Christmas Tree
Reindeer
Elf
Loser
Presents
North Pole
100

What should be your first step when troubleshooting a network connection that uses a cable modem?

Ping local devices using their IP addresses

100

Which of the following is generally a component of a BYOD policy?

Scope of control 

100

Which term describes a compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?

Tablet

100

What does the following represent?

2E22:4F00:00E:00D0:A267:97FF:FE6B:FE34

IPv6 address 

100

Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical looking but malicious imposter Web site?

Pharming 

100

You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

It is easily compromised by hackers

200

A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend's system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?

The computer has been infected with an illicit server

200

Selena has run out of memory on her phone's SD card. She has decided to store the files she has accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue that she may encounter?

The files become unavailable whenever Internet connectivity is lost

200

Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?

Students devices sending unsecured data

200

You have just been hired by a large company, and the IT manager is giving you an overview of the corporate network. He tells you that the corporation is spread out over several cities, and various departments are divided into subnetworks that are connected using routers What type of network are you being shown?

Wide area network (WAN)

200

What is the distinguishing difference between a LAN and WAN?

A LAN is a group of networked computers within a confined geographic area

200

Which security issue is most closely associated with wireless networks?

War driving

300

Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?

She can outsource all customer service so the company can focus on product development.

300

Make a cat noise or pay the consequence. 

If you did it: Double points. 

If you didn't do it: Lose double points 

300

Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?

Use the windows Disk Cleanup utility

300

When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:

Creating redundancy and using multiple cloud service providers

300

The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:

Change a resource assignment

300

To restore a backup file on a Windows-based computer, you:

Use the BackupandRestore utility in the Control Panel

400

When a PC computer device wants to communicate with the processor, which system resource does it use?

IRQ (Interrupt Request) 

400

Server-based networks typically contain centralized network resources, which are usually not available on peer-to-peer (P2P) networks. Which of the following examples describes a server-based network?

Three network clients connecting to a file server

400

Acme Corp. is a small manufacturing company. To reduce IT infrastructure costs, it uses cloud-based services extensively and strives to have the least amount of IT equipment onsite. Last year, Acme suffered a failure that resulted in significant downtime and data loss. Management has decided to implement a continuous data protection (CDP) solution. Which type CDP solution best fits Acme's situation?

Cloud-only solution

400

What is the biggest security concern with wireless networks?

Wireless encryption algorithms must be implemented

400

Do you best dance move. 

If you did: Double points, 

If you didn't Choose a team to give points to

400

Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use iCloud-based services?

Service-level agreement with a cloud-provider

500

Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?

Service Set Identifier (SSID)

500

Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?

Interrupt request (IRQ)

500

Which of the following computer system maintenance tasks can help improve file access performance?

Defragment the drive using the following command: defrag c: -w

500

You are a computer technician supporting a small 15- computer Internet lab. The computers are regularly used to browse the internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary internet files. Which of the following is a way to easily delete all temporary internet files?

Disk cleanup

500

Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?

Inability to control access to company data if the device is stolen or lost

500

You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks. Which term describes this wireless network device name?

Service Set Identifier (SSID)

600

Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?

She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi

600

John is the network administrator for a small company. The company's network equipment has become outdated, and John has been asked to recommend a plan to update the company's infrastructure. John has read extensively about the many advantages of using cloud-based services. Which of the following is an advantage of cloud-based services that John could cite to support his recommendation?

Elimination of equipment purchase maintenance

600

You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?

Acceptable use policy

600

Jenny recently switched from broadband cable internet to ADSL service with her local phone company. To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the internet. Which setting should she check first?

Default gateway

600

Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?

WPA2

600

Do 5 push ups. 

If you did: Triple points 

If you didn't: Triple points to an opponent. 

700

Do your best model walk. 

If you did: Double points

If you didn't: every other team gets points

700

Which term describes the practice of actively collecting wireless networking data from companies and individuals?

War driving

700

Carl is experiencing read/write errors when trying to save files on her windows-based laptop. To correct the issue, she could consider performing which of the following maintenance?

chkdsk command

700

Your company is investigating the possibility of moving its customer service management system to a cloud service. This sales re for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?

If your company's internet service is interrupted for any reason at any time, you will not have access to the CRM

700

Virtualizing software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?

Hard disk and network devices

700

Super Bank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. Super Bank's managers are concerned about security. What can Super Bank's request to protect its data from security threats?

For Super Bank to perform background checks on the staff at Local Data Center, Inc.

800

Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?

Disk defragmentation 

800

Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?

Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices

800

Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?

Symmetric- key encryption is susceptible to cracking

800

The internet has enabled many new anti-social activities, such as online stalking, cyberbullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyberbullying?

Educate students about cyber- ethics and the consequences of questionable online behavior

800

Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete any old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?

Disk defragmentation

800

Cloud-computing enables mobile devices to provide users with access to a wide variety of applications and services. Which of the following is a disadvantage of mobile devices?

Mobile devices cannot accommodate large database installations or applications

M
e
n
u