1.
Back-up procedures help in restoring...
2.
Modifying an operational system by adding Internet web site access would be an example of...
3.
Networks that link some of the internet resources of a company to the intranets of their customers or suppliers. What will the best fit be?
4.
If you are going to a site you use often, instead of having to type in the address every time, you should ____________________.
5.
Which of the following will be used if the sender of an e-mail wants to bold, italicize etc. the text message?
6.
Which is the slowest internet connection service?
8.
What type of computer component is a printer?
9.
If a computer has more processing power than some classes of computers, then it is called:
10.
Which of the following is not an output device?
11.
Which of the following types of programming languages is Java?
12.
Linux is an example of...
13.
Which of the following is a property of the main memory?
14.
When a message is transmitted and received over the same channel at the same time, such a mode of transmission in network environment is called as:
15.
The Network Topology in which nodes are connected to a central hub is known as:
16.
A parallel port is most often used by a ____________________.
17.
The letter ‘G’ used in ‘2G Spectrum’ stands for...
18.
Different computers are connected to a LAN by a cable and a ____________________________.
19.
Which of the following memory types must be refreshed many times per second?
20.
__________________ is a type of computing that performs computation, storage and even applications as a service across a network.
21.
Which of the following uses the spawn mechanism to duplicate itself?
22.
What is clickjacking?
23.
_________________ is required to boot a computer.
24.
________________________ technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
25.
What is an organization’s introductory web page called?
26.
What are the signals that inform the operating system that some activity has taken place, called?
28.
Total bits used by the IPv6 address is __________________.
29.
URL stands for ____________________________.
30.
How many bits are in a byte?
31.
Choose the port number of FTP______.
32.
What is the subnet mask for the CIDR notation /22?
33.
Among the following which is not a database management software _____________________?
34.
UNIX is written in which language?
35.
Which of the following is an extension of image file?
36.
Identify the different features of Big Data Analytics.
37.
Why is a firewall used in a computer?
38.
Which of the following is not an operating system?
39.
Number of layers in the OSI (Open Systems Interconnection) Model?
40.
1024 bit is equal to how many byte?
41.
Which one is the first fully supported 64-bit operating system?
42.
Which of the following is not a web browser?
43.
In computer world, Trojan refer to _______________.
44.
Which one of the following is a programming language?
45.
Which protocol is used to receive e-mail?
46.
Which protocol is used to send e-mail?
47.
A folder in windows computer can’t be made with the name.
48.
A computer uses which type of number system to calculate and to store data?
49.
What is the extension type of the Excel files?
50.
Which one is a ‘text editor’ for Microsoft Office Software?
51.
What is the maximum number of Primary Partitions that can be created on a hard-disk?
52.
How many layers are there in the TCP/IP protocol layers?
53.
Which key combination is used to minimize all open windows and displays in the screen?
54.
Which function key needs to be pressed during reboot to enter Safe Mode of a Windows machine?
55.
Which key combination is used to permanently delete a file or folder?
56.
Which one is an example of connectionless protocols?
57.
A common boundary between two computer systems is known as?
58.
Which one of the following is not a computer language?
59.
Network Interface Card (NIC) is generally used for _____________________.
60.
Total number of pins in a traditional parallel port is ______.
61.
Total number of Pins in a Cat6 cable?
62.
Which web browser is developed by Google?
63.
Which web browser is provided default with a Windows machine?
64.
Which one is the default ‘Word Processor’ for Microsoft Office Software?
65.
How many characters should a strong password have (at a minimum)?
67.
What is an embedded system?
68.
Computer/Laptop has a GUI (Graphics User Interface).
69.
You are configuring a Wi-Fi base station using DHCP. Which items should you set or change?
70.
Can you connect a DisplayPort monitor to a USB-C port on your computer?
71.
What is the I/O panel?
72.
The computer consistently boots into Safe Mode. How would you address this issue?
73.
Which choice is not a typical adjustment found on a monitor?
74.
Assuming that the gateway, modem, and switch are separate units, in what order should a small office or home office LAN be restarted?
75.
A client needs to secure their cafe's wireless network, which is used only by employees. What is the best approach for a finite list of devices?
76.
Which hardware port would not be found on a typical gateway?
77.
The recent Windows update introduced some quirks in the system. How can you enter the Windows Recovery Environment to recover from the update?
78.
Which components are typically found on the motherboard?
79.
What does the acronym RAID refer to?
80.
Your computer boots at very low resolution that cannot be increased through display settings. What is the most likely solution?
81.
