Exam 9: CompTIA IT Fundamentals

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is the BEST example of productivity software?

A) Word processing software
B) Entertainment software
C) Image editing software
D) Anti-malware software
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?

A) 8-bit
B) 16-bit
C) 32-bit
D) 64-bit
سؤال
Which of the following file formats contain other files within them? (Select TWO).

A) tiff
B) dmg
C) png
D) mp3
E) iso
F) flac
سؤال
Which of the following is performed during WiFi setup on a mobile device?

A) Configuring bluetooth pairing settings
B) Configuring email settings
C) Configuring screen lock settings
D) Configuring SSID settings
سؤال
Which of the following software types allows for the creation of a single file composed of multiple subfiles, while at the same time reducing the overall size of the combined elements?

A) Database
B) Document sharing
C) Compression
D) Maintenance
سؤال
Which of the following alternative technologies allows a computer to run multiple operating systems without partitioning the hard drive?

A) Web applications
B) Dual boot
C) Telepresence
D) Virtualization
سؤال
Which of the following operating systems is available for free and can be modified by anyone?

A) Windows
B) Linux
C) Mac OS
D) Chrome OS
سؤال
Which of the following operating systems is very lightweight and relies heavily on Internet applications?

A) Chrome OS
B) Windows
C) Linux
D) Blackberry OS
سؤال
Which of the following is a requirement to connect a smartphone to a wireless network?

A) SSID
B) SATA
C) SMTP
D) gzip
سؤال
Which of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?

A) Chrome OS
B) Windows 7 Home
C) Mac OS X
D) iOS
سؤال
Which of the following is a reason that a user might upgrade a video card driver? (Select TWO).

A) To decrease the screen resolution
B) To access monitor standby mode
C) To fix an error message
D) To use additional features
E) To adjust the brightness/contrast
سؤال
Which of the following is MOST likely required during installation in order to legally install software?

A) Automatic updates
B) Service level agreement
C) License key
D) Antivirus software
سؤال
A user is at the office and has a cellular phone that previously functioned properly. The phone is powered on with a fully charged battery. However, the phone does not have connectivity. Which of the following describes the problem?

A) Phone is disconnected from WiFi
B) Provider is conducting system testing
C) MAC address is bad
D) Phone is in airplane mode
سؤال
Which of the following technologies allows people to communicate all over the world inexpensively?

A) Virtualization
B) SSID
C) Kinetics
D) VoIP
سؤال
Which of the following software package types is designed to accept input from multiple users?

A) Utility
B) Operating system
C) Specialized
D) Collaborative
سؤال
Which of the following is a common characteristic of open source software?

A) Update cycles are dictated by the manufacturer
B) Modifications to core functionalities are made by the manufacturer
C) Can only run on certain manufacturer processors
D) Can be fully modified by the user
سؤال
A user has purchased some new software from a vendor and wants to install it on all of the Windows computers in the house. Which of the following will help the user accomplish the task and ensure compliance with the software vendor?

A) Copy and paste the program between computers.
B) Purchase a multi-user license.
C) Purchase a single-user license.
D) Use remote desktop to share the program between computers.
سؤال
A user learns of an operating system vulnerability that would allow a hacker to access the computer. The user would like to keep the operating system up to date to prevent such vulnerabilities from occurring. Which of the following should the user configure?

A) Additional OS features
B) Automatic updates
C) Software firewall
D) Anti-malware software
سؤال
When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

A) Social engineering
B) Phishing
C) Virus attack
D) License theft
سؤال
Which of the following extensions identifies a video file?

A) .msi
B) .tar
C) .img
D) .mp4
سؤال
Which of the following features of a smartphone controls the screen orientation?

A) Gyroscope
B) NFC
C) Accelerometer
D) GPS
سؤال
A user installing a printer can connect it to which of the following ports? (Select FOUR).

A) PS/2
B) VGA
C) DVI
D) USB
E) FireWire
F) Serial
G) RJ-11
H) Parallel
سؤال
When considering backup media, which of the following holds the MOST data?

