Comptia IT Fundamentals Prep

Which of the following is used for temporary storage of program data that is cleared when the computer is turned off?
A. CPU
?B. SSD
?C. Hard drive
D. System memory

D. System memory

Which of the following methods of patching allows for vendor controlled updates, reduced user interaction, and increased security of the operating system or application?
A. Upgrading on a periodic basis
?B. Frequent patching
?C. Automatic updates
D. Patch

?C. Automatic updates

Which of the following security threats would the use of cable locks reduce?
A. Shoulder surfing
?B. Phishing
?C. Hardware theft
D. Dumpster diving

C. Hardware theft

Which of the following is a reason why password complexity is a best practice?
A. It makes passwords harder to crack.
?B. It encourages users to write down passwords so they are not forgotten.
?C. It forces users to develop typing skills.
?D. It discourag

A. It makes passwords harder to crack

A user receives an email containing a link. When they hover the mouse over the link, the actual URL does not match the text in the body of the email and appears to be a string of random characters. Which of the following is the BEST course of action?
A. F

?C. Delete the email without clicking on the link.

Which of the following components serves as temporary storage for computer operations?
A. System board
?B. Central processing unit
?C. Random access memory
D. Expansion card

C. Random access memory

The extension .rtf is an example of which of the following file types?
A. Document
B. Executable
?C. Audio
?D. Speadsheet

A. Document

Which of the following is a common way to prevent physical theft of a laptop or workstation?
?A. Shred any sensitive information to prior to disposal.
?B. Avoid storing passwords near the computer.
?C. Practice good awareness skills when entering password

?D. Cable and lock device securely attached to a solid object.

After installing a new software application, a user notices that the application launches in demo mode. Which of the following needs to be done to fully activate the software package?
?A. Enter a product or license key.
?B. Contact the vendor support.
?C.

?A. Enter a product or license key.

A user's laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user's laptop. How could the user have prevented this breach?
?A. Disable fil

A. Disable file and print sharing on the laptop.

A user's government identification number, birth date, and current address are considered which of the following?
?A. IMAP
?B. HTTP
?C. PII
?D. HTTPS

?C. PII

Which of the following is the function of a CPU?
?A. Encrypts data for remote transmission
?B. Performs data computation
?C. Supplies electricity to components
?D. Provides storage location for files

?B. Performs data computation

When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?
?A. Social engineering
?B. Phishing
?C. Virus attack
?D. License theft

?D. License theft

A user is configuring a SOHO wireless router. The user should change the router's default administrator password for which of the following reasons?
?A. To prevent improper data transmission encryption
?B. To prevent unauthorized configuration changes
?C.

?B. To prevent unauthorized configuration changes

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?
?A. 8-bit
?B. 16-bit
?C. 32-bit
?D. ?64-bit

?D. ?64-bit

Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?
?A. Large USB flash drive connected to a PC
?B. Medium capacity SATA hard drive
?C. Network attached storage appliance

?C. Network attached storage appliance

Which of the following is the component responsible for interconnectivity of internal system devices?
?A. System case
?B. Power supply
?C. Motherboard
?D. Expansion card

?C. Motherboard

Which of the following software types protects a desktop from malicious attacks?
?A. Backup
?B. Antivirus
?C. Diagnostic
?D. Screensaver

?B. Antivirus

Which of the following is MOST important to ensure a computer temperature is maintained within normal limits?
?A. Maintaining constant power output
?B. Ensuring sufficient airflow
?C. Keeping the case open
?D. Turning the wireless off when not needed

?B. Ensuring sufficient airflow

An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?
?A. LTE
?B. GSM
?C. VoIP
?D. CDMA

C. VoIP

Which of the following file types is used to consolidate a group of files?
?A. .rtf
?B. .m3u
?C. .avi
?D. .rar

?D. .rar

Which of the following permissions is required to run a .bat file?
?A. Delete
?B. Execute
?C. Write
?D. Modify

?B. Execute

After installing the OS on a workstation, a technician notices that everything is displayed in large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?
?A. Color depth
?B. Orientation

?D. Resolution

Which of the following connector types can be used by both mice and keyboards? (Select TWO).
?A. Thunderbolt
?B. eSATA
?C. USB
?D. PS/2
?E. FireWire

C. USB & D. PS/2

Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?
?A. Micro SD card
?B. Bluetooth
?C. USB connection
?D. Infrared

?B. Bluetooth

An end-user has 16GB of RAM installed on a computer system. Which of the following describes why the OS only uses a maximum of 4GB of RAM?
?A. The operating system is 16-bit.
?B. The computer has corrupted RAM.
?C. The computer has a defective motherboard

D. The operating system is 32-bit.

A technician just installed a new computer. Which of the following is the BEST way to manage the cables?
?A. Line the cables up neatly and wrap them together with cable ties.
?B. Leave the cables loose to prevent interference between wires.
?C. Nail the c

?A. Line the cables up neatly and wrap them together with cable ties.

A user wants to run a major update on a laptop. Which of the following should be considered before running any major updates?
?A. Restore folders from back up
?B. Change administrator account password
?C. Back up important folders
?D. Print all personal d

?C. Back up important folders

Which of the following allows for the FASTEST printer connections?
?A. Bluetooth
?B. USB
?C. Parallel
?D. Serial

B. USB

A user needs to establish an initial password for an email account. Which of the following is the BEST example of a complex password?
?A. 01#iWant!2686612338
?B. iWantobeaCosmonau#
?C. 01c234n56789v9876x21
?D. 012iWanttobe210

?A. 01#iWant!2686612338

Question 32
Which of the following is an advantage of using a 64-bit operating system?
?A. Ability to recognize an SSD
?B. Ability to obtain an IPv6 address3
?C. Ability to utilize a larger amount of RAM
?D. Ability to add two or more hard drives

C. Ability to utilize a larger amount of RAM

A user has finished browsing the Internet on a public hotel workstation. Which of the following steps should be taken to BEST secure PII?
?A. Log out of the guest account and reboot
?B. Update the browsers, extensions and plugins
?C. Run a virus scan on t

D. Clear the browser cache, cookies and history

Which of the following is a file on a computer that links to another program or file
somewhere else on the same computer?
A. Shortcut
B. URL
C. Attachment
D. FTP

A. Shortcut

Which of the following operating systems is MOST likely to be found on a desktop where its
primary functions include professional video and audio editing?
A. Chrome OS
B. Windows 7 Home
C. Mac OS X
D. iOS

C. Mac OS X

A technician is trying to access a users files and is unable to open any folder or file. Which
of the following BEST describes the situation?
A. The folders contain older versions of the files.
B. The files are corrupted.
C. The technician needs to change

