Security
Windows
Hardware
Surprise
Connectors and Sizes
100
Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computers, he has authorized, can get on his Wi-Fi. What is the most appropriate security measure you can recommend? A. A Firewall B. WPA encryption C. Mac Filtering D. WEP encryption
C. Mac Filtering
100
QUESTION 16 You have a customer who wants to move files and settings from an old PC to a new one she is buying. What tool do you recommend? A. File and Settings Transfer Wizard B. Disk Management C. Windows Explorer D. User State Migration Tool
A. File and Settings Transfer Wizard
100
Mark has a computer with a CD-ROM drive. He is unable to open the CD-ROM drive tray by pushing the Eject button on the front panel of the drive. What else can he do to open the tray? A. Open the tray by holding it through pliers. B. Insert a pin into the eject hole on the drive. C. Push the Eject button for 2 minutes. D. Open the CD-ROM cover.
B. Insert a pin into the eject hole on the drive.
100
DAILY DOUBLE SELECT ALL THAT APPLY 1500 PTS MAX, NO STEALS
QUESTION 100 Which of the following substances are restricted under Restriction of Hazardous Substances (RoHS)? Each correct Answer represents a complete solution. Choose all that apply. A. Mercury (Hg) B. Lead (Pb) C. Iron (Fe) D. Cadmium (Cd)
100
QUESTION 42 Which of the following connectors are used to connect a keyboard to the computer?Each correct answer represents a complete solution. Choose three. A. Six-pin mini-DIN connector B. USB connector C. Five-pin DIN connector D. Nine-pin D type male connector
A. Six-pin mini-DIN connector B. USB connector C. Five-pin DIN connector
200
Which of the following statements about multi-or authentication is true? A. It uses a Key Distribution Center (KDC). B. It protects a computer from malicious software such as worms. C. It involves two or more methods as part of the authentication process. D. It is a process in which a client process and a server are required to prove their identities to each other before performing any application function.
C. It involves two or more methods as part of the authentication process.
200
Which of the following switches of the ATTRIB command clears the attributes of a file? A. - B. A C. + D. R Correct Answer
A. -
200
Which of the following statements about expansion bus is true? A. It connects expansion cards to BIOS. B. It connects expansion cards to system bus. C. It is a network interconnectivity device that translates different communication protocols and is used to connect dissimilar networks. D. It is a cable made of light-conducting glass or plastic fibers.
B. It connects expansion cards to system bus.
200
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces? A. Unicast B. Multicast C. Loopback D. Anycast
D. Anycast
200
At what voltage does a USB host supply power to the USB bus? A. 15 volts B. 5 volts C. 50 volts D. 3 volts
B. 5 volts
300
QUESTION 43 Which of the following encryption algorithm is used by Wired Equivalent Privacy (WEP)? A. RC4 B. RSA C. IDEA D. SHA
A. RC4
300
QUESTION 49 Which of the following switches of the XCOPY command continues to copy files even if errors occur? A. /q B. /e C. /c D. /r
C. /c
300
QUESTION 28 What is the difference between SRAM and DRAM?Each correct answer represents a complete solution. Choose two. A. DRAM is used in Cache memory and SRAM is used in Video memory. B. SRAM has in-built switches and does not have to be refreshed but DRAM needs to be refreshed. C. SRAM is faster than DRAM. D. DRAM is faster than SRAM.
C. SRAM is faster than DRAM. B. SRAM has in-built switches and does not have to be refreshed but DRAM needs to be refreshed.
300
Which of the following enables third-party developers to create capabilities to extend an application? A. Plug-in B. Virtual machine C. Hotfix D. JavaScript
A. Plug-in
300
Which of the following buses has a maximum data transfer rate of 2400 Mbps? A. FireWire 800 B. eSATA C. USB 1.1 D. USB 2.0
B. eSATA
400
QUESTION 87 Which of the following protocols has recently been succeeded by Transport Layer Security (TLS) protocol? A. SNMP B. IPX/SPX C. HTTP D. SSL
D. SSL
400
QUESTION 55 Which of the following statements about the compression feature of the NTFS file system are true? Each correct answer represents a complete solution. Choose two. A. Compressed files on an NTFS volume can be read and written by any Windows-based application after they are decompressed. B. Users can work with NTFS-compressed files without decompressing them. C. It supports compression only on volumes. D. It supports compression on volumes, folders, and files.
B. Users can work with NTFS-compressed files without decompressing them. D. It supports compression on volumes, folders, and files.
400
Which of the following protocols are used by Network Attached Storage (NAS)? Each correct answer represents a complete solution. Choose all that apply. A. Server Message Block (SMB) B. Network File System (NFS) C. Distributed file system (Dfs) D. Apple Filing Protocol (AFP)
C. Distributed file system (Dfs)
400
QUESTION 23 Which of the following processor states does not save power? A. C2 B. C1 C. C3 D. C0
D. C0
400
QUESTION 52 Which of the following PCMCIA cards is 3.3mm thick? A. TYPE III B. TYPE II C. TYPE I D. TYPE IV
C. TYPE I
500
Which of the following refers to the process of verifying the identity of a person, network host, or system process? A. Auditing B. Authentication C. Hacking D. Packet filtering
B. Authentication
500
DAILY DOUBLE UP TO 1500 PTS, NO STEALS
QUESTION 64 Which of the following statements about the XCOPY command is true? A. XCOPY /s copies system files only. B. XCOPY deletes all files and subdirectories. C. XCOPY copies archived files only. D. XCOPY /s copies files and subdirectories.
500
QUESTION 75 Which of the following statements about a serial port are true? Each correct answer represents a complete solution. Choose all that apply. A. It is used to connect a printer and a scanner to a computer. B. It sends data one bit at a time, over a single wire. C. It has 9-pin and 25-pin connectors on personal computers. D. It sends data eight bits at a time, over a single wire.
B. It sends data one bit at a time, over a single wire. D. It sends data eight bits at a time, over a single wire.
500
QUESTION 72 Which of the following protocols allows an e-mail client to access e-mails that are stored on a remote mail server? A. PPPoE B. IMAP C. SMTP D. ICMP
B. IMAP
500
QUESTION 57 How many pins are used in HDMI Type A and Type B connectors? A. 20 pins and 29 pins B. 18 pins and 28 pins C. 24 pins and 28 pins D. 19 pins and 29 pins
D. 19 pins and 29 pins