A) BD-R
B) DVD-R
C) DVD-DL
D) CD-ROM
سؤال
Which of the following printers requires a special type of paper in order to print?

A) Impact
B) Thermal
C) Inkjet
D) Laser
سؤال
A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?

A) iOS
B) Windows
C) Mac OS
D) Chrome OS
سؤال
Which of the following connectors consists of three separate plugs for video?

A) Display port
B) S-video
C) Thunderbolt
D) Component
سؤال
Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?

A) Thermal
B) Laser
C) Dot matrix
D) Inkjet
سؤال
By default, which of the following types of operating systems can automatically detect a user's location while the user is traveling in a bus?

A) Server
B) Desktop workstation
C) Virtual server
D) Mobile
سؤال
A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard. The user can install the games by performing which of the following?

A) Schedule automatic updates.
B) Enable installed OS features.
C) Update hardware drivers.
D) Reinstall productivity applications.
سؤال
Which of the following components are used to store data? (Select TWO).

A) Motherboard
B) RAM
C) CPU
D) GPU
E) SSD
سؤال
Which of the following has the lowest latency?

A) SSD
B) NAS
C) Blu-Ray
D) DVD
سؤال
A user's operating system is set to automatically update as updates are released. However, last week's updates failed to download. Which of the following should the user do FIRST to install the updates?

A) Reference the OS manufacturer's website.
B) Run a virus scan to remove viruses.
C) Reinstall the operating system.
D) Change the automatic update schedule.
E) Manually download the updates.
سؤال
Which of the following are examples of keyboard connectors? (Select TWO).

A) USB
B) RJ-11
C) Serial
D) FireWire
E) PS/2
سؤال
Which of the following is considered an optical storage medium?

A) SSD
B) Blu-Ray
C) Flash drive
D) Memory card
سؤال
Which of the following allows for the FASTEST printer connections?

A) Bluetooth
B) USB
C) Parallel
D) Serial
سؤال
Which of the following is the function of a CPU?

A) Encrypts data for remote transmission
B) Performs data computation
C) Supplies electricity to components
D) Provides storage location for files
سؤال
Which of the following could be described as both an input and output device?

A) Flat-screen monitor
B) Multi-function printer
C) Microphone
D) Scanner
سؤال
Before purchasing a new video card for a PC, which of the following should be checked to ensure there will be enough electricity for the video card to function properly?

A) GPU
B) CPU
C) GUI
D) PSU
سؤال
Which of the following components provides the FASTEST medium for hosting and storing an operating system?

A) Blu-Ray disc
B) 7200RPM HDD
C) SSD
D) DVD-RW
سؤال
Which of the following computer components are used to store data? (Select TWO).

A) GPU
B) HDD
C) RAM
D) NIC
E) CPU
سؤال
Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?

A) Enabling full disk encryption
B) Requiring screensaver password
C) Disabling Bluetooth adapters
D) Adding multifactor authentication
سؤال
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?

A) The browser is incompatible with the website
B) The workstation has been infected with malware
C) The website is not secured by SSL
D) The certificate of the website has expired
سؤال
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?

A) Email address
B) Phone number
C) Mother's maiden name
D) Last name
سؤال
When setting up a new device, there are multiple features available that will never be used. Which of the following should the user do to make the new device more secure?

A) Make all users administrators.
B) Remove or disable the unnecessary features.
C) Install a password manager on the device.
D) Make all users guests.
سؤال
Joe, a user, saves a document to a flash drive on his computer in order to print the document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive. Which of the following is the MOST likely cause of the infection?

A) The flash drive was infected by a war driving hacker on the way to the public kiosk.
B) The public workstation was infected by Joe's flash drive.
C) The public workstation was infected and passed the virus to the flash drive.
D) The flash drive was already infected by the user's computer.
سؤال
Which of the following are considered input devices for a computer? (Select TWO).

A) Mouse
B) Printer
C) Speakers
D) Microphone
E) Monitor
سؤال
A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following BEST describes this type of malware infection?