D. The technician does not have permissions.

A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select TWO).
A. Use only public computers to

B and C

Which of the following components provides the FASTEST medium for hosting and storing
an operating system?
A. Blu-Ray disc
B. 7200RPM HDD
C. SSD
D. DVD-RW

C. SSD

An RoHS label on hardware indicates which of the following?
A. The hardware produces EMI when used.
B. The hardware is certified to be energy efficient.
C. The hardware provides battery backup for power outages.
D. The hardware needs to be properly dispos

D. The hardware needs to be properly disposed.

After initial OS and application installation on a laptop, an application warns that it will only
work 24 more times. Which of the following should be done NEXT?
A. The application has to be registered to the user.
B. The application must be upgraded to a

C. The application must be activated.

Which of the following settings will a user configure as part of the initial operating system
setup wizard? (Select TWO).
A. Backup schedule
B. Accessibility options
C. Multiple user accounts
D. Time zone
E. Computer name

D and E

Which of the following should be performed after a backup has been completed?
A. Delete the backup
B. Verify the backup
C. Save the backup
D. Schedule the backup

B. Verify the backup

Which of the following connections provide data with the MOST secure protection from
interception?
A. Wired
B. WiFi
C. IR
D. Cellular

A. Wired

A technician is configuring a wireless router for a small office and the business owner
would like the wireless network to be secured using the strongest encryption possible.
Which of the following should the technician choose?
A. WPA2
B. WAP
C. WPA
D. WE

A. WPA2

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and
should be shared cautiously and only with trusted resources?
A. Email address
B. Phone number
C. Mother's maiden name
D. Last name

C. Mother's maiden name

Which of the following operating systems is available for free and can be modified by
anyone?
A. Windows
B. Linux
C. Mac OS
D. Chrome OS

B. Linux

A user is browsing the Internet when suddenly a threatening message appears on screen
demanding a payment in order to avoid the system being disabled. Which of the following
BEST describes this type of malware infection?
A. Ransomware
B. Adware
C. Spyware

A. Ransomware

Which of the following features of a smartphone controls the screen orientation?
A. Gyroscope
B. NFC
C. Accelerometer
D. GPS

A. Gyroscope

Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?
A. Thermal
B. Laser
C. Dot matrix
D. Inkjet

B. Laser

Which of the following components are used to store data? (Select TWO).
A. Motherboard
B. RAM
C. CPU
D. GPU
E. SSD

B and E

A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?
A. iOS
B. Windows
C. Mac OS
D. Chrome OS

C. Mac OS

Which of the following operating systems is very lightweight and relies heavily on Internet
applications?
A. Chrome OS
B. Windows
C. Linux
D. Blackberry OS

A. Chrome OS

Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an
Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar
website. She clears all temporary files and deletes the history, but this con

B. Her computer is infected with adware and is redirecting her browser to another site.

Ann, a user, wishes to free space in her documents folder. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files?
A. Date modified
B. File path
C. Size
D. Extensi

C. Size

A user has finished setting up a new computer. Now the operating system requires activation, but the user discovers the computer has no Internet connection. Which of the following should the user do FIRST?
A. Contact technical support.
B. Reboot the compu

C. Check the Ethernet cable.

Which of the following will allow a user to move a file from one folder to another using the LEAST number of steps, while ensuring that the file is removed from its original location?
A. Open the file from its original location, save it to the new locatio

B. Cut the file from its original location and paste it to the new location.

Which of the following software package types is designed to accept input from multiple
users?
A. Utility
B. Operating system
C. Specialized
D. Collaborative

D. Collaborative

Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?
A. The monitor power ca

B. The video cable has become disconnected.

Which of the following are examples of keyboard connectors? (Select TWO).
A. USB
B. RJ-11
C. Serial
D. FireWire
E. PS/2

A and E

A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard.
The user can install the games by performing which of the following?
A.

B. Enable installed OS features.

A user is at the office and has a cellular phone that previously functioned properly. The
phone is powered on with a fully charged battery. However, the phone does not have
connectivity. Which of the following describes the problem?
A. Phone is disconnect

D. Phone is in airplane mode

Which of the following alternative technologies allows a computer to run multiple operating
systems without partitioning the hard drive?
A. Web applications
B. Dual boot
C. Telepresence
D. Virtualization

D. Virtualization

Which of the following is a 15-pin video connection?
A. DVI
B. S-video
C. Component
D. HDMI
E. VGA

E. VGA

Which of the following is considered an optical storage medium?
A. SSD
B. Blu-Ray
C. Flash drive
D. Memory card

B. Blu-Ray

Which of the following are best practices when it comes to using a computer in a public
location? (Select TWO).
A. Notify the administrator when finished.
B. Use strong passwords.
C. Turn off the computer when finished.
D. Disable the save password functi

D and F

Which of the following is a feature of a basic power strip?
A. Protects against lightning strikes
B. Provides multiple outlets for power
C. Generates power for devices
D. Provides battery backup for devices

C. Generates power for devices

Which of the following connectors consists of three separate plugs for video?
A. Display port
B. S-video
C. Thunderbolt
D. Component

D. Component

Which of the following technologies allows people to communicate all over the world
inexpensively?
A. Virtualization
B. SSID
C. Kinetics
D. VoIP

D. VoIP

Several users want to share a common folder with high availability. Which of the following
devices is BEST to use for this requirement?
A. Large USB flash drive connected to a PC
B. Medium capacity SATA hard drive
C. Network attached storage appliance
D.

C. Network attached storage appliance

Which of the following would BEST be described as password best practices? (Select THREE).
A. Use of long passwords
B. Sharing passwords with a trusted source
C. Limiting password reuse
D. Keeping default passwords
E. Use of special characters
F. Writing

A, C and E

Which of the following is MOST likely required during installation in order to legally install
software?
A. Automatic updates
B. Service level agreement
C. License key
D. Antivirus software

C. License key

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which
of the following operating system types is required?
A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit

D. 64-bit

Which of the following BEST describes the pros and cons of a home wired network?
A. Low throughput, low mobility, high availability, high latency, high security
B. High throughput, high mobility, low availability, low latency, high security
C. High throug

C. High throughput, low mobility, high availability, low latency, high security

Joe, a user, wishes to allow his roommate to access his personal computer for Internet
browsing, but does not want his roommate to have the ability to make changes to the
system. Which of the following BEST describes the type of account Joe should create

B. Guest

A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?
A. Malware
B. Social engineering
C. Spam
D. Physical security