To which choice can the Wget program be considered similar?
82.
Does an incognito window prevent websites from tracking your activity on the web?
83.
What must you confirm before performing a processor upgrade?
84.
Which type of storage has the fastest data access speeds?
85.
A Bluetooth peripheral is prompting for a passcode to complete the pairing/connection process. What is the peripheral, most likely?
86.
Walt's computer is several years old and he wants to ensure that the system works until he gets a replacement. What should he do first?
87.
What is one difference between a drive and media?
88.
Mass storage inside a desktop computer case is usually found where?
89.
Which statement about a modular power supply is true?
90.
Which program controls the Windows startup sequence?
91.
Angela ran a diagnostic that shows an ever-decreasing amount of memory in her computer. What could be the problem?
92.
What is the most important thing to do before opening a computer case?
93.
On a trackpad, what gesture commonly replaces "center mouse wheel" for things like scrolling through documents?
94.
What is the name of the hardware that most directly provides a computer with network access?
95.
Networking wire is referred to as ___________________________________.
96.
Miguel is working on the computer, and Jen needs to use it for a moment. What can Miguel do to provide for an easy transition?
97.
A _______________________ allows you to plug computers into a central location to communicate on the same local area network.
98.
After plugging in an external 3.5mm microphone, you stop hearing sound from the speakers. What is the most likely source of the problem?
99.
You think that the Internet is down. How can you know for certain?
100.
An application is unresponsive. How can you effectively close it down?
101.
How can you tell that the website you are visiting is sending and receiving data that has been encrypted?
102.
The client/server model best represents ____________________________________.
103.
The primary mass storage device is divided into two partitions. What would explain this arrangement?
104.
You are replacing a processor. How do you build the processor "sandwich", top-down?
105.
The operating system tells you that a file is busy. What is the fastest way to attempt to make the file un-busy?
106.
Which service allows clients to work remotely and supplies the clients with an IP address on the same local area network as the office?
107.
Al is about to update a software driver. What would be a wise thing to do first?
108.
What is the process of moving data and programs from an old computer to a new one called?
109.
The local network is up, but the computers cannot access the Internet. Your Internet configuration includes a modem, gateway (router), and a switch as separate devices. What should you do?
110.
You notice that a program crashes at a specific time. Which tool can you use in Windows to discover the cause?
111.
While planning a conference at a center in the mountains, you call ahead to ensure that it has broadband Internet access. Which connection type would be an unsuitable choice?
112.
What is a fixed disk?
113.
What is referred to by SSID?
114.
Which is the standard color coding for straight-thru network cable?
115.
Which key assists limited keyboard layouts (such as on a laptop) with accessing the full range of keys?
116.
You power up your computer and it starts in Safe Mode, you are given an error code indicating there is a problem with the disk. Which is the best answer?
117.
Which security tool can be doubled up to offer additional protection without being redundant?
118.
You have a wireless optical mouse and the mouse pointer is behaving erratically. What should you do first?
119.
How many wire pairs are in a CAT-5 cable?
120.
Which user has the smartest approach to online security?
121.
Which is an example of a phishing attack?
122.
You receive a malware warning regarding a specific file. Which approach should you take to ensure you do not have false positive?
123.
What are the best tools to use for physically cleaning a computer?
124.
A computer power supply is measured in ________________________________.
125.
If you had a 255.255.255.0 subnet mask, how many usable IP addresses would you have for hosts?
126.
Tania was told to address an issue in the UEFI. How is it accessed?
127.
Tania was told to change a setting in the UEFI. How is it accessed?
128.
What is the technical reason why you must properly eject media?
129.
Which part of the network assigns an IP address?
130.
Expansion cards follow which current interface standard?
131.
Which action triggers a UAC warning?
132.
Which choice is not a current mass storage type?
133.
Which statement most accurately describes the northbridge or host bridge?
134.
Which characters are not allowed in a filename?
135.
What is the most direct way to change the desktop background in Windows OS?
136.
Which I/O components are typically found in a chipset on the motherboard?
137.
What does the acronym RAID refer to?
138.
What is an example of a top-level domain (TLD)?
139.
Jan is setting up a coffee shop's wireless network. Given the number of Wi-Fi networks within range, which are the best choices for a 2.4GHz Wi-Fi channel?
1 out of 3
140.
Which of the following would be the best password (hardest to crack)?
141.
TRUE or FALSE: Attachments should always be treated with caution, even if you know the sender.
142.
When visiting your favorite website, a pop-up appears that reads "You have won a free Apple iPod!" What should you do?