A) Ransomware
B) Adware
C) Spyware
D) Virus
سؤال
Which of the following components is required to send faxes via POTS?

A) NIC
B) Power supply
C) Modem
D) Wireless adapter
سؤال
Which of the following is a 15-pin video connection?

A) DVI
B) S-video
C) Component
D) HDMI
E) VGA
سؤال
A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select TWO).

A) Use only public computers to access the website
B) Create a complex password
C) Change the default password
D) Write the password down
E) Use the original password
سؤال
A user receives an email formatted to appear as if the bank sent it. The email explains that the user must confirm the name, address, and social security number listed on the bank account. Which of the following BEST describes the security threat taking place?

A) Shoulder surfing
B) Social engineering
C) Spam
D) Phishing
سؤال
Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?

A) Large USB flash drive connected to a PC
B) Medium capacity SATA hard drive
C) Network attached storage appliance
D) Firewall with security management
سؤال
A technician wants to minimize the risk of having third parties track previously visited web pages. Which of the following should be performed in the Internet browser's settings? (Select TWO).

A) Select form data
B) Disable location services
C) Remove cookies
D) Clear history
E) Change passwords
سؤال
An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access. Which of the following BEST protects against data theft in this instance?

A) Security software
B) Full disk encryption
C) Cable lock
D) Username and password
E) Patching the OS and third party software
سؤال
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue?

A) The computer does not have current antivirus software installed
B) The computer needs to have its components upgraded
C) The downloaded toolbars are filling the browser screen
D) The owner was not using complex passwords
سؤال
A technician sets up a new computer system and connects the keyboard and mouse to the PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution?

A) Swap the mouse and keyboard to the other PS/2 ports.
B) Remap the mouse and keyboard in the BIOS.
C) Update the BIOS to recognize the newer keyboard and mouse.
D) Configure the keyboard localization settings.
سؤال
Which of the following is an example of ransomware?

A) A user is asked to pay a fee for a password to unlock access to their files.
B) A user receives an email demanding payment for a trial application that has stopped working.
C) A user has opened an Internet browser and is taken to a site that is not the normal home page.
D) A user is asked to open an attachment that verifies the price of an item that was not ordered.
سؤال
A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).

A) Keyboard
B) Speakers
C) Mouse
D) Bluetooth
E) NFC
سؤال
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?

A) Only browse the Internet on WiFi connections that use WPA2
B) Turn off the guest account in the operating system
C) Disable autofill functionality within the web browser
D) Remove any legacy browsers from the computer
سؤال
Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).

A) Network connection
B) Microphone
C) Modem
D) Firewall
E) Webcam
F) Cable connection
G) Wired NIC
سؤال
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website. She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem?

A) The company has configured a policy on her computer that forces her to stay on their website.
B) Her computer is infected with adware and is redirecting her browser to another site.
C) The memory of the browser is corrupt, and she needs to have the browser reinstalled.
D) She did not reboot her computer after clearing the temporary files.
سؤال
A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?

A) Change the SSID
B) Change the router's address
C) Change the administrator password
D) Change the encryption key
سؤال
Which of the following is the BEST security practice to use when configuring the management options of a wireless router?

A) Disable DHCP
B) Change the admin password
C) Enable SSID
D) Enable remote administration
سؤال
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?

A) Change the router administrator username.
B) Change the router's broadcasting channel.
C) Update the unit's firmware.
D) Use a complex administrator password.
سؤال
An attacker cracks a user's password for all social media, email, and bank accounts. The user needs to change the passwords for all these accounts. Which of the following should the user do in the future to prevent this from happening?

A) Disable unused browser toolbars.
B) Clear the browser cache.
C) Avoid credential reuse.
D) Delete tracking cookies.
سؤال
Which of the following are secure network protocols? (Select TWO).

A) IMAP
B) FTPS
C) SMTP
D) HTTPS
E) DNS
سؤال
A technician has just finished setting up a SOHO wireless router but the client does not want the PC on the wireless network for security reasons. The technician connects an RJ-45 cable to the computer and the router, but does not receive network connectivity. Which of the following is the NEXT step to diagnose the problem?