B. Social engineering

Where can a user find the latest updates, upgrades, or firmware for an electronic device
that the vendor supports?
A. Internet search engine
B. Internet forum
C. Technical community groups
D. OEM website

D. OEM website

A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the users browser?
A. HTTP
B. HTTPS
C. SFTP
D. FTP

B. HTTPS

When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO).
A. IP address
B. User's password
C. Computer's name
D. Subnet mask
E. HTTP port
F. Fax number

A and D

Which of the following is a reason that a user might upgrade a video card driver? (Select
TWO).
A. To decrease the screen resolution
B. To access monitor standby mode
C. To fix an error message
D. To use additional features
E. To adjust the brightness/con

C and D

Before purchasing a new video card for a PC, which of the following should be checked to
ensure there will be enough electricity for the video card to function properly?
A. GPU
B. CPU
C. GUI
D. PSU

D. PSU

A laptop owner, Ann, can no longer see web pages when she opens her browser, and she
can only see her search bars and plug-ins. Which of the following is the MOST likely
source of this issue?
A. The computer does not have current antivirus software instal

C. The downloaded toolbars are filling the browser screen

Which of the following are considered input devices for a computer? (Select TWO).
A. Mouse
B. Printer
C. Speakers
D. Microphone
E. Monitor

A and D

While browsing the Internet, a user receives a warning regarding the display of mixed
content. The address bar includes https, and the lock symbol is showing. Which of the
following does this warning indicate about the website?
A. It stores data in cache

C. It contains both secure and non-secure parts.

By default, which of the following types of operating systems can automatically detect a
users location while the user is traveling in a bus?
A. Server
B. Desktop workstation
C. Virtual server
D. Mobile

D. Mobile

A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the
following BEST describes this situation?
A. Dumpster diving
B. Shoulder surfing
C.

B. Shoulder surfing

Which of the following is the function of a CPU?
A. Encrypts data for remote transmission
B. Performs data computation
C. Supplies electricity to components
D. Provides storage location for files

B. Performs data computation

A technician is setting up a computer that was shipped. After everything is plugged in, the
computer will not turn on. Which of the following should the technician do FIRST to identify
the issue?
A. Check for physical damage on the computer.
B. Search for

D. Ensure the power supply is set at the correct voltage.

A user installing a printer can connect it to which of the following ports? (Select FOUR).
A. PS/2
B. VGA
C. DVI
D. USB
E. FireWire
F. Serial
G. RJ-11
H. Parallel

D, E, F and H

When operating under optimal network conditions, which of the following has the HIGHEST
reliability?
A. Bluetooth
B. Wired
C. Cellular
D. WiFi

B. Wired

When setting up a new workstation, which of the following should be configured during the
initial OS setup wizard?
A. Additional software
B. Date and time settings
C. Peripheral devices
D. Security software

B. Date and time settings

Question No : 58 - Topic 1
When applying ergonomics to a workstation area, which of the following are the MOST
important to consider? (Select TWO).
A. Proper sitting position
B. Amount of time computer will be used
C. Clarity of the display
D. Proper keyb

A and D

A user has purchased some new software from a vendor and wants to install it on all of the
Windows computers in the house. Which of the following will help the user accomplish the
task and ensure compliance with the software vendor?
A. Copy and paste the

B. Purchase a multi-user license.

An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized
access. Which of the following BEST protects against data theft in this instance?
A. Security software
B. Full disk encryption
C. Cable lock
D. Username and password
E.

B. Full disk encryption

Which of the following printers requires a special type of paper in order to print?
A. Impact
B. Thermal
C. Inkjet
D. Laser

B. Thermal

Which of the following is a common characteristic of open source software?
A. Update cycles are dictated by the manufacturer
B. Modifications to core functionalities are made by the manufacturer
C. Can only run on certain manufacturer processors
D. Can be

D. Can be fully modified by the user

A user, Ann, is experiencing slow browsing on a website she frequently visits that displays
constant pop-up ads. Which of the following is the MOST likely cause?
A. The browser is incompatible with the website
B. The workstation has been infected with mal

B. The workstation has been infected with malware

Which of the following components is required to send faxes via POTS?
A. NIC
B. Power supply
C. Modem
D. Wireless adapter

C. Modem

Which of the following file formats contain other files within them? (Select TWO).
A. tiff
B. dmg
C. png
D. mp3
E. iso
F. flac

B and E

A user working on a laptop notices the mouse cursor frequently moves to random locations in a document while typing. Which of the following should the user do FIRST to help resolve this issue?
A. Ask tech support for help.
B. Reboot the laptop.
C. Turn of

C. Turn off the touchpad.

Which of the following is the BEST reason to backup data?
A. To ensure data encryption
B. To ensure data stability
C. To ensure data security
D. To ensure data availability

D. To ensure data availability

A users operating system is set to automatically update as updates are released.
However, last weeks updates failed to download. Which of the following should the user do
FIRST to install the updates?
A. Reference the OS manufacturer's website.
B. Run a v

E. Manually download the updates.

An employees new computer came with a free 30-day trial version of antivirus software.
The employees company provides enterprise antivirus software from a different vendor.
Which of the following should the employee do in order to use a full version of an

B. Uninstall the current version antivirus software and install the company version.

Which of the following can a user configure on an operating system so that an audible
sound is made when an error message is displayed?
A. Encryption
B. Hot keys
C. Accessibility options
D. Screen captures

C. Accessibility options

A user is setting up an older wireless access point that has only WEP for encryption. Which
of the following additional steps will help to secure the network? (Select TWO).
A. Disable SSID broadcast.
B. Refresh the MAC address.
C. Filter the MAC address.

A and C

Which of the following extensions identifies a video file?
A. .msi
B. .tar
C. .img
D. .mp4

D. .mp4

Which of the following is the BEST example of productivity software?
A. Word processing software
B. Entertainment software
C. Image editing software
D. Anti-malware software

A. Word processing software

A technician has just finished setting up a SOHO wireless router but the client does not
want the PC on the wireless network for security reasons. The technician connects an RJ-
45 cable to the computer and the router, but does not receive network connect

C. Check for link light activity on the computer and the router.

Multiple laptops that contain confidential data are stolen from a company. Which of the
following is a likely policy change resulting from this incident?
A. Enabling full disk encryption
B. Requiring screensaver password
C. Disabling Bluetooth adapters
D.

