Assessment Test

  1. Which of the following optical discs will store the most data?
    1. CD-ROM
    2. DVD-ROM DL
    3. DVD-ROM DS
    4. RS-ROM
  2. Which of the following devices are used to permanently store user data in a computer? Choose two.
    1. HDD
    2. RAM
    3. ROM
    4. SSD
  3. Which of the following on your computer is considered firmware?
    1. RAM
    2. SSD
    3. CMOS
    4. BIOS
  4. What was the first widely adopted video connector standard?
    1. CGA
    2. VGA
    3. XGA
    4. DVI
  5. What type of removable storage is often used in digital cameras?
    1. Flash drive
    2. NAS
    3. Memory card
    4. Mobile media card
  6. Which of the following devices is considered an input-only device?
    1. Scanner
    2. Printer
    3. Touchscreen
    4. Flash drive
  7. Which operating system named its versions after large cats?
    1. iOS
    2. OS X
    3. Android
    4. Chrome OS
  8. Your computer has a 64-bit CPU. Which statement is true regarding which operating systems you can install on it?
    1. 64-bit operating systems only.
    2. 64-bit or 32-bit operating systems.
    3. 32-bit operating systems only.
    4. It depends on how much RAM your system has.
  9. What happens to a file when you move it from one directory to another in Windows on the same hard drive?
    1. It gets erased from the original location and re-created in the new location.
    2. It is maintained in the original location and re-created in the new location.
    3. Nothing happens to the file; the metadata gets changed pointing to the new directory.
    4. Nothing happens to the file.
  10. A .flac file is an example of what type of file?
    1. Image
    2. Video
    3. Audio
    4. Compressed
  11. You are configuring some Windows computers for an office, and the manager tells you that employees should not be able to play the games. What should you do?
    1. Uninstall the games from within Control Panel.
    2. Uninstall the games from within Windows Update.
    3. In the Start menu, right-click the Games folder and select Delete.
    4. Delete and reinstall Windows, and deselect the games upon reinstallation.
  12. A common compression format file extension seen on UNIX and Linux computers is what?
    1. .rar
    2. .dmg
    3. .iso
    4. .gz
  13. What type of software is used to create 3-D drawings for construction projects?
    1. CAD
    2. Graphic design
    3. PDF
    4. Specialized
  14. You open your web browser and type in www.google.com, but your computer can't find the website. Your neighbor's computer finds it just fine. What is most likely the cause?
    1. Incorrect DNS configuration.
    2. Incorrect DHCP configuration.
    3. Incorrect WPA2 configuration.
    4. The website is down.
  15. Your friend Marcos asks you which of the following is the most secure. What do you tell him?
    1. 802.11n
    2. Infrared
    3. Fiber-optic
    4. UTP
  16. Your need to set up a wireless router for a friend. He wants to be sure that his network is secure. Which wireless security method should you implement?
    1. WPA2
    2. WPA
    3. NAT
    4. WEP
  17. Which of the following types of networks features decentralized security and resource administration?
    1. LAN
    2. WAN
    3. Peer-to-peer
    4. Client-server
  18. You need to install a local storage solution that multiple users can easily access and has its own file-management software. Which option should you choose?
    1. NAS
    2. DAS
    3. Network drive
    4. Cloud
  19. Which of the following is an advantage of using a workgroup instead of a homegroup?
    1. It's more secure because it requires a password.
    2. It has guaranteed compatibility because all computers must be running Windows 7 or newer.
    3. It's more secure because all clients must be on the same local network.
    4. It's more flexible because multiple operating systems can join it.
  20. Angela has an iPhone with a biometric scanner enabled. She powered the device off, and just turned it back on. What methods can she use to unlock her phone?
    1. Fingerprint only
    2. Passcode only
    3. Fingerprint or passcode
    4. Fingerprint, passcode, or iris scan
  21. You are setting up a new Wi-Fi connection on your iPad. What is the first step in the process?
    1. Enter the wireless password.
    2. Verify the Internet connection.
    3. Verify wireless capabilities.
    4. Locate SSID.
    5. Turn on Wi-Fi.
  22. What type of security is involved when pairing two Bluetooth devices together?
    1. SSL certificates are exchanged.
    2. A PIN is provided by the Bluetooth device.
    3. The Bluetooth security layer negotiates the security mechanism.
    4. There is no security involved.
  23. Which of the following are considered physical security risks? (Choose two.)
    1. Dumpster diving
    2. Phishing
    3. Software theft
    4. Password cracking
  24. What is the primary difference between a computer virus and a worm?
    1. A virus can replicate itself to infect another computer.
    2. A worm can replicate itself to infect another computer.
    3. Viruses only damage operating systems while worms damage software applications.
    4. Viruses can't cause total system crashes whereas worms can.
  25. You are online and you see a link to a free virus-scanning program appear. You click it, and after a few minutes your computer starts behaving erratically. What happened?
    1. The virus scanner found a virus and is deleting it.
    2. The link is attempting to crack your password.
    3. The link was a phishing attempt.
    4. The link was a Trojan horse.
  26. Which of the following are considered device hardening techniques? (Choose two.)
    1. Disabling Bluetooth
    2. Requiring complex passwords
    3. Enabling single sign-on
    4. Installing antispyware software
  27. For security purposes, which of the following user accounts are disabled by default?
    1. Guest
    2. Users
    3. Power Users
    4. Administrator
  28. You are browsing the Internet to purchase a gift for a friend. What two things should you look for to ensure it's safe to enter your credit card information? (Choose two.)
    1. Security seal of approval
    2. RSA Secure Access symbol
    3. A lock symbol
    4. HTTPS://
  29. You are helping a friend choose the right laptop for their needs. Which of the following are criteria that should be important for choosing the laptop? (Choose two.)
    1. Display size
    2. Weight
    3. CPU speed
    4. Memory
  30. Your office recently purchased five new workstations, and you are responsible for setting them up properly. After unpacking them, what is the next step you should perform?
    1. Configure the Internet connection.
    2. Configure localization settings.
    3. Power on the computer.
    4. Plug in the cables.
  31. You are setting up a workstation for your neighbor. After following the operating system setup wizard, what is the next step to take in the setup process?
    1. Configure peripherals.
    2. Create user accounts.
    3. Install security software.
    4. Uninstall unneeded software.
  32. You just installed a new HP printer on your Dell computer, and it's not printing. What is the first source to check for information on the problem?
    1. Dell's website
    2. HP's website
    3. Google search
    4. Internet technical community groups
  33. When configuring a backup solution for your computer, you decide that speed is the most important factor. Which storage option should you choose?
    1. Locally attached storage
    2. Network attached storage
    3. Cloud storage
    4. Offline storage
  34. You have just completed a backup of your PC onto an optical disc. What is the next step you need to take?
    1. Store the backup in a secure location.
    2. Burn the disc to ensure the data is saved.
    3. Test the backup to verify it works.
    4. Copy the backup data to a cloud.
  35. You are conducting an ergonomic assessment of your working environment. What should be true of the monitor placement?
    1. The bottom of the monitor should be level with your eyes.
    2. The top of the monitor should be level with your eyes.
    3. The center of the monitor should be level with your eyes.
    4. Monitor position does not matter in ergonomic assessments.
  36. At home, you are walking across a carpeted floor and touch a door handle. The handle shocks you and it stings a little. What caused this shock?
    1. RoHS
    2. EMI
    3. ESD
    4. UPS
  37. You need to purchase a device for your desktop computer so that if you lose power in your house, the computer can still operate until you shut it down safely. What do you need?
    1. Surge suppressor
    2. Power replicator
    3. Power strip
    4. UPS
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.170.223