IT FUNDAMENTALS | IT FUNDAMENTALS | IT FUNDAMENTALS | IT FUNDAMENTALS | IT FUNDAMENTALS |
---|---|---|---|---|
Which of the following extensions identifies a video file?
A. .msi B. .tar C. .img D. .mp4
D. .mp4
|
A user will be traveling with a smartphone that contains confidential information. Which of
the following should be disabled? (Select TWO). A. Keyboard B. Speakers C. Mouse D. Bluetooth E. NFC
D. Bluetooth
E. NFC |
Which of the following computer components are used to store data? (Select TWO).
A. GPU B. HDD C. RAM D. NIC E. CPU
B. HDD
C. RAM |
Which of the following is an advantage of using cloud-based collaborative applications and
storage, rather than local applications and storage? A. Decreased software licensing costs B. Higher security encryption C. Limited storage space for files D. Increased accessibility to files
D. Increased accessibility to files
|
Which of the following data connections would provide a user the BEST Internet availability
while traveling? A. Workstation with only RJ-45 connectors B. Smartphone with cellular service C. Laptop with Bluetooth wireless connectivity D. Tablet connected to a SOHO wireless network
B. Smartphone with cellular service
|
Which of the following is the BEST example of productivity software?
A. Word processing software B. Entertainment software C. Image editing software D. Anti-malware software
A. Word processing software
|
Which of the following security threats occurs when a user receives an email from an
illegitimate source asking for login information? A. Hacking B. Phishing C. Spam D. Cracking
B. Phishing
|
Which of the following could be described as both an input and output device?
A. Flat-screen monitor B. Multi-function printer C. Microphone D. Scanner
B. Multi-function printer
|
Which of the following is a requirement to connect a smartphone to a wireless network?
A. SSID B. SATA C. SMTP D. gzip
A. SSID
|
A user receives an email formatted to appear as if the bank sent it. The email explains that
the user must confirm the name, address, and social security number listed on the bank account. Which of the following BEST describes the security threat taking place? A. Shoulder surfing B. Social engineering C. Spam D. Phishing
D. Phishing
|
A technician has just finished setting up a SOHO wireless router but the client does not
want the PC on the wireless network for security reasons. The technician connects an RJ- 45 cable to the computer and the router, but does not receive network connectivity. Which of the following is the NEXT step to diagnose the problem? A. Change the IP address on the computer to match the router. B. Reseat the power cable on the computer and reboot. C. Check for link light activity on the computer and the router. D. Change the hostname of the router to match the computer’s network.
C. Check for link light activity on the computer and the router.
|
An attacker cracks a user's password for all social media, email, and bank accounts. The
user needs to change the passwords for all these accounts. Which of the following should the user do in the future to prevent this from happening? A. Disable unused browser toolbars. B. Clear the browser cache. C. Avoid credential reuse. D. Delete tracking cookies.
C. Avoid credential reuse.
|
A technician has been tasked with changing the settings for a used SOHO router, but does
not have the administrator password because the previous owner changed it. Which of the following actions will resolve this issue? A. Click “Forgot password.” B. Use a password cracker. C. Hold the reset button. D. Use the password: password.
C. Hold the reset button.
|
Which of the following protocols is used to secure communications between sender and
receiver? A. SIP B. SNMP C. SSL D. SMTP
C. SSL
|
A user installed a new scanner on a desktop personal computer without any
documentation. The scanner powers on, the lamp turns on, and then the unit stops with a failure light lit. Which of the following should the user do FIRST? A. Go to the scanner manufacturer's website and download the current installation information. B. Check the personal computer manufacturer's support website for information about scanner installation. C. Find a scanner user group website and ask for help. D. Update the scanner firmware and drivers, then reinstall the scanner.
A. Go to the scanner manufacturer's website and download the current installation information.
|
Multiple laptops that contain confidential data are stolen from a company. Which of the
following is a likely policy change resulting from this incident? A. Enabling full disk encryption B. Requiring screensaver password C. Disabling Bluetooth adapters D. Adding multifactor authentication
A. Enabling full disk encryption
|
After installing the OS on a workstation, a technician notices that everything is displayed in
large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue? A. Color depth B. Orientation C. DPI settings D. Resolution
D. Resolution
|
A user learns of an operating system vulnerability that would allow a hacker to access the
computer. The user would like to keep the operating system up to date to prevent such vulnerabilities from occurring. Which of the following should the user configure? A. Additional OS features B. Automatic updates C. Software firewall D. Anti-malware software
B. Automatic updates
|
Which of the following software types allows for the creation of a single file composed of
multiple subfiles, while at the same time reducing the overall size of the combined elements? A. Database B. Document sharing C. Compression D. Maintenance
C. Compression
|
Which of the following is performed during WiFi setup on a mobile device?
A. Configuring bluetooth pairing settings B. Configuring email settings C. Configuring screen lock settings D. Configuring SSID settings
D. Configuring SSID settings
|
A user is configuring a SOHO wireless router. The user should change the routers default
administrator password for which of the following reasons? A. To prevent improper data transmission encryption B. To prevent unauthorized configuration changes C. To prevent social engineering attacks D. To increase wireless signal strength
B. To prevent unauthorized configuration changes
|
Joe, a user, needs to store a large amount of data, but does not have enough space on his
local computer. Which of the following are the BEST options for him to use? (Select TWO). A. Network attached storage B. External hard drive C. Optical drive D. USB thumb drive E. Another computer
A. Network attached storage
B. External hard drive |
A technician sets up a new computer system and connects the keyboard and mouse to the
PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution? A. Swap the mouse and keyboard to the other PS/2 ports. B. Remap the mouse and keyboard in the BIOS. C. Update the BIOS to recognize the newer keyboard and mouse. D. Configure the keyboard localization settings.
A. Swap the mouse and keyboard to the other PS/2 ports.
|
Which of the following are secure network protocols? (Select TWO).
A. IMAP B. FTPS C. SMTP D. HTTPS E. DNS
B. FTPS
D. HTTPS |
When considering backup media, which of the following holds the MOST data?
A. BD-R B. DVD-R C. DVD-DL D. CD-ROM
A. BD-R
|