A. Enabling full disk encryption

A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).
A. Keyboard
B. Speakers
C. Mouse
D. Bluetooth
E. NFC

D and E

Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
A. Hacking
B. Phishing
C. Spam
D. Cracking

B. Phishing

An attacker cracks a user's password for all social media, email, and bank accounts. The
user needs to change the passwords for all these accounts. Which of the following should
the user do in the future to prevent this from happening?
A. Disable unused b

C. Avoid credential reuse.

After installing the OS on a workstation, a technician notices that everything is displayed in
large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?
A. Color depth
B. Orientation
C.

D. Resolution

Joe, a user, needs to store a large amount of data, but does not have enough space on his
local computer. Which of the following are the BEST options for him to use? (Select TWO).
A. Network attached storage
B. External hard drive
C. Optical drive
D. USB

A and B

Which of the following could be described as both an input and output device?
A. Flat-screen monitor
B. Multi-function printer
C. Microphone
D. Scanner

B. Multi-function printer

A technician has been tasked with changing the settings for a used SOHO router, but does
not have the administrator password because the previous owner changed it. Which of the following actions will resolve this issue?
A. Click "Forgot password."
B. Use

C. Hold the reset button.

A user learns of an operating system vulnerability that would allow a hacker to access the
computer. The user would like to keep the operating system up to date to prevent such
vulnerabilities from occurring. Which of the following should the user configu

B. Automatic updates

A technician sets up a new computer system and connects the keyboard and mouse to the
PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both
devices are connected. Which of the following is the solution?
A. Swap the mouse and

A. Swap the mouse and keyboard to the other PS/2 ports.

Which of the following is an advantage of using cloud-based collaborative applications and
storage, rather than local applications and storage?
A. Decreased software licensing costs
B. Higher security encryption
C. Limited storage space for files
D. Incre

D. Increased accessibility to files

Which of the following is a requirement to connect a smartphone to a wireless network?
A. SSID
B. SATA
C. SMTP
D. gzip

A. SSID

Which of the following protocols is used to secure communications between sender and
receiver?
A. SIP
B. SNMP
C. SSL
D. SMTP

C. SSL

Which of the following software types allows for the creation of a single file composed of
multiple subfiles, while at the same time reducing the overall size of the combined
elements?
A. Database
B. Document sharing
C. Compression
D. Maintenance

C. Compression

Which of the following are secure network protocols? (Select TWO).
A. IMAP
B. FTPS
C. SMTP
D. HTTPS
E. DNS

B and D

.Which of the following data connections would provide a user the BEST Internet availability while traveling?
A. Workstation with only RJ-45 connectors
B. Smartphone with cellular service
C. Laptop with Bluetooth wireless connectivity
D. Tablet connected

B. Smartphone with cellular service

installed a new scanner on a desktop personal computer without any documentation. The scanner powers on, the lamp turns on, and then the unit stops with a failure light lit. Which of the following should the user do FIRST?
A. Go to the scanner manufacture

A. Go to the scanner manufacturer's website and download the current installation information.

When setting up a new device, there are multiple features available that will never be used.
Which of the following should the user do to make the new device more secure?
A. Make all users administrators.
B. Remove or disable the unnecessary features.
C.

B. Remove or disable the unnecessary features.

Which of the following is a safety feature of cloud-based backups?
A. Incremental copy of data
B. Local copy of data
C. Offsite storage of data
D. Full backup of PC data

C. Offsite storage of data

Joe, a user, has just installed his first home wireless router. Which of the following tasks
should be considered to help secure the unit from any confirmed exploits?
A. Change the router administrator username.
B. Change the router's broadcasting channel

C. Update the unit's firmware.

Which of the following is required to have a multimedia conversation with someone across
the Internet? (Select THREE).
A. Network connection
B. Microphone
C. Modem
D. Firewall
E. Webcam
F. Cable connection
G. Wired NIC

A, B and E

Joe, a user, saves a document to a flash drive on his computer in order to print the
document from a public computer kiosk. After returning home and reinserting the flash
drive in his computer, the security software identifies an infected file on the flas

C. The public workstation was infected and passed the virus to the flash drive.

A home computer that has been in operation for more than five years is now suffering from
random shutdowns during the day. The PC is set up in an enclosed cubby built into the
home office desk. Which of the following is MOST likely plaguing the PC?
A. The

B. Dust accumulation

Which of the following has the lowest latency?
A. SSD
B. NAS
C. Blu-Ray
D. DVD

A. SSD

Which of the following is the BEST security practice to use when configuring the
management options of a wireless router?
A. Disable DHCP
B. Change the admin password
C. Enable SSID
D. Enable remote administration

B. Change the admin password

technician wants to minimize the risk of having third parties track previously visited web
pages. Which of the following should be performed in the Internet browsers settings?
(Select TWO).
A. Select form data
B. Disable location services
C. Remove cookie

C and D

A. To ensure that the backup runs as quickly as possible
B. To ensure that the backup can be stored indefinitely
C. To ensure that the backup can be saved to the cloud
D. To ensure that the backup contains usable data

D. To ensure that the backup contains usable data

A. Only browse the Internet on WiFi connections that use WPA2
B. Turn off the guest account in the operating system
C. Disable autofill functionality within the web browser
D. Remove any legacy browsers from the computer

C. Disable autofill functionality within the web browser

Which of the following permissions is required to run a .bat file?
A. Delete
B. Execute
C. Write
D. Modify

B. Execute

Which of the following security threats is classified as license theft?
A. Entering the neighbor's software key
B. Using software to reveal a password
C. Searching through the trash for passwords
D. Watching what a user types on screen

A. Entering the neighbor's software key

Which of the following allows for hands-free operation of a wireless device?
A. Encryption
B. Wireless password
C. Bluetooth pairing
D. Internet connectivity

C. Bluetooth pairing

A user wants to have the latest security patches and bug fixes installed on a computer.
Which of the following is the BEST method to achieve this?
A. Configure anti-malware updates
B. Manually update before each use
C. Update every six months
D. Schedule

D. Schedule automatic updates

A technician has added an external hard drive to a personal computer. The hard drive is
powered on, but the computer does not see the new hard disk. Which of the following is the
FIRST thing the technician should check?
A. The power cable
B. The OS versio

D. The data cable

A user, Joe, is concerned about the safety of his personal information on a website. Which
of the following can Joe look for to ensure that his personal information is not at risk?
(Select TWO).
A. HTTP on the browser address bar
B. Suspicious ads in the

C and D

Which of the following CPU cooling types is BEST in a dusty environment?
A. Liquid cooling
B. Open case
C. Case fan
D. Heat sink fan

A. Liquid cooling

A home user wants to share files between two different computers. The user wants the files
to be available to either computer, regardless of whether either computer is turned on.
Which of the following is the BEST storage method?
A. USB storage
B. Interna

D. Network attached storage

...

