IT Concepts and Terminology
Infrastructure
Applications and Software
Software Development
Security
100

Which of the following is the correct binary representation of the number 22? 

11000 

10110 

10101 

10111

10110 

10110 in binary is the same as 22 in decimal. 

10101 in binary is the same as 21 in decimal. 

10111 in binary is the same as 23 in decimal. 

11000 in binary is the same as 24 in decimal.

100

Which network type uses light pulses to transmit data? 

Cable 

Fiber optic 

Wireless 

Satellite  

Fiber optic 

Fiber optic networks transmit light pulses rather than electricity to communicate. Satellite networks use radio signals sent to and received from a satellite. Cable networks use a cable TV connection and electric signals to send data. Wireless networks use radio waves for sending network data within a local area network.

100

Henry has started his own business. He wants to track daily and monthly sales. Which software could he use to efficiently manage data and perform formula calculations? 

Text editing software 

Spreadsheet software 

Imaging software 

Database software

Spreadsheet software 

A good choice for Henry is to use spreadsheet software. With it, he can organize his data in cells and apply formulas for calculations.

100

Which of the following is used to model real-world objects into computer code? 

Algorithms 

Object-oriented programming 

Flow charting 

Pseudocode

Object-oriented programming 

Object-oriented programming is a programming paradigm based on the concept of objects which can contain both data and programming code. The objects model real-world objects.

100

You receive a call from a person who identifies himself as a technician at Microsoft. He says your computer is infected and needs to be cleaned. Which of the following is this phone call MOST likely an example of? 

Social engineering 

Replay attack 

Snooping 

Eavesdropping

Social engineering 

Social engineering is the use of deception to gain personal and/or private information for unlawful purposes.  

200

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset. Which of the following actions should a technician take before doing so? 

Perform a remote wipe to clear any personal data.

Backup all data to an attached computer or a cloud backup service. 

Ensure that the battery is fully charged. 

Close all running applications.

Backup all data to an attached computer or a cloud backup service. 

A factory reset will clear all data from the mobile device. To prevent the loss of this data, it should be backed up to an attached computer or a cloud backup service.

200

You are trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work. Which of the following troubleshooting steps is the BEST to try first? 

Make sure the USB device is plugged in properly. 

Replace the USB device. 

Try a different USB cable. 

Install a new USB controller card.

Make sure the USB device is plugged in properly. 

The first thing to check is whether the USB device is plugged in properly. If that doesn't correct the problem, you might try a different USB cable before doing more extensive troubleshooting.

200

Which tool can be used to view memory usage and the amount of memory different processes are currently using on your PC? 

Task Manager 

Disk Management 

Device Manager 

Apps and Features

Task Manager 

Task Manager has many uses. One of which is being able to see performance information for your CPU, memory, hard drive, and other PC components. Another good idea to keep from running low on memory is to add more physical memory

200

____________ is a principle that limits access to certain parts of a program to public methods.

 Inheritance 

Polymorphism 

Encapsulation 

Abstraction

Encapsulation 

In object-oriented programming, encapsulation is the principle that limits access to certain parts of the code to public methods. By encapsulating data, the programmer ensures that data will always be handled in the appropriate way.

200

Which of the following can often fulfill a company business requirement for offsite backups in case of a natural disaster or criminal activity? 

Local backups 

Bare metal backups 

Cloud storage 

Network attached storage (NAS)

Cloud storage 

In some cases, cloud storage can fulfill the requirement for offsite backups. This is because it provides a convenient, flexible, and scalable alternative to traditional backup methods in the case of a natural disaster (such as a fire) or criminal activity (such as a theft).

300

You're troubleshooting a computer running Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message. Which of the following is the MOST likely first step that should be taken in troubleshooting the issue? 

Update the BIOS. 

Search for the error in Microsoft's knowledgebase. 

Check the voltage levels on the DC side of the power supply. 

Remove all memory modules and replace them one at a time until the error reappears.

Uninstall the last application or system update that was installed.

Search for the error in Microsoft's knowledgebase. 

The first thing you should do when a "blue screen of death" has been displayed is identify the source of the error. Search for the text of the error message in Microsoft's knowledgebase or across the Internet in general using a search engine such as Google. This will help you identify what's causing the problem so you can troubleshoot it.

300

You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. After the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue? 

Replace the device itself. 

Run the Add Legacy 

Hardware wizard and manually configure the device. 

