagger updates in six-month batches to occur over weekends
C. Allow ends users to set their own windows update patch schedules.
D. Allow windows to use automatic updates
12. A user receives a notification to update the driver for a desktop that currently works. Soon after the
update the user notices the scanner stops working. Which of the following would return the scanners
functionality the FASTEST?
15. A company implements a network that requires employees to know the SSID and password to join.
Which of the following describes this type of network?
17. Ann, a user, notices that her PS/2 keyboard is unplugged after turning on her pc. The keyboard does
not work after she plugs it in. Which of the following should Ann do FIRST?
A. Cellular C. Bluetooth
B. Wireless D. NIC
19. An employee notices an unauthorized person searching through the garbage. Which of the following
security threats is occurring?
A. flac D. .doc
B. .rar E. .aac
C. .mp4 F. .iso
21. A company recently purchased 50 identical computers to deploy for its offices, with 25 in New York
and 25 in California. The network administrator deployed a master image of the standard image for all
the 50 computers. All system boot up and work well. The New York office reports the time in the
operating system is incorrect. There are no reports from California. Which of the following is MOST likely
the cause?
A. The time zone is set incorrectly in the New York Office.
B. The firewall in the New York office is blocking port 21.
C. The New York office was hit with a worm.
D. The come batteries in the New York office need to be replaced.
22. Joe, a business user, is having trouble starting his computer every morning. Sometimes it takes a
long time to start and stays at a startup screen, and joy needs to hold the power button to shut it down
and try again. Which of the following is the first thing Joe should do if this happens again?
23. A technician has added an external hard drive to a personal computer. The hard drive is powered on,
but in the computer does not see the new hard disk. Which of the following is the first thing the
technician should check?
25. When traveling overseas, before plugging a computer system into an outlet, a user should check
which of the following?
A. Laser C. Thermal
B. Inkjet D. Dot matrix
28. A user wants to publish a document via the web. The user wants the document to be compatible
with most operating systems. Which of the following file types should a technician recommended to
best achieve compatibility?
A. .xls C. .pst
B. .doc D. .pdf
29. A user is attempting to prepare an office presentation and needs some direction on how to get a
picture from a website into the presentation. The user contacts a technician for assistance with
accomplishing this task. Which of the following steps should the technician have the user perform first?
(Select Two)
A. Copy D. Edit
B. Paste E. Save
C. Move F. Rename
30. A user is seeking the ability to access backups regardless of where they are located. Which of the
following would provide the user with remote access to backups?
A. Linux C. Mac os
B. Windows D. ios
32. Which of the following video connector standards is capable of carrying a full audio and video digital
signal?
A. VGA C. Component
B. DVI D. Displayport
33. Ann, a user, receives an email advising her to click on the attached file to resolve a financial dispute.
This is an example of:
A. a Trojan. C. ransomware.
B. Social engineering. D. spyware.
34. Which of the following components, if present, allows a computer to use a POST line for data or
voice transmission?
37. Most common web browsers use which of the following protocols? (Choose two)
A. SMTP D. FTP
B. IMAP E. HTTP
C. POP3
38. Which of the following wireless technologies is used to transmit payment information at a point of
sale terminal?
A. NFC C. Wi-Fi
B. Bluetooth D. Cellular
39. Which of the following components can be cooled with liquid cooling? (Select two)
A. CPU D. Modem
B. RAM E. Power supply
C. Optical Drive
40. A user is attempting to connect a computer to a network. Which of the following connectors should
be used to make the connection?
A. RJ45 C. PS/2
B. DVI D. eSATA
41. Ann, a user, has just set up a new computer. She notices several icons for applications she wants
removed. Which of the following would be the best removal method?
42. Which of the following would be the BEST option for transferring media from digital cameras to a
laptop?
45. A user clicks on a suspicious link received is an email, and the pop-up messages appears, stating all
data on the computer has been encrypted. Which of the following types of attacks is described?
A. Trojan C. Ransomware
B. Spyware D. Social engineering
46. Which of the following users the LEAST amount of power while preserving the system state?
48. Which of following types of printers uses percussion as the print method?
A. Peer-to-Peer C. VPN
B. SFTP D. Direct link
50. A technician receives an email notification about an OS update for a zero-day virus.
Which of the following steps should be performed FIRST to update the company servers?
A. Perform the update in a test environment.
B. Perform the update after work hours.
C. Perform the after immediately.
D. Perform the update during the next maintenance window.
51. When attempting to connect to a newly configured wireless router in an office, the technician is
unable to see the name the network. Which of the following settings should be changed?
53. A user wishes to do a screen capture of only the active window. Which of the following key
Combinations is recommended?
A. USB D. HDMI
B. RCB E. DVI
C. VGA F. Thunderbolt
57. Which of the following could be used to save changes made to a read-only document?
A. Edit C. Delete
B. Rename D. Save as
58. Joe knocks on Ann's front door and tells her he is from the cable company and needs to survey the
type of wireless router she is using. Ann gives him the information he requests; however, she later calls
the cable company and is told the company does not perform these types of survey. Which of the
following BEST describes what occurred?
60. Which of the following is a fixed storage drive without mechanical components?
A. SMTP C. POP3
B. HTTP D. IMAP
62. A user recently left a phone at shared place and noticed unauthorized social media posts were
created while phone was unattended. Which of the following action is most likely to prevent this from
occurring again?
63. A user type in the URL www.webpage.com but www.webpages.net displays instead. This is example
which of the following?
A. Chrome OS D. Windows
B. Linux
C. Mac OS