IT FUNDAMENTALS | IT FUNDAMENTALS | IT FUNDAMENTALS | IT FUNDAMENTALS | IT FUNDAMENTALS |
---|---|---|---|---|
Which of the following is an example of ransomware?
A. A user is asked to pay a fee for a password to unlock access to their files. B. A user receives an email demanding payment for a trial application that has stopped working. C. A user has opened an Internet browser and is taken to a site that is not the normal home page. D. A user is asked to open an attachment that verifies the price of an item that was not ordered.
A. A user is asked to pay a fee for a password to unlock access to their files.
|
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins
is considered: A. adware B. spyware C. ransomware D. phishing
B. spyware
|
A home computer that has been in operation for more than five years is now suffering from
random shutdowns during the day. The PC is set up in an enclosed cubby built into the home office desk. Which of the following is MOST likely plaguing the PC? A. The PC was switched over to 240v operation mode B. Dust accumulation C. The PC’s BIOS is severely out-of-date, causing PSU issues D. EMI
B. Dust accumulation
|
Which of the following defines why backup verification is important?
A. To ensure that the backup runs as quickly as possible B. To ensure that the backup can be stored indefinitely C. To ensure that the backup can be saved to the cloud D. To ensure that the backup contains usable data
D. To ensure that the backup contains usable data
|
A user wants to have the latest security patches and bug fixes installed on a computer.
Which of the following is the BEST method to achieve this? A. Configure anti-malware updates B. Manually update before each use C. Update every six months D. Schedule automatic updates
D. Schedule automatic updates
|
A user is configuring a new wireless router. Which of the following should be done to
ensure that unauthorized changes cannot be made? A. Change the SSID B. Change the router’s address C. Change the administrator password D. Change the encryption key
C. Change the administrator password
|
Ann, a user, reports that her computer was working this morning, but now the screen is
blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause? A. The monitor power cable is unplugged. B. The video cable has become disconnected. C. The video driver is not installed. D. The operating system has encountered a stop error. E. The screen saver has activated.
B. The video cable has become disconnected.
|
Which of the following has the lowest latency?
A. SSD B. NAS C. Blu-Ray D. DVD
A. SSD
|
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy
access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue? A. Only browse the Internet on WiFi connections that use WPA2 B. Turn off the guest account in the operating system C. Disable autofill functionality within the web browser D. Remove any legacy browsers from the computer
C. Disable autofill functionality within the web browser
|
A technician has added an external hard drive to a personal computer. The hard drive is
powered on, but the computer does not see the new hard disk. Which of the following is the FIRST thing the technician should check? A. The power cable B. The OS version for compatibility C. The hard drive firmware revision D. The data cable
D. The data cable
|
When setting up a new device, there are multiple features available that will never be used.
Which of the following should the user do to make the new device more secure? A. Make all users administrators. B. Remove or disable the unnecessary features. C. Install a password manager on the device. D. Make all users guests.
B. Remove or disable the unnecessary features.
|
Joe, a user, has just installed his first home wireless router. Which of the following tasks
should be considered to help secure the unit from any confirmed exploits? A. Change the router administrator username. B. Change the router’s broadcasting channel. C. Update the unit’s firmware. D. Use a complex administrator password.
C. Update the unit’s firmware.
|
Which of the following is the BEST security practice to use when configuring the
management options of a wireless router? A. Disable DHCP B. Change the admin password C. Enable SSID D. Enable remote administration
B. Change the admin password
|
Which of the following permissions is required to run a .bat file?
A. Delete B. Execute C. Write D. Modify
B. Execute
|
A user, Joe, is concerned about the safety of his personal information on a website. Which
of the following can Joe look for to ensure that his personal information is not at risk? (Select TWO). A. HTTP on the browser address bar B. Suspicious ads in the browser C. HTTPS on the browser address bar D. A lock symbol on the browser address bar E. The word secure in the browser address bar
C. HTTPS on the browser address bar
D. A lock symbol on the browser address bar |
Which of the following is a safety feature of cloud-based backups?
A. Incremental copy of data B. Local copy of data C. Offsite storage of data D. Full backup of PC data
C. Offsite storage of data
|
Which of the following is required to have a multimedia conversation with someone across
the Internet? (Select THREE). A. Network connection B. Microphone C. Modem D. Firewall E. Webcam F. Cable connection G. Wired NIC
A. Network connection
B. Microphone E. Webcam |
When trying to activate the operating system, a user receives a notice that the software is
not genuine. Which of the following security threats has occurred? A. Social engineering B. Phishing C. Virus attack D. License theft
D. License theft
|
Which of the following security threats is classified as license theft?
A. Entering the neighbor’s software key B. Using software to reveal a password C. Searching through the trash for passwords D. Watching what a user types on screen
A. Entering the neighbor’s software key
|
Which of the following CPU cooling types is BEST in a dusty environment?
A. Liquid cooling B. Open case C. Case fan D. Heat sink fan
A. Liquid cooling
|
After initial OS and application installation on a laptop, an application warns that it will only
work 24 more times. Which of the following should be done NEXT? A. The application has to be registered to the user. B. The application must be upgraded to a 64-bit version. C. The application must be activated. D. The application needs to be reinstalled.
C. The application must be activated.
|
Joe, a user, saves a document to a flash drive on his computer in order to print the
document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive. Which of the following is the MOST likely cause of the infection? A. The flash drive was infected by a war driving hacker on the way to the public kiosk. B. The public workstation was infected by Joe’s flash drive. C. The public workstation was infected and passed the virus to the flash drive. D. The flash drive was already infected by the user’s computer.
C. The public workstation was infected and passed the virus to the flash drive.
|
A technician wants to minimize the risk of having third parties track previously visited web
pages. Which of the following should be performed in the Internet browsers settings? (Select TWO). A. Select form data B. Disable location services C. Remove cookies D. Clear history E. Change passwords
C. Remove cookies
D. Clear history |
Which of the following allows for hands-free operation of a wireless device?
A. Encryption B. Wireless password C. Bluetooth pairing D. Internet connectivity
C. Bluetooth pairing
|
A home user wants to share files between two different computers. The user wants the files
to be available to either computer, regardless of whether either computer is turned on. Which of the following is the BEST storage method? A. USB storage B. Internal storage C. Direct attached storage D. Network attached storage
D. Network attached storage
|