...

Which of the following is used for temporary storage of program data that is cleared when the computer is turned off?
A. CPU
?B. SSD
?C. Hard drive
D. System memory

D. System memory

Which of the following methods of patching allows for vendor controlled updates, reduced user interaction, and increased security of the operating system or application?
A. Upgrading on a periodic basis
?B. Frequent patching
?C. Automatic updates
D. Patch

?C. Automatic updates

Which of the following security threats would the use of cable locks reduce?
A. Shoulder surfing
?B. Phishing
?C. Hardware theft
D. Dumpster diving

C. Hardware theft

Which of the following is a reason why password complexity is a best practice?
A. It makes passwords harder to crack.
?B. It encourages users to write down passwords so they are not forgotten.
?C. It forces users to develop typing skills.
?D. It discourag

A. It makes passwords harder to crack

A user receives an email containing a link. When they hover the mouse over the link, the actual URL does not match the text in the body of the email and appears to be a string of random characters. Which of the following is the BEST course of action?
A. F

?C. Delete the email without clicking on the link.

Which of the following components serves as temporary storage for computer operations?
A. System board
?B. Central processing unit
?C. Random access memory
D. Expansion card

C. Random access memory

The extension .rtf is an example of which of the following file types?
A. Document
B. Executable
?C. Audio
?D. Speadsheet

A. Document

Which of the following is a common way to prevent physical theft of a laptop or workstation?
?A. Shred any sensitive information to prior to disposal.
?B. Avoid storing passwords near the computer.
?C. Practice good awareness skills when entering password

?D. Cable and lock device securely attached to a solid object.

After installing a new software application, a user notices that the application launches in demo mode. Which of the following needs to be done to fully activate the software package?
?A. Enter a product or license key.
?B. Contact the vendor support.
?C.

?A. Enter a product or license key.

A user's laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user's laptop. How could the user have prevented this breach?
?A. Disable fil

A. Disable file and print sharing on the laptop.

A user's government identification number, birth date, and current address are considered which of the following?
?A. IMAP
?B. HTTP
?C. PII
?D. HTTPS

?C. PII

Which of the following is the function of a CPU?
?A. Encrypts data for remote transmission
?B. Performs data computation
?C. Supplies electricity to components
?D. Provides storage location for files

?B. Performs data computation

When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?
?A. Social engineering
?B. Phishing
?C. Virus attack
?D. License theft

?D. License theft

A user is configuring a SOHO wireless router. The user should change the router's default administrator password for which of the following reasons?
?A. To prevent improper data transmission encryption
?B. To prevent unauthorized configuration changes
?C.

?B. To prevent unauthorized configuration changes

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?
?A. 8-bit
?B. 16-bit
?C. 32-bit
?D. ?64-bit

?D. ?64-bit

Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?
?A. Large USB flash drive connected to a PC
?B. Medium capacity SATA hard drive
?C. Network attached storage appliance

?C. Network attached storage appliance

Which of the following is the component responsible for interconnectivity of internal system devices?
?A. System case
?B. Power supply
?C. Motherboard
?D. Expansion card

?C. Motherboard

Which of the following software types protects a desktop from malicious attacks?
?A. Backup
?B. Antivirus
?C. Diagnostic
?D. Screensaver

?B. Antivirus

Which of the following is MOST important to ensure a computer temperature is maintained within normal limits?
?A. Maintaining constant power output
?B. Ensuring sufficient airflow
?C. Keeping the case open
?D. Turning the wireless off when not needed

?B. Ensuring sufficient airflow

An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?
?A. LTE
?B. GSM
?C. VoIP
?D. CDMA

C. VoIP

Which of the following file types is used to consolidate a group of files?
?A. .rtf
?B. .m3u
?C. .avi
?D. .rar

?D. .rar

Which of the following permissions is required to run a .bat file?
?A. Delete
?B. Execute
?C. Write
?D. Modify

?B. Execute

After installing the OS on a workstation, a technician notices that everything is displayed in large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?
?A. Color depth
?B. Orientation

?D. Resolution

Which of the following connector types can be used by both mice and keyboards? (Select TWO).
?A. Thunderbolt
?B. eSATA
?C. USB
?D. PS/2
?E. FireWire

C. USB & D. PS/2

Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?
?A. Micro SD card
?B. Bluetooth
?C. USB connection
?D. Infrared

?B. Bluetooth

An end-user has 16GB of RAM installed on a computer system. Which of the following describes why the OS only uses a maximum of 4GB of RAM?
?A. The operating system is 16-bit.
?B. The computer has corrupted RAM.
?C. The computer has a defective motherboard

D. The operating system is 32-bit.

A technician just installed a new computer. Which of the following is the BEST way to manage the cables?
?A. Line the cables up neatly and wrap them together with cable ties.
?B. Leave the cables loose to prevent interference between wires.
?C. Nail the c

?A. Line the cables up neatly and wrap them together with cable ties.

A user wants to run a major update on a laptop. Which of the following should be considered before running any major updates?
?A. Restore folders from back up
?B. Change administrator account password
?C. Back up important folders
?D. Print all personal d

?C. Back up important folders

Which of the following allows for the FASTEST printer connections?
?A. Bluetooth
?B. USB
?C. Parallel
?D. Serial

B. USB

A user needs to establish an initial password for an email account. Which of the following is the BEST example of a complex password?
?A. 01#iWant!2686612338
?B. iWantobeaCosmonau#
?C. 01c234n56789v9876x21
?D. 012iWanttobe210

?A. 01#iWant!2686612338

Question 32
Which of the following is an advantage of using a 64-bit operating system?
?A. Ability to recognize an SSD
?B. Ability to obtain an IPv6 address3
?C. Ability to utilize a larger amount of RAM
?D. Ability to add two or more hard drives

C. Ability to utilize a larger amount of RAM

A user has finished browsing the Internet on a public hotel workstation. Which of the following steps should be taken to BEST secure PII?
?A. Log out of the guest account and reboot
?B. Update the browsers, extensions and plugins
?C. Run a virus scan on t

D. Clear the browser cache, cookies and history

Which of the following is a file on a computer that links to another program or file
somewhere else on the same computer?
A. Shortcut
B. URL
C. Attachment
D. FTP

A. Shortcut

Which of the following operating systems is MOST likely to be found on a desktop where its
primary functions include professional video and audio editing?
A. Chrome OS
B. Windows 7 Home
C. Mac OS X
D. iOS

C. Mac OS X

A technician is trying to access a users files and is unable to open any folder or file. Which
of the following BEST describes the situation?
A. The folders contain older versions of the files.
B. The files are corrupted.
C. The technician needs to change