143.
You receive an email that says your PayPal account has been suspended pending confirmation of your personal information. The PayPal logo is in the body of the email, and the email is addressed "Dear Customer". The sender email is Service@PayPalCustomerServiceTeam.com. What should you do?
144.
You receive an email from a co-worker with an attachment. The subject line reads "Please See Attached Document". The email contains no further information. What should you do?
145.
You receive a text message warning you that your bank account has been suspended. If says that you must click on the link in the SMS and update your credentials within the next 24 hours. Is this message safe or unsafe?
146.
Which of the following is NOT a smart way to test a suspicious link?
147.
TRUE or FALSE: Using two-factor authentication is not an effective tool for securing your accounts.
148.
What is the only true guarantee against data loss due to a cyberattack such as ransomware?
149.
Which of these is a possible cause of a data disaster?
150.
TRUE or FALSE: I have anti-virus protection, so when it comes to network security, I'm all set.
151.
TRUE or FALSE: Cybersecurity is IT's responsibility. The everyday end users in the office don't need to worry about this topic.
152.
TRUE or FALSE: Software and application updates are not important and can just be ignored.
153.
TRUE or FALSE: Major companies like Netflix, Google, PayPal and FedEx are often the spoofed sender of phishing messages.
154.
What is the simplest way to stop brute-force cyberattacks dead in their tracks?
155.
What’s the quickest way to stop a suspected app, device, or OS from spying on you?
156.
What is the weakest link in cybersecurity?
157.
What is the first thing you should do if your company is facing ransomware demands?
158.
Which one of these things will a comprehensive cyber insurance NOT protect you from?
159.
What’s the best way to secure a weak password like “monkey123”?
160.
When using a VPN, what’s the one thing that you cannot hide from ISPs, hackers, and the government?
161.
The best way to minimize your digital footprint is to:
162.
What is most valuable to companies looking to sell you something?
163.
What’s the best way to deal with pesky robocalls?
164.
Which organization is the most vulnerable to hacking?
165.
When is it ok to reuse a password?
166.
What should you do if you think your identity or accounts have been compromised?
167.
The best defense against ransomware is being proactive when you:
168.
What’s the best way to steer clear of IoT device security hacks?
169.
What is the best way to keep employees from falling for phishing scams?
170.
What is the best way to maintain privacy between two parties?
171.
Which one of these things is most effective for maintaining your digital privacy?
172.
Which of the following should you do to restrict access to your files and devices?
173.
Backing up important files offline, on an external hard drive or in the cloud, will help protect your business in the event of a cyber attack. True or False?
174.
Which is the best answer for which people in a business should be responsible for cybersecurity?
175.
Cyber criminals only target large companies. True or False?
176.
Which of the following is the best answer for how to secure your router?
177.
Before connecting remotely to the company network, your personal device should meet the same security requirements as company-issued devices. True or False?
178.
What is a common way to help protect devices connected to the company network?
179.
Keeping your router’s default name will help security professionals identify it and thus help protect your network’s security. True or False?
180.
WPA2 and WPA3 encryption are the encryption standards that will protect information sent over a wireless network. True or False?
181.
Which of the following describes the best way to make sure you are securely accessing the company network remotely?
183.
Local backup files – saved on your computer – will protect your data from being lost in a ransomware attack. True or False?
184.
Which of these best describes how criminals start ransomware attacks?
185.
If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?
186.
Setting your software to auto-update is one way you can help protect your business from ransomware. True or False?
2 out of 3
187.
What is a private cloud?
188.
Which of the following isn’t an advantage of cloud?
189.
What feature does not belong in a private cloud?
190.
Which of the following provide system resource access to virtual machines?
191.
_________________ computing refers to applications and services that run on a distributed network using virtualized resources.
192.
What are the advantages of "Software as a Service" (SaaS)?
193.
Which of the statements on cloud computing is true?
194.
Which of the following is not a cloud-based service?
195.
In the context of Cloud Computing, what is the full form of PaaS?
196.
Identify among the following, which are examples of SaaS cloud computing?
197.
Which of the following recent trends can be defined as the abstraction of different computing resources like processor, memory etc, and is the single most effective way to reduce IT expenses?
198.
Suppose a cloud contains software stack such as Operating system, application software, etc. This model is referred as _______________ model.
199.
Microsoft Azure is a __________________ computing service.
200.
Which of the following is not a cloud storage?
201.
_____________________ is a partitioning of single physical server into multiple logical servers.
3 out of 3