A) Change the IP address on the computer to match the router.
B) Reseat the power cable on the computer and reboot.
C) Check for link light activity on the computer and the router.
D) Change the hostname of the router to match the computer's network.
سؤال
A user is configuring a SOHO wireless router. The user should change the router's default administrator password for which of the following reasons?

A) To prevent improper data transmission encryption
B) To prevent unauthorized configuration changes
C) To prevent social engineering attacks
D) To increase wireless signal strength
سؤال
Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?

A) Micro SD card
B) Bluetooth
C) USB connection
D) Infrared
سؤال
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?

A) Hacking
B) Phishing
C) Spam
D) Cracking
سؤال
A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?

A) Dumpster diving
B) Shoulder surfing
C) Phishing
D) Social engineering
سؤال
Which of the following BEST describes the pros and cons of a home wired network?

A) Low throughput, low mobility, high availability, high latency, high security
B) High throughput, high mobility, low availability, low latency, high security
C) High throughput, low mobility, high availability, low latency, high security
D) Low throughput, high mobility, low availability, high latency, low security
سؤال
Which of the following would BEST be described as password best practices? (Select THREE).

A) Use of long passwords
B) Sharing passwords with a trusted source
C) Limiting password reuse
D) Keeping default passwords
E) Use of special characters
F) Writing down difficult passwords
سؤال
While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website?

A) It stores data in cache or cookies, but not both.
B) It requires login credentials for some sections.
C) It contains both secure and non-secure parts.
D) It is best viewed with a different browser.
سؤال
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?

A) Malware
B) Social engineering
C) Spam
D) Physical security
سؤال
Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?

A) Standard
B) Guest
C) Administrator
D) Power user
سؤال
A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the user's browser?

A) HTTP
B) HTTPS
C) SFTP
D) FTP
سؤال
When operating under optimal network conditions, which of the following has the HIGHEST reliability?

A) Bluetooth
B) Wired
C) Cellular
D) WiFi
سؤال
Which of the following are best practices when it comes to using a computer in a public location? (Select TWO).

A) Notify the administrator when finished.
B) Use strong passwords.
C) Turn off the computer when finished.
D) Disable the save password function on web pages.
E) Make sure to clean the keyboard when finished.
F) Make sure to log out of websites when done.
سؤال
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:

A) adware
B) spyware
C) ransomware
D) phishing
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/387
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Exam 9: CompTIA IT Fundamentals
1
Which of the following is the BEST example of productivity software?

A) Word processing software
B) Entertainment software
C) Image editing software
D) Anti-malware software
Word processing software
2
A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?

A) 8-bit
B) 16-bit
C) 32-bit
D) 64-bit
64-bit
3
Which of the following file formats contain other files within them? (Select TWO).

A) tiff
B) dmg
C) png
D) mp3
E) iso
F) flac
dmg
iso
4
Which of the following is performed during WiFi setup on a mobile device?

A) Configuring bluetooth pairing settings
B) Configuring email settings
C) Configuring screen lock settings
D) Configuring SSID settings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following software types allows for the creation of a single file composed of multiple subfiles, while at the same time reducing the overall size of the combined elements?

A) Database
B) Document sharing
C) Compression
D) Maintenance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following alternative technologies allows a computer to run multiple operating systems without partitioning the hard drive?

A) Web applications
B) Dual boot
C) Telepresence
D) Virtualization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following operating systems is available for free and can be modified by anyone?

A) Windows
B) Linux
C) Mac OS
D) Chrome OS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following operating systems is very lightweight and relies heavily on Internet applications?

A) Chrome OS
B) Windows
C) Linux
D) Blackberry OS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is a requirement to connect a smartphone to a wireless network?

A) SSID
B) SATA
C) SMTP
D) gzip
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?

A) Chrome OS
B) Windows 7 Home
C) Mac OS X
D) iOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is a reason that a user might upgrade a video card driver? (Select TWO).