D. The technician does not have permissions.

A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select TWO).
A. Use only public computers to

B and C

Which of the following components provides the FASTEST medium for hosting and storing
an operating system?
A. Blu-Ray disc
B. 7200RPM HDD
C. SSD
D. DVD-RW

C. SSD

An RoHS label on hardware indicates which of the following?
A. The hardware produces EMI when used.
B. The hardware is certified to be energy efficient.
C. The hardware provides battery backup for power outages.
D. The hardware needs to be properly dispos

D. The hardware needs to be properly disposed.

After initial OS and application installation on a laptop, an application warns that it will only
work 24 more times. Which of the following should be done NEXT?
A. The application has to be registered to the user.
B. The application must be upgraded to a

C. The application must be activated.

Which of the following settings will a user configure as part of the initial operating system
setup wizard? (Select TWO).
A. Backup schedule
B. Accessibility options
C. Multiple user accounts
D. Time zone
E. Computer name

D and E

Which of the following should be performed after a backup has been completed?
A. Delete the backup
B. Verify the backup
C. Save the backup
D. Schedule the backup

B. Verify the backup

Which of the following connections provide data with the MOST secure protection from
interception?
A. Wired
B. WiFi
C. IR
D. Cellular

A. Wired

A technician is configuring a wireless router for a small office and the business owner
would like the wireless network to be secured using the strongest encryption possible.
Which of the following should the technician choose?
A. WPA2
B. WAP
C. WPA
D. WE

A. WPA2

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and
should be shared cautiously and only with trusted resources?
A. Email address
B. Phone number
C. Mother's maiden name
D. Last name

C. Mother's maiden name

Which of the following operating systems is available for free and can be modified by
anyone?
A. Windows
B. Linux
C. Mac OS
D. Chrome OS

B. Linux

A user is browsing the Internet when suddenly a threatening message appears on screen
demanding a payment in order to avoid the system being disabled. Which of the following
BEST describes this type of malware infection?
A. Ransomware
B. Adware
C. Spyware

A. Ransomware

Which of the following features of a smartphone controls the screen orientation?
A. Gyroscope
B. NFC
C. Accelerometer
D. GPS

A. Gyroscope

Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?
A. Thermal
B. Laser
C. Dot matrix
D. Inkjet

B. Laser

Which of the following components are used to store data? (Select TWO).
A. Motherboard
B. RAM
C. CPU
D. GPU
E. SSD

B and E

A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?
A. iOS
B. Windows
C. Mac OS
D. Chrome OS

C. Mac OS

Which of the following operating systems is very lightweight and relies heavily on Internet
applications?
A. Chrome OS
B. Windows
C. Linux
D. Blackberry OS

A. Chrome OS

Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an
Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar
website. She clears all temporary files and deletes the history, but this con

B. Her computer is infected with adware and is redirecting her browser to another site.

Ann, a user, wishes to free space in her documents folder. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files?
A. Date modified
B. File path
C. Size
D. Extensi

C. Size

A user has finished setting up a new computer. Now the operating system requires activation, but the user discovers the computer has no Internet connection. Which of the following should the user do FIRST?
A. Contact technical support.
B. Reboot the compu

C. Check the Ethernet cable.

Which of the following will allow a user to move a file from one folder to another using the LEAST number of steps, while ensuring that the file is removed from its original location?
A. Open the file from its original location, save it to the new locatio

B. Cut the file from its original location and paste it to the new location.

Which of the following software package types is designed to accept input from multiple
users?
A. Utility
B. Operating system
C. Specialized
D. Collaborative

D. Collaborative

Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?
A. The monitor power ca

B. The video cable has become disconnected.

Which of the following are examples of keyboard connectors? (Select TWO).
A. USB
B. RJ-11
C. Serial
D. FireWire
E. PS/2

A and E

A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard.
The user can install the games by performing which of the following?
A.

B. Enable installed OS features.

A user is at the office and has a cellular phone that previously functioned properly. The
phone is powered on with a fully charged battery. However, the phone does not have
connectivity. Which of the following describes the problem?
A. Phone is disconnect

D. Phone is in airplane mode

Which of the following alternative technologies allows a computer to run multiple operating
systems without partitioning the hard drive?
A. Web applications
B. Dual boot
C. Telepresence
D. Virtualization

D. Virtualization

Which of the following is a 15-pin video connection?
A. DVI
B. S-video
C. Component
D. HDMI
E. VGA

E. VGA

Which of the following is considered an optical storage medium?
A. SSD
B. Blu-Ray
C. Flash drive
D. Memory card

B. Blu-Ray

Which of the following are best practices when it comes to using a computer in a public
location? (Select TWO).
A. Notify the administrator when finished.
B. Use strong passwords.
C. Turn off the computer when finished.
D. Disable the save password functi

D and F

Which of the following is a feature of a basic power strip?
A. Protects against lightning strikes
B. Provides multiple outlets for power
C. Generates power for devices
D. Provides battery backup for devices

C. Generates power for devices

Which of the following connectors consists of three separate plugs for video?
A. Display port
B. S-video
C. Thunderbolt
D. Component

D. Component

Which of the following technologies allows people to communicate all over the world
inexpensively?
A. Virtualization
B. SSID
C. Kinetics
D. VoIP

D. VoIP

Several users want to share a common folder with high availability. Which of the following
devices is BEST to use for this requirement?
A. Large USB flash drive connected to a PC
B. Medium capacity SATA hard drive
C. Network attached storage appliance
D.

C. Network attached storage appliance

Which of the following would BEST be described as password best practices? (Select THREE).
A. Use of long passwords
B. Sharing passwords with a trusted source
C. Limiting password reuse
D. Keeping default passwords
E. Use of special characters
F. Writing

A, C and E

Which of the following is MOST likely required during installation in order to legally install
software?
A. Automatic updates
B. Service level agreement
C. License key
D. Antivirus software

C. License key

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which
of the following operating system types is required?
A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit

D. 64-bit

Which of the following BEST describes the pros and cons of a home wired network?
A. Low throughput, low mobility, high availability, high latency, high security
B. High throughput, high mobility, low availability, low latency, high security
C. High throug

C. High throughput, low mobility, high availability, low latency, high security

Joe, a user, wishes to allow his roommate to access his personal computer for Internet
browsing, but does not want his roommate to have the ability to make changes to the
system. Which of the following BEST describes the type of account Joe should create

B. Guest

A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?
A. Malware
B. Social engineering
C. Spam
D. Physical security

