Category 1
Category 2
Category 3
Category 4
Category 5
100

Which of the following wireless device interfaces is primarily used for connecting devices to a local area network(LAN) to enable internet and network access? (802.11X,RFID,NFC,Bluetooth)

802.11X

100

What type of language would you use to write a device driver for Linux?

You would use an ASSEMBLY language to write a device driver for Linux.

100

Where would you go to configure an SSD?

Disk management

100

With what programming concept are properties and methods associated?

Objects

100

Which of the following addresses the storage concern of data persistence?

Saving the information to disk.

200

Which of the following display technologies allows you to wirelessly send content from a device to an external screen, such as a Smart TV, without physically connecting a cable?

Casting

200

Which of the following can be characterized as the interface between applications and hardware?

Operating System

200

Which of the following are IoT devices? (Choose all that apply.)

1.Fax machines, 2. IP cameras, 3. Mobile phones, 4. Medical devices, 5.Home automation thermostats

1.Home automation thermostats, 3. IP cameras, 5. Medical devices

200

Screen locks, allow lists, and block lists can raise your expectation of privacy when using which of the following?


Desktop software

200

Management is concerned that mobile device location information can be revealed to attackers. Which mobile device feature should you investigate? (Remote wiping, screen lock,Geotagging,Allow listing)

Geotagging

300

Which of the following is NOT a component of multifactor authentication?1. Something you have, 2. Single sign-on, 3. Something you know, 4. Something you are

Single sign-on

300

Which of the following is NOT a file system?

A) Ext4 B) FAT32 C) NTFS D) GUI

A graphical user interface (GUI) is not a file system.

300

You are calculating the GrossPay amount by multiplying the HoursWorked field x the HourlyRate field. Which datatype would you use for the GrossPay, HoursWorked, and HourlyRate fields?

Float

300

Which of the following characterizes a byte? (1. A zero (0) or one (1), 2. A measurement in Mbps, 3.The string 01000001, 4.A measurement in MHz)

The string 01000001

300

Which of the following is NOT an email client? (Outlook, Excel, Thunderbird, Mailbird)

Excel

400

Which of the following location backup considerations would NOT be advisable for mobile devices? (Backup stored locally, Backup to cloud storage, Backup stored offsite, Backup stored onsite)

Backup stored locally

400

Which of the following is the fastest throughput unit?

Gbps, Mbps, Kbps, Bps

The fastest throughput listed is gigabits per second (Gbps).

400

Which term refers to the large volumes of data that require advanced tools and techniques to process, analyze, and extract meaningful insights?

Big Data

400

Your browser uses Bing when you want to look things up. You want to change it so that your browser uses Google instead. What must you change?

Default search engine

400

Which of the following are connections that are used in wired networking? (Choose two.)

1. Infrared, 2. DVI, 3. RJ-45, 4. VGA, 5. RJ-11

RJ-11 and RJ-45 (registered jack) are both connections (input/output interfaces) that are used in networking.

500

When using the internet, which of the following areas should concern you about your expectation of privacy?(Choose all that apply.)

When using file sharing applications, When using email, While instant messaging, When using social networking sites

All of the them.

500

Which term is used to describe the overall structure of a database?Primary key, Row,Table, Schema

Schema

500

You are concerned about browser security in your organization. You want to ensure that JavaScript is blocked fromall websites. What would you implement? Clear the cache, Check for a valid certificate, Enable pop-up blockers, Deactivate client-side scripting.

Deactivate client-side scripting.

500

You arrive at the user’s cubicle in response to a help desk call. Your first step is to identify the problem. Which one of these is NOT an activity you might use to identify the problem? (Establish a theory of probable cause, Duplicate the problem, Identify symptoms, Gather information)

Establish a theory of probable cause.

500

Which password best practice focuses on safeguarding passwords from unauthorized access by ensuring they are not shared or exposed?

Password expiration, Password length, Password complexity, Password privacy

Password privacy