A) To decrease the screen resolution
B) To access monitor standby mode
C) To fix an error message
D) To use additional features
E) To adjust the brightness/contrast
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is MOST likely required during installation in order to legally install software?

A) Automatic updates
B) Service level agreement
C) License key
D) Antivirus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
13
A user is at the office and has a cellular phone that previously functioned properly. The phone is powered on with a fully charged battery. However, the phone does not have connectivity. Which of the following describes the problem?

A) Phone is disconnected from WiFi
B) Provider is conducting system testing
C) MAC address is bad
D) Phone is in airplane mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following technologies allows people to communicate all over the world inexpensively?

A) Virtualization
B) SSID
C) Kinetics
D) VoIP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following software package types is designed to accept input from multiple users?

A) Utility
B) Operating system
C) Specialized
D) Collaborative
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is a common characteristic of open source software?

A) Update cycles are dictated by the manufacturer
B) Modifications to core functionalities are made by the manufacturer
C) Can only run on certain manufacturer processors
D) Can be fully modified by the user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
17
A user has purchased some new software from a vendor and wants to install it on all of the Windows computers in the house. Which of the following will help the user accomplish the task and ensure compliance with the software vendor?

A) Copy and paste the program between computers.
B) Purchase a multi-user license.
C) Purchase a single-user license.
D) Use remote desktop to share the program between computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
18
A user learns of an operating system vulnerability that would allow a hacker to access the computer. The user would like to keep the operating system up to date to prevent such vulnerabilities from occurring. Which of the following should the user configure?

A) Additional OS features
B) Automatic updates
C) Software firewall
D) Anti-malware software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
19
When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

A) Social engineering
B) Phishing
C) Virus attack
D) License theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following extensions identifies a video file?

A) .msi
B) .tar
C) .img
D) .mp4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following features of a smartphone controls the screen orientation?

A) Gyroscope
B) NFC
C) Accelerometer
D) GPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
22
A user installing a printer can connect it to which of the following ports? (Select FOUR).

A) PS/2
B) VGA
C) DVI
D) USB
E) FireWire
F) Serial
G) RJ-11
H) Parallel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
23
When considering backup media, which of the following holds the MOST data?

A) BD-R
B) DVD-R
C) DVD-DL
D) CD-ROM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following printers requires a special type of paper in order to print?

A) Impact
B) Thermal
C) Inkjet
D) Laser
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
25
A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?

A) iOS
B) Windows
C) Mac OS
D) Chrome OS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following connectors consists of three separate plugs for video?

A) Display port
B) S-video
C) Thunderbolt
D) Component
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?

A) Thermal
B) Laser
C) Dot matrix
D) Inkjet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
28
By default, which of the following types of operating systems can automatically detect a user's location while the user is traveling in a bus?

A) Server
B) Desktop workstation
C) Virtual server
D) Mobile
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
29
A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard. The user can install the games by performing which of the following?

A) Schedule automatic updates.
B) Enable installed OS features.
C) Update hardware drivers.
D) Reinstall productivity applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following components are used to store data? (Select TWO).

A) Motherboard
B) RAM
C) CPU
D) GPU
E) SSD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following has the lowest latency?

A) SSD
B) NAS
C) Blu-Ray
D) DVD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
32
A user's operating system is set to automatically update as updates are released. However, last week's updates failed to download. Which of the following should the user do FIRST to install the updates?

A) Reference the OS manufacturer's website.
B) Run a virus scan to remove viruses.
C) Reinstall the operating system.
D) Change the automatic update schedule.
E) Manually download the updates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following are examples of keyboard connectors? (Select TWO).

A) USB
B) RJ-11
C) Serial
D) FireWire
E) PS/2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is considered an optical storage medium?

A) SSD
B) Blu-Ray
C) Flash drive
D) Memory card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following allows for the FASTEST printer connections?

A) Bluetooth
B) USB
C) Parallel
D) Serial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is the function of a CPU?

A) Encrypts data for remote transmission
B) Performs data computation
C) Supplies electricity to components
D) Provides storage location for files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following could be described as both an input and output device?