B. Social engineering

Where can a user find the latest updates, upgrades, or firmware for an electronic device
that the vendor supports?
A. Internet search engine
B. Internet forum
C. Technical community groups
D. OEM website

D. OEM website

A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the users browser?
A. HTTP
B. HTTPS
C. SFTP
D. FTP

B. HTTPS

When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO).
A. IP address
B. User's password
C. Computer's name
D. Subnet mask
E. HTTP port
F. Fax number

A and D

Which of the following is a reason that a user might upgrade a video card driver? (Select
TWO).
A. To decrease the screen resolution
B. To access monitor standby mode
C. To fix an error message
D. To use additional features
E. To adjust the brightness/con

C and D

Before purchasing a new video card for a PC, which of the following should be checked to
ensure there will be enough electricity for the video card to function properly?
A. GPU
B. CPU
C. GUI
D. PSU

D. PSU

A laptop owner, Ann, can no longer see web pages when she opens her browser, and she
can only see her search bars and plug-ins. Which of the following is the MOST likely
source of this issue?
A. The computer does not have current antivirus software instal

C. The downloaded toolbars are filling the browser screen

Which of the following are considered input devices for a computer? (Select TWO).
A. Mouse
B. Printer
C. Speakers
D. Microphone
E. Monitor

A and D

While browsing the Internet, a user receives a warning regarding the display of mixed
content. The address bar includes https, and the lock symbol is showing. Which of the
following does this warning indicate about the website?
A. It stores data in cache

C. It contains both secure and non-secure parts.

By default, which of the following types of operating systems can automatically detect a
users location while the user is traveling in a bus?
A. Server
B. Desktop workstation
C. Virtual server
D. Mobile

D. Mobile

A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the
following BEST describes this situation?
A. Dumpster diving
B. Shoulder surfing
C.

B. Shoulder surfing

Which of the following is the function of a CPU?
A. Encrypts data for remote transmission
B. Performs data computation
C. Supplies electricity to components
D. Provides storage location for files

B. Performs data computation

A technician is setting up a computer that was shipped. After everything is plugged in, the
computer will not turn on. Which of the following should the technician do FIRST to identify
the issue?
A. Check for physical damage on the computer.
B. Search for

D. Ensure the power supply is set at the correct voltage.

A user installing a printer can connect it to which of the following ports? (Select FOUR).
A. PS/2
B. VGA
C. DVI
D. USB
E. FireWire
F. Serial
G. RJ-11
H. Parallel

D, E, F and H

When operating under optimal network conditions, which of the following has the HIGHEST
reliability?
A. Bluetooth
B. Wired
C. Cellular
D. WiFi

B. Wired

When setting up a new workstation, which of the following should be configured during the
initial OS setup wizard?
A. Additional software
B. Date and time settings
C. Peripheral devices
D. Security software

B. Date and time settings

Question No : 58 - Topic 1
When applying ergonomics to a workstation area, which of the following are the MOST
important to consider? (Select TWO).
A. Proper sitting position
B. Amount of time computer will be used
C. Clarity of the display
D. Proper keyb

A and D

A user has purchased some new software from a vendor and wants to install it on all of the
Windows computers in the house. Which of the following will help the user accomplish the
task and ensure compliance with the software vendor?
A. Copy and paste the

B. Purchase a multi-user license.

An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized
access. Which of the following BEST protects against data theft in this instance?
A. Security software
B. Full disk encryption
C. Cable lock
D. Username and password
E.

B. Full disk encryption

Which of the following printers requires a special type of paper in order to print?
A. Impact
B. Thermal
C. Inkjet
D. Laser

B. Thermal

Which of the following is a common characteristic of open source software?
A. Update cycles are dictated by the manufacturer
B. Modifications to core functionalities are made by the manufacturer
C. Can only run on certain manufacturer processors
D. Can be

D. Can be fully modified by the user

A user, Ann, is experiencing slow browsing on a website she frequently visits that displays
constant pop-up ads. Which of the following is the MOST likely cause?
A. The browser is incompatible with the website
B. The workstation has been infected with mal

B. The workstation has been infected with malware

Which of the following components is required to send faxes via POTS?
A. NIC
B. Power supply
C. Modem
D. Wireless adapter

C. Modem

Which of the following file formats contain other files within them? (Select TWO).
A. tiff
B. dmg
C. png
D. mp3
E. iso
F. flac

B and E

A user working on a laptop notices the mouse cursor frequently moves to random locations in a document while typing. Which of the following should the user do FIRST to help resolve this issue?
A. Ask tech support for help.
B. Reboot the laptop.
C. Turn of

C. Turn off the touchpad.

Which of the following is the BEST reason to backup data?
A. To ensure data encryption
B. To ensure data stability
C. To ensure data security
D. To ensure data availability

D. To ensure data availability

A users operating system is set to automatically update as updates are released.
However, last weeks updates failed to download. Which of the following should the user do
FIRST to install the updates?
A. Reference the OS manufacturer's website.
B. Run a v

E. Manually download the updates.

An employees new computer came with a free 30-day trial version of antivirus software.
The employees company provides enterprise antivirus software from a different vendor.
Which of the following should the employee do in order to use a full version of an

B. Uninstall the current version antivirus software and install the company version.

Which of the following can a user configure on an operating system so that an audible
sound is made when an error message is displayed?
A. Encryption
B. Hot keys
C. Accessibility options
D. Screen captures

C. Accessibility options

A user is setting up an older wireless access point that has only WEP for encryption. Which
of the following additional steps will help to secure the network? (Select TWO).
A. Disable SSID broadcast.
B. Refresh the MAC address.
C. Filter the MAC address.

A and C

Which of the following extensions identifies a video file?
A. .msi
B. .tar
C. .img
D. .mp4

D. .mp4

Which of the following is the BEST example of productivity software?
A. Word processing software
B. Entertainment software
C. Image editing software
D. Anti-malware software

A. Word processing software

A technician has just finished setting up a SOHO wireless router but the client does not
want the PC on the wireless network for security reasons. The technician connects an RJ-
45 cable to the computer and the router, but does not receive network connect

C. Check for link light activity on the computer and the router.

Multiple laptops that contain confidential data are stolen from a company. Which of the
following is a likely policy change resulting from this incident?
A. Enabling full disk encryption
B. Requiring screensaver password
C. Disabling Bluetooth adapters
D.

