Sunteți pe pagina 1din 9

1.

Which of following should be entered within the run command window to start a console prompt on
a windows device?

A. cmd. C. nslookup.
B. ipconfig. D. whois.
2. A user downloads and installs free games from the internet. Then, the home page of the users
browser changes, search results and hijacked, and numerous pop-up web ads are displayed. Which of
the following threats has MOST likely occurred?

A. Shoulder Suffering. C. Malware.


B. Social engineering. D. Phishing.
3. Joe, a user, browser to his company's web page. After careful viewing, Joe the page has a different
URL. Which of the following BEST describe this scenario?

A. Home banner redirection. C. Cookie redirection.


B. Collaboration software redirection. D. Home page redirection.
5. Which of the following is a reason to turn off connectivity methods (e.g., Wi-Fi, Bluetooth, NFC) while
not in use?

A. To prevent exceeding the data cap.


B. To keep the device cooler.
C. To limit the amount of background data being transmitted.
D. To improve cellular data reception.

6. An administrator has received a new computer that is preloaded with various software. Which of the
following should the administrator do?

A. Trust the manufacturer's software command.


B. Uninstall any unneeded software.
C. Ask the user which software is desired.
D. Install a new operating system.

7. Joe, a user, drops his laptop and the screen cracks. He calls the manufacturer and is told they will not
warranty the repair. Which of the following explains why the manufacturer will not cover the repair?

A. Because the OS is not updated.


B. Because of the physical damage to the laptop.
C. Because the laptop belongs to the company.
D. Because he did not fill out the warranty card.
8. A user wants to install a new USB printer on a laptop computer. Which of the following should the
user do before installing the new printer to ensure it will function property?

A. Download the latest printer's driver.


B. Enable the laptop's Bluetooth devices.
C. Adjust the laptop's screen resolution.
D. Connect a USB thumb drive to the laptop.

9. While the airport, an employee verifies online bank transactions. Which of the following is the MOST
secure connections?

A. Use the airport's SSID. C. Use the fastest connection via Wi-Fi.
B. Use a wired network Connection. D. Use the corporate VPN connection.
10. A user upgrades operating systems and discovers some advanced features of the printer are no
longer working. Which of the following should the user do to BEST solve this problem?

A. Roll back the Operating system.


B. Power cycle the Printer
C. Check the vendors websites for a new drivers
D. change the printers default settings

11. A new small business is deciding on its windows update patching routine for small flecks of laptops
which of the following best practice patch schedules would be MOST appropriate?

A. Schedule updates to occur overnight during the first week of the next month
B. Stagger updates in six-month batches to occur over weekends
C. Allow ends users to set their own windows update patch schedules.
D. Allow windows to use automatic updates

12. A user receives a notification to update the driver for a desktop that currently works. Soon after the
update the user notices the scanner stops working. Which of the following would return the scanners
functionality the FASTEST?

A. Replace the scanner C. Roll back the driver


B. Register the drive D. Disable driver signing.
13. Joe, a user, just received a new mobile device. Which of the following will Joe be prompted for
during device setup?

A. Power profile C. Account login information


B. Screen resolution D. Bluetooth PIN
14. A user is working on an office computer and cannot sign in to the online banking account that is
usually accessed from the home computer. The user does not remember the logon credentials. Which of
the following is the MOST likely reason for the inability to sign on?
A. The office computer's browser is not HTTPS compatible
B. Required browsers plugins are missing from the office computer
C. Auto-complete and save passwords are enabled on the home computer
D. The bank has changed its webpage to a more complex design.

15. A company implements a network that requires employees to know the SSID and password to join.
Which of the following describes this type of network?

A. Secure network C. Two-factor authentication


B. Cellular network D. Open access point
16. Joe's wireless network at work has the same name as a wireless router he recently installed at home.
Joe's wireless device keeps attempting to join his home network using his work password. Which of the
following would allow Joe to connect to both networks without disruption?

A. Change the administrator password on the router


B. Change the SSID from the default name.
C. Set both networks to use the same password.
D. Update the firmware on the home router

17. Ann, a user, notices that her PS/2 keyboard is unplugged after turning on her pc. The keyboard does
not work after she plugs it in. Which of the following should Ann do FIRST?

A. pres Ctrl+Alt+Delete. C. Reboot the PC


B. Turn off sticky keys. D. Check the keyboard connection
18. Which of the following connections allows for the greatest mobility?

A. Cellular C. Bluetooth
B. Wireless D. NIC
19. An employee notices an unauthorized person searching through the garbage. Which of the following
security threats is occurring?