Download and install the latest driver from the manufacturer's website. 

Remove and then reinstall the device.

Download and install the latest driver from the manufacturer's website. 

The first thing to try would be to download and install the latest driver for the device from the manufacturer's website.

300

Which of the following operating systems require a file extension to execute a program? 

Linux 

Android 

MAC OS 

Windows

Windows

The Windows operating system requires executables to have a file extension such as .com or .exe in order to execute a program. Linux, MAC OS, and Android do not require file extensions for executable files.

300

Which of the following programming languages is a compiled language? 

Ruby 

JavaScript 

SQL 

C

C

C is a compiled programming language. JavaScript and Ruby are interpreted languages. SQL is a query language used to access databases.

300

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next BEST step to perform? 

Hire a forensic team to gather evidence. 

Contain the problem. 

Investigate how the attack occurred. 

Prevent such an incident from occurring again.

Contain the problem. 

You have already identified the issue, so the next step is to take actions to stop the attack and contain the damage. Although it is important to preserve as much information as possible to assist in later investigations, it might be better to stop the attack, even if doing so alerts the attacker or results in the loss of evidence regarding the attack.

400

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed? 

Implement the solution or escalate as necessary 

Document findings/lessons learned, actions, and outcomes 

Establish a plan of action to solve the problem and identify potential effects 

Verify full system functionality and, if applicable, implement preventive measures

Document findings/lessons learned, actions, and outcomes 

The last step in the troubleshooting methodology is to document findings/lessons learned, actions, and outcomes.

400

Christian is shopping for a new computer. He needs to be able to create documents and input data into a spreadsheet, and he also wants to be able to take notes at meetings and jot down ideas using a stylus. Which type of computer should Christian look for? 

A laptop 

A mobile phone 

A tablet 

A hybrid device

A hybrid device

A hybrid laptop or tablet device would be a good choice. These devices can be used like a standard laptop but can also be flipped for tablet functionality.

400

Which of the following software license models allows a developer to modify the original code and release its own version of the application? 

A. Proprietary software 

B. Commercial software 

C. Open source software

D. Cross-platform software

C. Open source software

400

Enrique, a web developer, is creating a new website for a customer and is using Ruby to provide dynamic content for the web pages. Which language type is he using? 

Scripting 

Compiled 

Assembly 

Machine

Scripting 

Ruby is a scripting language similar to Python and PERL. It is typically used to build web applications. Ruby is not a compiled language; it is interpreted. Ruby is not an assembly language or machine language.

400

Which of the following are security controls you can use to help protect the data on your network? (Select three.) 

Access controls 

Natural language processing 

Transaction processing 

Backups 

Fault tolerance

Analytics 

Reporting

Access controls      Backups      Fault tolerance

A backup is a copy of your data and a security control to help protect network data. In the event of data loss or corruption, the data can be retrieved from the backup. Access controls are used to protect who can see and change your data and are a type of security control. This would include employees as well as competitors. Fault tolerance is the high availability of data and is a type of security control. Fault tolerance refers to the ability of a system (computer, network, cloud cluster, etc.) to continue operating even when one or more of its components fail without any noticeable delay.

500

Which of the following BEST describes the practice of providing user credentials when logging onto the network? 

A. Output 

B. Storage 

C. Input 

D. Processing

C. Input 


500

What do you call any type of storage, whether it is an internal hard drive, an internal optical drive, an external drive, a thumb drive, or a memory card, that has been shared on a computer connected to a network for other computer to use? 

File server 

DAS (direct attached storage) 

Cloud storage 

NAS (network attached storage)

DAS (direct attached storage) 

DAS is a term used to describe a computer that is on a network and has many kinds of storage. Regardless of the medium, that storage can be shared so other computers can take advantage of it.

500

Which of the following BEST describes an application running on a typical operating system? 

A. Process 

B. Thread 

C. Function 

D. Task

A. Process 

500

A programmer wants to create a visual representation of all the branching and sequencing for a program. Which of the following should the programmer use? 

Function 

Algorithm 

Flow chart 

Pseudocode

Flow chart 

A flow chart (also written flowchart) is a visual representation of the branching and sequencing that occurs in a program. It provides a visual tool to check the programming logic and ensure all options are taken into consideration.

500

A UPS provides protection against: 

A. denial of service 

B. replay attack 

C. power outages 

D. wiretapping

C. power outages 

M
e
n
u