Networking
Hardware
Software
Cyber Security
Internet Technologies
100

Which of the following components is NOT required to create a network?

Network Media

Wireless Adapter

Computer Systems

Network Interfaces

100

Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication port or connected wirelessly?

A flash drive

A plug-in

A peripheral

An attachment

100

If you select a file on your desktop and delete it, what happens to the file?

It is moved to the Recycle bin.

Its filename is removed and it is deleted later.

It is moved to the Recycle bin and deleted later.

It is immediately deleted and removed from the storage media.

100

What is the best countermeasure against social engineering?

User awareness training

Strong passwords

Access auditing

Acceptable use policy

100

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?

Internet

Local Area Network

Internet of Things

Intranet

200

Multiple computers configured to be able to communicate and share information with each other form a ____________.

Network

Family

Group

Commune

200

Which type of connector is commonly used for keyboards and mice?

TRS

RCA

USB

XLR

200

Designations at the end of file names such as .docx and .html are called _____________.

File permissions

File properties

File extensions

File domains

200

Which of the following describes a Man-in-the-Middle attack?

Malicious code is planted on a system where it waits for a triggering event before activating.

A person over the phone convinces an employee to reveal their logon credentials.

An IP packet is constructed which is larger than the valid size.

An attacker intercepts communications between two network hosts by impersonating each host.

200

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

Wide Area Network

World Wide Web

Intranet

Internet

300

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.

Which of the following features lets you allow or reject client connections based on the hardware address?

WEP

MAC address filtering

SSID

DHCP

300

You are troubleshooting a malfunctioning notebook computer. Nothing appears on the LED display when the system is powered on.

Which of the following is the BEST step to try first?

Replace the motherboard

Plug in an external monitor

Calibrate the battery

Replace the video card

300

Which permission option lets a user view files but not change them?

Read/Write

Administrator

Read

Owner

300

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Denial-of-service

Wiretapping

Power outage

Data redundancy

300

Which of the following terms describes an organization that connects users to the Internet?

Data Center

Web Server

Network Server

Internet Service Provider

400

Which of the following provides services to hosts on its network?

Client

Storage

Server

Email

400

You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work.

Which of the following troubleshooting steps is the BEST to try first?

Make sure the USB device is plugged in properly.

Install a new USB controller card.

Try a different USB cable.

Replace the USB device.

400

Which of the following applications can be used for storing, modifying, extracting, and searching data?

Database software

Presentation software

Conferencing software

Word processing software

400

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select two.)

Keep an up-to-date remote backup

Keep the operating system up to date

Avoid anti-virus apps

Lock the screen with some form of authentication

Keep your device always in your possession

Turn off location services


400

A _________ is a private network that utilizes the same technologies as the Internet.

Wide Area Network

Local Area Network

Intranet

World Wide Web

500

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter.

Which of the following is the technology being used in these phones?

VPN

Bluetooth transmitters

NFC chips

Infrared transmitters

500

You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. After the installation, the system frequently crashes when you try to access the new device.

Which of the following steps would MOST likely resolve this issue?

Remove and then reinstall the device.

Replace the device itself.

Download and install the latest driver from the manufacturer's website.

Run the Add Legacy Hardware wizard and manually configure the device.

500

What is the name of the menu in the bottom left corner of the Windows environment?

Command Prompt

Start Menu

Windows Menu

Main Menu

500

Which Internet protocol is used to transmit encrypted data?

HTTPS

DNS

FTP

HTTP

500

Which medium does Wi-Fi use to send data between networks and devices?

Cellular signals

Ultraviolet light

Bluetooth

Radio waves

M
e
n
u