A. Social engineering C. Phishing


B. Dumpster diving D. License Theft
20. Which of the following file types are used for audio? (Select two)

A. flac D. .doc
B. .rar E. .aac
C. .mp4 F. .iso
21. A company recently purchased 50 identical computers to deploy for its offices, with 25 in New York
and 25 in California. The network administrator deployed a master image of the standard image for all
the 50 computers. All system boot up and work well. The New York office reports the time in the
operating system is incorrect. There are no reports from California. Which of the following is MOST likely
the cause?
A. The time zone is set incorrectly in the New York Office.
B. The firewall in the New York office is blocking port 21.
C. The New York office was hit with a worm.
D. The come batteries in the New York office need to be replaced.

22. Joe, a business user, is having trouble starting his computer every morning. Sometimes it takes a
long time to start and stays at a startup screen, and joy needs to hold the power button to shut it down
and try again. Which of the following is the first thing Joe should do if this happens again?

A. Ignore the issue and keep restarting.


B. Unplug the cable and try again.
C. Call technical support.
D. Install security software.

23. A technician has added an external hard drive to a personal computer. The hard drive is powered on,
but in the computer does not see the new hard disk. Which of the following is the first thing the
technician should check?

A. The Power Cable C. The Hard drive Firmware revision


B. The OS version for compatibility D. The data cable
24. Which of the following is an advantage of cloud storage over local storage?

A. IT provides higher levels of security.


B. Retrieval is faster than local storage.
C. Files are accessible from any connected device.
D. It provides Protection from hackers.

25. When traveling overseas, before plugging a computer system into an outlet, a user should check
which of the following?

A. Power utilization C. Room humidity


B. Electrical current type D. Power supply voltage
26. Which of the following differentiates open-source vs. commercial operating systems?

A. Commercial OS provide a transparent programming environment.


B. Open-source OS are often developed by a large and diverse community.
C. Open-source OS are usually associated with an annual licensing fee.
D. Commercial OS are built to be used by the private industry.

27. Which of the following printer types uses toner?

A. Laser C. Thermal
B. Inkjet D. Dot matrix
28. A user wants to publish a document via the web. The user wants the document to be compatible
with most operating systems. Which of the following file types should a technician recommended to
best achieve compatibility?

A. .xls C. .pst
B. .doc D. .pdf
29. A user is attempting to prepare an office presentation and needs some direction on how to get a
picture from a website into the presentation. The user contacts a technician for assistance with
accomplishing this task. Which of the following steps should the technician have the user perform first?
(Select Two)

A. Copy D. Edit
B. Paste E. Save
C. Move F. Rename
30. A user is seeking the ability to access backups regardless of where they are located. Which of the
following would provide the user with remote access to backups?

A. Cloud-based storage C. Storage area networks


B. Network-attached storage D. Direct-attached storage
31. Which of the following operating system is MOST commonly built by contributions from a global
community of developers?

A. Linux C. Mac os
B. Windows D. ios
32. Which of the following video connector standards is capable of carrying a full audio and video digital
signal?

A. VGA C. Component
B. DVI D. Displayport
33. Ann, a user, receives an email advising her to click on the attached file to resolve a financial dispute.
This is an example of:

A. a Trojan. C. ransomware.
B. Social engineering. D. spyware.
34. Which of the following components, if present, allows a computer to use a POST line for data or
voice transmission?

A. Network card C. USB


B. Modem D. SSD
35. To increase security, which of the following is the BEST feature to disable on a mobile device when
not in use?
A. Accelerometer C. IMEI
B. Screen lock D. NFC
36. Management reports that windows Updates to systems are interrupting the work day and taking
too long to complete. Which of the following should be done to eliminate interruptions?

A. Schedule the computers to install updates during off hours.


B. Implement staggered updates to install throughout the day.
C. Install security-related updates and disable all others.
D. Change production workstations to run on Linux.

37. Most common web browsers use which of the following protocols? (Choose two)

A. SMTP D. FTP
B. IMAP E. HTTP
C. POP3
38. Which of the following wireless technologies is used to transmit payment information at a point of
sale terminal?

A. NFC C. Wi-Fi
B. Bluetooth D. Cellular
39. Which of the following components can be cooled with liquid cooling? (Select two)

A. CPU D. Modem
B. RAM E. Power supply
C. Optical Drive
40. A user is attempting to connect a computer to a network. Which of the following connectors should
be used to make the connection?

A. RJ45 C. PS/2
B. DVI D. eSATA
41. Ann, a user, has just set up a new computer. She notices several icons for applications she wants
removed. Which of the following would be the best removal method?

A. Drag the icons into the trash.


B. Hides the icons from the desktop
C. Uninstall the unneeded applications.
D. Run software and security updates.

42. Which of the following would be the BEST option for transferring media from digital cameras to a
laptop?

A. Flash Drive C. File transfer protocol


B. Memory card D. External hard drive
43. A technician is assigned to harden a laptop for a medical practice. Which of the following should be
used to protect PII in the event of hardware theft?