A) Flat-screen monitor
B) Multi-function printer
C) Microphone
D) Scanner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
38
Before purchasing a new video card for a PC, which of the following should be checked to ensure there will be enough electricity for the video card to function properly?

A) GPU
B) CPU
C) GUI
D) PSU
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following components provides the FASTEST medium for hosting and storing an operating system?

A) Blu-Ray disc
B) 7200RPM HDD
C) SSD
D) DVD-RW
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following computer components are used to store data? (Select TWO).

A) GPU
B) HDD
C) RAM
D) NIC
E) CPU
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
41
Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?

A) Enabling full disk encryption
B) Requiring screensaver password
C) Disabling Bluetooth adapters
D) Adding multifactor authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
42
A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?

A) The browser is incompatible with the website
B) The workstation has been infected with malware
C) The website is not secured by SSL
D) The certificate of the website has expired
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?

A) Email address
B) Phone number
C) Mother's maiden name
D) Last name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
44
When setting up a new device, there are multiple features available that will never be used. Which of the following should the user do to make the new device more secure?

A) Make all users administrators.
B) Remove or disable the unnecessary features.
C) Install a password manager on the device.
D) Make all users guests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
45
Joe, a user, saves a document to a flash drive on his computer in order to print the document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive. Which of the following is the MOST likely cause of the infection?

A) The flash drive was infected by a war driving hacker on the way to the public kiosk.
B) The public workstation was infected by Joe's flash drive.
C) The public workstation was infected and passed the virus to the flash drive.
D) The flash drive was already infected by the user's computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following are considered input devices for a computer? (Select TWO).

A) Mouse
B) Printer
C) Speakers
D) Microphone
E) Monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
47
A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled. Which of the following BEST describes this type of malware infection?

A) Ransomware
B) Adware
C) Spyware
D) Virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following components is required to send faxes via POTS?

A) NIC
B) Power supply
C) Modem
D) Wireless adapter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is a 15-pin video connection?

A) DVI
B) S-video
C) Component
D) HDMI
E) VGA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
50
A user has a username and password to log onto a banking website. The user would like to keep access to the account as secure as possible. Which of the following security best practices should the user follow? (Select TWO).

A) Use only public computers to access the website
B) Create a complex password
C) Change the default password
D) Write the password down
E) Use the original password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
51
A user receives an email formatted to appear as if the bank sent it. The email explains that the user must confirm the name, address, and social security number listed on the bank account. Which of the following BEST describes the security threat taking place?

A) Shoulder surfing
B) Social engineering
C) Spam
D) Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
52
Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?

A) Large USB flash drive connected to a PC
B) Medium capacity SATA hard drive
C) Network attached storage appliance
D) Firewall with security management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
53
A technician wants to minimize the risk of having third parties track previously visited web pages. Which of the following should be performed in the Internet browser's settings? (Select TWO).

A) Select form data
B) Disable location services
C) Remove cookies
D) Clear history
E) Change passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
54
An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access. Which of the following BEST protects against data theft in this instance?

A) Security software
B) Full disk encryption
C) Cable lock
D) Username and password
E) Patching the OS and third party software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
55
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue?

A) The computer does not have current antivirus software installed
B) The computer needs to have its components upgraded
C) The downloaded toolbars are filling the browser screen
D) The owner was not using complex passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
56
A technician sets up a new computer system and connects the keyboard and mouse to the PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution?

A) Swap the mouse and keyboard to the other PS/2 ports.
B) Remap the mouse and keyboard in the BIOS.
C) Update the BIOS to recognize the newer keyboard and mouse.
D) Configure the keyboard localization settings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following is an example of ransomware?

A) A user is asked to pay a fee for a password to unlock access to their files.
B) A user receives an email demanding payment for a trial application that has stopped working.
C) A user has opened an Internet browser and is taken to a site that is not the normal home page.
D) A user is asked to open an attachment that verifies the price of an item that was not ordered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
58
A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).

