Which of the following components is NOT required to create a network?
Network Media
Wireless Adapter
Computer Systems
Network Interfaces
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication port or connected wirelessly?
A flash drive
A plug-in
A peripheral
An attachment
If you select a file on your desktop and delete it, what happens to the file?
It is moved to the Recycle bin.
Its filename is removed and it is deleted later.
It is moved to the Recycle bin and deleted later.
It is immediately deleted and removed from the storage media.
What is the best countermeasure against social engineering?
User awareness training
Strong passwords
Access auditing
Acceptable use policy
Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?
Internet
Local Area Network
Internet of Things
Intranet
Multiple computers configured to be able to communicate and share information with each other form a ____________.
Network
Family
Group
Commune
Which type of connector is commonly used for keyboards and mice?
TRS
RCA
USB
XLR
Designations at the end of file names such as .docx and .html are called _____________.
File permissions
File properties
File extensions
File domains
Which of the following describes a Man-in-the-Middle attack?
Malicious code is planted on a system where it waits for a triggering event before activating.
A person over the phone convinces an employee to reveal their logon credentials.
An IP packet is constructed which is larger than the valid size.
An attacker intercepts communications between two network hosts by impersonating each host.
Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?
Wide Area Network
World Wide Web
Intranet
Internet
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.
Which of the following features lets you allow or reject client connections based on the hardware address?
WEP
MAC address filtering
SSID
DHCP
You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on.
Which of the following is the BEST step to try first?
Replace the motherboard
Plug in an external monitor
Calibrate the battery
Replace the video card
Which permission option lets a user view files but not change them?
Read/Write
Administrator
Read
Owner
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Denial-of-service
Wiretapping
Power outage
Data redundancy
Which of the following terms describes an organization that connects users to the Internet?
Data Center
Web Server
Network Server
Internet Service Provider
Which of the following provides services to hosts on its network?
Client
Storage
Server
You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work.
Which of the following troubleshooting steps is the BEST to try first?
Make sure the USB device is plugged in properly.
Install a new USB controller card.
Try a different USB cable.
Replace the USB device.
Which of the following applications can be used for storing, modifying, extracting, and searching data?
Database software
Presentation software
Conferencing software
Word processing software
Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select two.)
Keep an up-to-date remote backup
Keep the operating system up to date
Avoid anti-virus apps
Lock the screen with some form of authentication
Keep your device always in your possession
Turn off location services
A _________ is a private network that utilizes the same technologies as the Internet.
Wide Area Network
Local Area Network
Intranet
World Wide Web
You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter.
Which of the following is the technology being used in these phones?
VPN
Bluetooth transmitters
NFC chips
Infrared transmitters
You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. After the installation, the system frequently crashes when you try to access the new device.
Which of the following steps would MOST likely resolve this issue?
Remove and then reinstall the device.
Replace the device itself.
Download and install the latest driver from the manufacturer's website.
Run the Add Legacy Hardware wizard and manually configure the device.
What is the name of the menu in the bottom left corner of the Windows environment?
Command Prompt
Start Menu
Windows Menu
Main Menu
Which Internet protocol is used to transmit encrypted data?
HTTPS
DNS
FTP
HTTP
Which medium does Wi-Fi use to send data between networks and devices?
Cellular signals
Ultraviolet light
Bluetooth
Radio waves