A. Enabling full disk encryption

A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).
A. Keyboard
B. Speakers
C. Mouse
D. Bluetooth
E. NFC

D and E

Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
A. Hacking
B. Phishing
C. Spam
D. Cracking

B. Phishing

An attacker cracks a user's password for all social media, email, and bank accounts. The
user needs to change the passwords for all these accounts. Which of the following should
the user do in the future to prevent this from happening?
A. Disable unused b

C. Avoid credential reuse.

After installing the OS on a workstation, a technician notices that everything is displayed in
large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?
A. Color depth
B. Orientation
C.

D. Resolution

Joe, a user, needs to store a large amount of data, but does not have enough space on his
local computer. Which of the following are the BEST options for him to use? (Select TWO).
A. Network attached storage
B. External hard drive
C. Optical drive
D. USB

A and B

Which of the following could be described as both an input and output device?
A. Flat-screen monitor
B. Multi-function printer
C. Microphone
D. Scanner

B. Multi-function printer

A technician has been tasked with changing the settings for a used SOHO router, but does
not have the administrator password because the previous owner changed it. Which of the following actions will resolve this issue?
A. Click "Forgot password."
B. Use

C. Hold the reset button.

A user learns of an operating system vulnerability that would allow a hacker to access the
computer. The user would like to keep the operating system up to date to prevent such
vulnerabilities from occurring. Which of the following should the user configu

B. Automatic updates

A technician sets up a new computer system and connects the keyboard and mouse to the
PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both
devices are connected. Which of the following is the solution?
A. Swap the mouse and

A. Swap the mouse and keyboard to the other PS/2 ports.

Which of the following is an advantage of using cloud-based collaborative applications and
storage, rather than local applications and storage?
A. Decreased software licensing costs
B. Higher security encryption
C. Limited storage space for files
D. Incre

D. Increased accessibility to files

Which of the following is a requirement to connect a smartphone to a wireless network?
A. SSID
B. SATA
C. SMTP
D. gzip

A. SSID

Which of the following protocols is used to secure communications between sender and
receiver?
A. SIP
B. SNMP
C. SSL
D. SMTP

C. SSL

Which of the following software types allows for the creation of a single file composed of
multiple subfiles, while at the same time reducing the overall size of the combined
elements?
A. Database
B. Document sharing
C. Compression
D. Maintenance

C. Compression

Which of the following are secure network protocols? (Select TWO).
A. IMAP
B. FTPS
C. SMTP
D. HTTPS
E. DNS

B and D

.Which of the following data connections would provide a user the BEST Internet availability while traveling?
A. Workstation with only RJ-45 connectors
B. Smartphone with cellular service
C. Laptop with Bluetooth wireless connectivity
D. Tablet connected

B. Smartphone with cellular service

installed a new scanner on a desktop personal computer without any documentation. The scanner powers on, the lamp turns on, and then the unit stops with a failure light lit. Which of the following should the user do FIRST?
A. Go to the scanner manufacture

A. Go to the scanner manufacturer's website and download the current installation information.

When setting up a new device, there are multiple features available that will never be used.
Which of the following should the user do to make the new device more secure?
A. Make all users administrators.
B. Remove or disable the unnecessary features.
C.

B. Remove or disable the unnecessary features.

Which of the following is a safety feature of cloud-based backups?
A. Incremental copy of data
B. Local copy of data
C. Offsite storage of data
D. Full backup of PC data

C. Offsite storage of data

Joe, a user, has just installed his first home wireless router. Which of the following tasks
should be considered to help secure the unit from any confirmed exploits?
A. Change the router administrator username.
B. Change the router's broadcasting channel

C. Update the unit's firmware.

Which of the following is required to have a multimedia conversation with someone across
the Internet? (Select THREE).
A. Network connection
B. Microphone
C. Modem
D. Firewall
E. Webcam
F. Cable connection
G. Wired NIC

A, B and E

Joe, a user, saves a document to a flash drive on his computer in order to print the
document from a public computer kiosk. After returning home and reinserting the flash
drive in his computer, the security software identifies an infected file on the flas

C. The public workstation was infected and passed the virus to the flash drive.

A home computer that has been in operation for more than five years is now suffering from
random shutdowns during the day. The PC is set up in an enclosed cubby built into the
home office desk. Which of the following is MOST likely plaguing the PC?
A. The

B. Dust accumulation

Which of the following has the lowest latency?
A. SSD
B. NAS
C. Blu-Ray
D. DVD

A. SSD

Which of the following is the BEST security practice to use when configuring the
management options of a wireless router?
A. Disable DHCP
B. Change the admin password
C. Enable SSID
D. Enable remote administration

B. Change the admin password

technician wants to minimize the risk of having third parties track previously visited web
pages. Which of the following should be performed in the Internet browsers settings?
(Select TWO).
A. Select form data
B. Disable location services
C. Remove cookie

C and D

A. To ensure that the backup runs as quickly as possible
B. To ensure that the backup can be stored indefinitely
C. To ensure that the backup can be saved to the cloud
D. To ensure that the backup contains usable data

D. To ensure that the backup contains usable data

A. Only browse the Internet on WiFi connections that use WPA2
B. Turn off the guest account in the operating system
C. Disable autofill functionality within the web browser
D. Remove any legacy browsers from the computer

C. Disable autofill functionality within the web browser

Which of the following permissions is required to run a .bat file?
A. Delete
B. Execute
C. Write
D. Modify

B. Execute

Which of the following security threats is classified as license theft?
A. Entering the neighbor's software key
B. Using software to reveal a password
C. Searching through the trash for passwords
D. Watching what a user types on screen

A. Entering the neighbor's software key

Which of the following allows for hands-free operation of a wireless device?
A. Encryption
B. Wireless password
C. Bluetooth pairing
D. Internet connectivity

C. Bluetooth pairing

A user wants to have the latest security patches and bug fixes installed on a computer.
Which of the following is the BEST method to achieve this?
A. Configure anti-malware updates
B. Manually update before each use
C. Update every six months
D. Schedule

D. Schedule automatic updates

A technician has added an external hard drive to a personal computer. The hard drive is
powered on, but the computer does not see the new hard disk. Which of the following is the
FIRST thing the technician should check?
A. The power cable
B. The OS versio

D. The data cable

A user, Joe, is concerned about the safety of his personal information on a website. Which
of the following can Joe look for to ensure that his personal information is not at risk?
(Select TWO).
A. HTTP on the browser address bar
B. Suspicious ads in the

C and D

Which of the following CPU cooling types is BEST in a dusty environment?
A. Liquid cooling
B. Open case
C. Case fan
D. Heat sink fan

A. Liquid cooling

A home user wants to share files between two different computers. The user wants the files
to be available to either computer, regardless of whether either computer is turned on.
Which of the following is the BEST storage method?
A. USB storage
B. Interna

D. Network attached storage

...

...