Name
*
First Name
Last Name
1. Which of the following is used for temporary storage of program data that is cleared when the computer is turned off?
*
CPU
SSD
Hard drive
System memory
2. Which of the following methods of patching allows for vendor specific controlled updates, reduced user interaction, and increased security of the operating system or application?
*
Upgrading on a periodic basis
Frequent patching
Automatic updates
Patching scheduled daily
3. Which of the following security threats would the use of cable locks reduce?
*
Shoulder surfing
Phishing
Hardware theft
Dumpster diving
4. Which of the following is why password complexity is a best practice?
*
It makes passwords harder to crack.
It encourages users to write down passwords so they are not forgotten.
It forces users to develop typing skills.
It discourages users from using the same password with different accounts.
5. A user receives an email containing a link. When they hover the mouse over the link, the actual URL does not match the text in the body of. the email and appears to be a string of random characters. Which of the following is the BEST course of action?
*
Forward the email to a friend to ask for advice.
Reply to the sender asking for confirmation that it is safe to open.
Delete the email without clicking the link.
Click the link because malware protection software is installed on the computer.
6. Which of the following components serves as temporary storage for computer operations?
*
System board
Central processing unit
Random access memory
Expansion card
7. The extension .rtf is an example of which of the following file types?
*
Document
Executable
Audio
Spreadsheet
8. Which of the following is a common way to prevent physical theft of a laptop or workstation?
*
Shred any sensitive information prior to disposal.
Avoid storing passwords near the computer.
Practice good awareness skills when entering passwords/PINs.
Cable and lock device securely attached to a solid object.
9. After installing a new software application, a user notices that the application launches in demo mode. Which of the following needs to be done to fully activate the software package?
*
Enter a product or license key
Contact the vendor support
Reinstall the software application
Complete the software installation
10. A user's laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user's laptop. How could the user have prevented this breach?
*
Disable file and print sharing on the laptop.
Delete unused drives from the network.
Remove shared keys from the key ring.
Set the read-only attribute on the files.
11. A user's government identification number, birth date, and current address are considered which of the following?
*
IMAP
HTTP
PII
HTTPS
12. Which of the following is a function of a CPU?
*
Encrypts data for remote transmission
Performs data computation
Supplies electricity to components
Provides storage location for files
13. When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?
*
Social engineering
Phishing
Virus attack
License theft
14. A user is configuring a SOHO wireless router. The user should change the router's default administrator password for which of the following reasons?
*
To prevent improper data transmission encryption
To prevent unauthorized configuration changes
To prevent social engineering attacks
To increase wireless signal strength
15. A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?
*
8-bit
16-bit
32-bit
64-bit
16. Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?
*
Large USB flash drive connected to a PC
Medium capacity SATA hard drive
Network attached storage appliance
Firewall with security management
17. Which of the following is the component responsible for interconnectivity of internal system devices?
*
System case
Power supply
Motherboard
Expansion card
18. Which of the following software types protects a desktop from malicious attacks?
*
Backup
Antivirus
Diagnostic
Screensaver
19. Which of the following internal computer components is used to connect video, audio, and network cards?
*
CPU
Motherboard
Hard drive
Modem
20. Which of the following is MOST important to ensure a computer temperature is maintained within normal limits?
*
Maintaining constant power output
Ensuring sufficient airflow
Keeping the case open
Turning the wireless off when not needed
21. An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?
*
LTE
GSM
VoIP
CDMA
22. Which of the following file types is used to consolidate a group of files?
*
.rtf
.m3u
.avi
.rar
23. Which of the following permissions is required to run a .bat file?
*
Delete
Execute
Write
Modify
24. After installing the OS on a workstation, a technician notices that everything is displayed in large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?
*
Color depth
Orientation
DPI settings
Resolution
25. Which of the following connector types can be used by both mice and keyboards? [SELECT TWO]
*
Thunderbolt
eSATA
USB
PS/2
Firewire
26. Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?
*
Micro SD card
Bluetooth
USB connection
Infrared
27. The end user has 16GB of RAM installed on a computer system. Which of the following describes why the OS only uses a maximum of 4GB of RAM?
*
The computer has corrupted RAM
The computer has a defective motherboard
The computer has a virus
The operating system is 32-bit
28. A technician just installed a new computer. Which of the following is the BEST way to manage the cables?
*
Line the cables up neatly and wrap them together with cable ties
Leave the cables loose to prevent interference between wires.
Nail the cables to the wall
Tuck the cables neatly underneath the carpet
29. A user wants to run a major update on a laptop. Which of the following should be considered before running any major updates?
*
Restore folders from back up
Change administrator account password
Back up important folders
Print all personal documents
30. Which of the following allows for the FASTEST printer connections?
*
Bluetooth
USB
Parallel
Serial
31. A user needs to establish an initial password for an email account. Which of the following is the BEST example of a complex password?
*
01#iWant!2686612338
iWanttobeaCosmonau#
01c234n56789v9876x21
012iWanttobe210
32. A user has finished browsing the Internet on a public hotel workstation. Which of the following steps should be taken to BEST secure PII?
*
Log out of the guest account and reboot
Update the browsers, extensions and plugins
Run a virus scan on the workstation
Clear the browser cache, cookies and history