Answers to the Assessment Test

  1. C. A double-sided DVD-ROM can store more data than a dual-layer DVD-ROM, and both can store much more than a CD-ROM. There is no RS-ROM. See Chapter 1 for more information.
  2. A, D. Hard disk drives (HDD) are used to permanently store user data. Solid state drives (SSD) are one type of hard drive. See Chapter 1 for more information.
  3. D. The Basic Input/Output System (BIOS) is firmware. It's stored on a flash memory chip (sometimes referred to as CMOS). See Chapter 1 for more information.
  4. B. VGA was the first widely used video connector standard, and it was released in 1987. See Chapter 2 for more information.
  5. C. Digital cameras use memory cards. The most popular form of memory card in the market today is the SD card. MMC (Multi Media Card) is a variant of SD cards but there is no such thing as a “Mobile Media Card.” See Chapter 2 for more information.
  6. A. Scanners are input devices. Printers produce output. Touchscreens and flash drives are both input and output devices. See Chapter 2 for more information.
  7. B. Apple's OS X was named for large cats. Now versions are named after locations in California. See Chapter 3 for more information.
  8. B. A 64-bit processor can handle 32-bit or 64-bit OSs. It is a waste of power to use a 32-bit OS on it, but it will work. See Chapter 3 for more information.
  9. C. Moving a file is analogous to a cut and paste. It takes the file from one folder and places it in another within Windows. However, on the hard drive the only thing that happens is the file gets associated with a new folder. It does not physically move. See Chapter 3 for more information.
  10. C. The .flac extension is for audio files. See Chapter 4 for more information.
  11. A. Games and other software components can be added and removed from within Control Panel. See Chapter 4 for more information.
  12. D. The .gz extension is used by gzip, which is a UNIX- and Linux-compatible compression utility. See Chapter 4 for more information.
  13. A. Computer Aided Design (CAD) software is designed to create 2-D and 3-D drawings for construction projects. CAD is a type of specialized software. See Chapter 4 for more information.
  14. A. DNS servers resolve host names to IP addresses. It's possible that your computer has the wrong address for the DNS server. DHCP automatically configures TCP/IP clients, and WPA2 is a security protocol. If the website was down, your neighbor would not be able to access it either. See Chapter 5 for more information.
  15. C. Wired connections are more secure than wireless ones. Fiber-optic cable is also immune to wiretaps, which makes it more secure than UTP. See Chapter 5 for more information.
  16. A. WPA2 is the most secure wireless security protocol in use today. See Chapter 5 for more information.
  17. C. A peer-to-peer network is one where all computers are equals. Each one is responsible for setting its own security and resource sharing. See Chapter 6 for more information.
  18. A. Network attached storage (NAS) is an external hard drive (or multiple hard drives) complete with its own file management and sharing software. See Chapter 6 for more information.
  19. D. Homegroups require their clients to be running Windows 7 or newer, and they are more secure than workgroups because a password is needed to join. An advantage of a workgroup is that multiple client OSs can participate, such as OS X. See Chapter 6 for more information.
  20. B. With biometrics enabled, you can use either the passcode or your fingerprint to access a locked device. However, if it was just powered off, the only option is to enter the passcode. See Chapter 7 for more information.
  21. C. The proper steps in order are to verify wireless capabilities, turn on Wi-Fi, locate SSID, enter the wireless password, and verify the Internet connection. See Chapter 7 for more information.
  22. B. When pairing two Bluetooth devices, you need to enter the PIN into your mobile device that allows it to connect to the Bluetooth device. See Chapter 7 for more information.
  23. A, C. Examples of physical security risks include hardware damage and theft, software and license theft, shoulder surfing, and dumpster diving. See Chapter 8 for more information.
  24. B. Viruses and worms are similar in the damage they do. The major difference is that while a virus needs a host to replicate and spread, a worm can replicate itself and spread without user intervention. See Chapter 8 for more information.
  25. D. The link was most likely a Trojan horse, which pretends to be a beneficial program but then does damage to your computer. It most likely installed malware on your system. See Chapter 8 for more information.
  26. A, D. Device hardening makes it harder for attackers to gain access to your system by reducing the potential areas of attack. Two examples of device hardening are disabling unused or unneeded services and installing antimalware. See Chapter 9 for more information.
  27. A. The Guest account is disabled by default and should remain disabled if it is not being used. See Chapter 9 for more information.
  28. C, D. Secure websites will start with HTTPS:// instead of HTTP://. In addition, there will be a lock symbol near the address in the address bar. See Chapter 9 for more information.
  29. A, B. Processor speed and memory are important for all computers. The display size and weight are considerations that are more specifically related to laptops than desktop computers. See Chapter 10 for more information.
  30. D. The first step in setting up a workstation is to plug in the cables. See Chapter 10 for more information.
  31. C. After performing the initial setup of the operating system, the next step is to install security software. The security software is the second most important piece of software on the computer, so it should be taken care of immediately after the OS setup. See Chapter 10 for more information.
  32. B. Always check the manufacturer's website first. Since it's an HP printer, check their site and not Dell's. See Chapter 11 for more information.
  33. A. When choosing a backup solution, know that locally attached storage devices will always be faster than network storage or cloud-based solutions. See Chapter 11 for more information.
  34. C. After completing a backup, you should verify that the backup is working properly. See Chapter 11 for more information.
  35. B. When placing a computer monitor, the top of the monitor should be at or slightly below eye level for the user. See Chapter 12 for more information.
  36. C. The shock is caused by static electricity, which is also known as electrostatic discharge (ESD). See Chapter 12 for more information.
  37. D. An uninterruptable power supply contains batteries that allow your computer to operate even if there is no power coming to it. See Chapter 12 for more information.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.135.188.121