A) Keyboard
B) Speakers
C) Mouse
D) Bluetooth
E) NFC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
59
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?

A) Only browse the Internet on WiFi connections that use WPA2
B) Turn off the guest account in the operating system
C) Disable autofill functionality within the web browser
D) Remove any legacy browsers from the computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).

A) Network connection
B) Microphone
C) Modem
D) Firewall
E) Webcam
F) Cable connection
G) Wired NIC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
61
Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website. She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem?

A) The company has configured a policy on her computer that forces her to stay on their website.
B) Her computer is infected with adware and is redirecting her browser to another site.
C) The memory of the browser is corrupt, and she needs to have the browser reinstalled.
D) She did not reboot her computer after clearing the temporary files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
62
A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?

A) Change the SSID
B) Change the router's address
C) Change the administrator password
D) Change the encryption key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following is the BEST security practice to use when configuring the management options of a wireless router?

A) Disable DHCP
B) Change the admin password
C) Enable SSID
D) Enable remote administration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
64
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?

A) Change the router administrator username.
B) Change the router's broadcasting channel.
C) Update the unit's firmware.
D) Use a complex administrator password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
65
An attacker cracks a user's password for all social media, email, and bank accounts. The user needs to change the passwords for all these accounts. Which of the following should the user do in the future to prevent this from happening?

A) Disable unused browser toolbars.
B) Clear the browser cache.
C) Avoid credential reuse.
D) Delete tracking cookies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which of the following are secure network protocols? (Select TWO).

A) IMAP
B) FTPS
C) SMTP
D) HTTPS
E) DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
67
A technician has just finished setting up a SOHO wireless router but the client does not want the PC on the wireless network for security reasons. The technician connects an RJ-45 cable to the computer and the router, but does not receive network connectivity. Which of the following is the NEXT step to diagnose the problem?

A) Change the IP address on the computer to match the router.
B) Reseat the power cable on the computer and reboot.
C) Check for link light activity on the computer and the router.
D) Change the hostname of the router to match the computer's network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
68
A user is configuring a SOHO wireless router. The user should change the router's default administrator password for which of the following reasons?

A) To prevent improper data transmission encryption
B) To prevent unauthorized configuration changes
C) To prevent social engineering attacks
D) To increase wireless signal strength
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?

A) Micro SD card
B) Bluetooth
C) USB connection
D) Infrared
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
70
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?

A) Hacking
B) Phishing
C) Spam
D) Cracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
71
A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?

A) Dumpster diving
B) Shoulder surfing
C) Phishing
D) Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following BEST describes the pros and cons of a home wired network?

A) Low throughput, low mobility, high availability, high latency, high security
B) High throughput, high mobility, low availability, low latency, high security
C) High throughput, low mobility, high availability, low latency, high security
D) Low throughput, high mobility, low availability, high latency, low security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which of the following would BEST be described as password best practices? (Select THREE).

A) Use of long passwords
B) Sharing passwords with a trusted source
C) Limiting password reuse
D) Keeping default passwords
E) Use of special characters
F) Writing down difficult passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
74
While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website?

A) It stores data in cache or cookies, but not both.
B) It requires login credentials for some sections.
C) It contains both secure and non-secure parts.
D) It is best viewed with a different browser.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
75
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?

A) Malware
B) Social engineering
C) Spam
D) Physical security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
76
Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?

A) Standard
B) Guest
C) Administrator
D) Power user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
77
A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the user's browser?

A) HTTP
B) HTTPS
C) SFTP
D) FTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
78
When operating under optimal network conditions, which of the following has the HIGHEST reliability?

A) Bluetooth
B) Wired
C) Cellular
D) WiFi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which of the following are best practices when it comes to using a computer in a public location? (Select TWO).

A) Notify the administrator when finished.
B) Use strong passwords.
C) Turn off the computer when finished.
D) Disable the save password function on web pages.
E) Make sure to clean the keyboard when finished.
F) Make sure to log out of websites when done.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
80
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:

A) adware
B) spyware
C) ransomware
D) phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 387 في هذه المجموعة.