A. Hard drive encryption C. Password expiration


B. Disabling Bluetooth D. Host Based Firewall
44. Ann, a user, is browsing the internet and notices that many words on websites are now underlined
and link to a search pages, when they did not before. This seems to occur on all the websites she visits.
Which of the following BEST describes what is happening on her computer?

A. Adware has infected the computer


B. Session cookies are enabled
C. The browser has been patched
D. Ad-blocking software is enabled

45. A user clicks on a suspicious link received is an email, and the pop-up messages appears, stating all
data on the computer has been encrypted. Which of the following types of attacks is described?

A. Trojan C. Ransomware
B. Spyware D. Social engineering
46. Which of the following users the LEAST amount of power while preserving the system state?

A. Hibernation C. Log off


B. Sleep mode D. Shutdown
47. When setting up an internet browser, which of the following is considered a best practice when it
comes to extension and plugins?

A. Allow third-party cookies


B. Enable unsigned add-ons
C. Configure a pop-up blocker
D. Disable unused browser add-ons

48. Which of following types of printers uses percussion as the print method?

A. Ethernet C. Dot matrix


B. Inkjet D. Laser
49. Which of the following community-based file-sharing methods offers the GREATEST? Potential
transfer speed across the Internet?

A. Peer-to-Peer C. VPN
B. SFTP D. Direct link
50. A technician receives an email notification about an OS update for a zero-day virus.

Which of the following steps should be performed FIRST to update the company servers?
A. Perform the update in a test environment.
B. Perform the update after work hours.
C. Perform the after immediately.
D. Perform the update during the next maintenance window.

51. When attempting to connect to a newly configured wireless router in an office, the technician is
unable to see the name the network. Which of the following settings should be changed?

A. Administrative share C. Default gateway


B. SSID broadcast D. DNS
52. A user recently a configured laptop from a company's IT department. The help desk technician
accesses the user's laptop remotely, but the first attempt to install the application fails. Which of
following should the help desk technician do NEST?

A. Disable the computer's antivirus software.


B. Verify Internet connectivity on the computer.
C. Uninstall any adware that is on the computer.
D. Reboot the computer and attempt the installation again.

53. A user wishes to do a screen capture of only the active window. Which of the following key
Combinations is recommended?

A. Alt+prnt Scrn C. Crtl+prnt Scrn


B. Shift+prnt Scrn D. Ctrl+Shift+prnt Scrn
54. Which of the following would be the MOST effective means of transferring 3TB of data between two
computers?

A. External hard drive C. SD card


B. Flash drive D. Blu-ray
55. A user’s click on an attachment, which results in the encryption of system data, rendering the Data
unrecoverable without a code that is marketed to the victim. This is an example of:

A. ransomware. C. social engineering.


B. adware . D. phishing.
56. Which of the following can be used for an analog video connection? (Select Two)

A. USB D. HDMI
B. RCB E. DVI
C. VGA F. Thunderbolt
57. Which of the following could be used to save changes made to a read-only document?

A. Edit C. Delete
B. Rename D. Save as
58. Joe knocks on Ann's front door and tells her he is from the cable company and needs to survey the
type of wireless router she is using. Ann gives him the information he requests; however, she later calls
the cable company and is told the company does not perform these types of survey. Which of the
following BEST describes what occurred?

A. Phishing C. Social Engineering


B. Dumpster diving D. Shoulder surfing
59. After completing the first scheduled backup, which of the following should be done NEXT?

A. Verify the backup


B. Delete the original files to clear space for the next backup
C. Duplicate the backup
D. Schedule the next backup

60. Which of the following is a fixed storage drive without mechanical components?

A. Optical drive C. solid state drive


B. Hard disk drive D. Floppy disk drive
61. A technician receives call from a user who can no longer send email from a smartphone. The user is
able to receive emails fine. Which of the following setting should technician check to BEST resolve this
issue?

A. SMTP C. POP3
B. HTTP D. IMAP
62. A user recently left a phone at shared place and noticed unauthorized social media posts were
created while phone was unattended. Which of the following action is most likely to prevent this from
occurring again?

A. Enable screen lock on the phone


B. Disable mobile data roaming on the phone
C. Disconnect the phone from Wi-Fi when not in use
D. Turn on airplane mode when in public place

63. A user type in the URL www.webpage.com but www.webpages.net displays instead. This is example
which of the following?

A. Outdate Browser C. Browser redirection


B. Banner add D. Secure Connection
64. Which of the following was design to work exclusively with web-based application?

A. Chrome OS D. Windows
B. Linux
C. Mac OS

S-ar putea să vă placă și