Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
Which of the following could be a major concern for implementing cloud computing
for business-critical services?
a. | A cloud provider’s inability to scale up or down. | c. | Being charged for
computing services that go unused. | b. | An intermittent or unavailable Internet
connection. | d. | Incompatible
software, hardware, or operating systems. |
|
|
2.
|
The first sector on the disk, called the boot sector or ____ record, contains
the information about how the disk is organized and the file system used.
a. | slave | c. | base | b. | interface | d. | boot |
|
|
3.
|
Which of the following is best practice to minimize the chance of infecting your
mobile device with malware?
a. | Install apps only from trusted sources. | c. | Install apps only from untrusted
sources. | b. | Keep the device fully charged. | d. | Perform regular
backups. |
|
|
4.
|
When is it okay to touch the inside of a computer
that is turned on?
a. | When reassembling the computer | c. | When using a multimeter to measure
voltage output | b. | When disassembling the computer | d. | When a qualified electronics expert or
electrician is present |
|
|
5.
|
Which of the following represents a method for
accessing the BIOS/UEFI setup program?
a. | Boot to the BIOS setup floppy disk | c. | Press a key or combination of keys
during the BIOS/UEFI POST | b. | Boot Windows and go to Control
Panel | d. | Set a motherboard
jumper and start the computer |
|
|
6.
|
A(n) ____ gets its name because it has independent pins on opposite sides of the
module.
a. | DIMM | c. | TRIMM | b. | RIMM | d. | SIMM |
|
|
7.
|
Which of the following aspects of cloud computing allows a service provider to
limit a customer’s use of a particular resource based on a service agreement between the
provider and the customer?
a. | On-demand | c. | Rapid elasticity | b. | Metered service | d. | Measured
service |
|
|
8.
|
With ____, two hard drives are configured as a single volume.
a. | wrapping | c. | bonding | b. | spanning | d. | binding |
|
|
9.
|
Your mobile device appears to be contacting a remote server to upload your
personal data. Which of the following should be performed first to protect your personal
data?
a. | Install anti-malware software. | c. | Switch to airplane
mode. | b. | Perform a factory reset. | d. | Verify you are on the correct Wi-Fi network. |
|
|
10.
|
A small bank with several regional branches is searching for a solution to
consolidate its business services into a single site with centralized management. The service should
provide secure resources for use by the bank, and these resources must be isolated from any other
organization using the same service provider. Which of the following will best meet the
needs of the bank?
a. | Private cloud | c. | Public cloud | b. | Community cloud | d. | Hybrid cloud |
|
|
11.
|
Where must virtualization be enabled for VM (virtual
machine) software to work?
a. | Jumper | c. | TPM chip | b. | BIOS/UEFI | d. | Windows Control
Panel |
|
|
12.
|
John just bought a used iPad from a friend who had lost the charging cable. John
notices that the cable is like the charging cable for his Android smartphone, though it is not quite
the same. What type of cable will John need to purchase to replace the iPad’s
charger cable?
a. | USB C | c. | Mini HDMI | b. | Micro USB | d. | Lightning |
|
|
13.
|
You are troubleshooting a mobile device that will not pair with a Bluetooth
headset. The device was functioning properly with the headset until a recent corporate-wide OS
update. No other mobile devices in the organization are exhibiting this issue with Bluetooth
headsets. Which of the following is the first step you will take to resolve this
issue?
a. | Reset the network settings in the mobile device Settings app. | c. | Forget all Wi-Fi
networks on the mobile device | b. | Update the radio firmware in the mobile
device. | d. | Replace the
Bluetooth headset with a new pair. |
|
|
14.
|
A Rambus memory module is called a(n) ____.
a. | RDIMM | c. | RIMM | b. | DIMM | d. | SIMM |
|
|
15.
|
Angela recently purchased a new Android smartphone. While purchasing the phone,
Angela was told that she would need to set up a new email account for the phone. Which
commercial email provider should Angela use for her new Android phone?
a. | Microsoft Exchange Online | c. | Gmail | b. | Yahoo!
Mail | d. | iCloud |
|
|
16.
|
A processor housing that contains more than one
processor is referred to as what term?
a. | Multithreaded processor | c. | Multicore
processor | b. | Multihoused processor | d. | Multiprocessor platform |
|
|
17.
|
Which of the following indicates the most concise abbreviation of the IPv6
address FEFE:0000:0000:0000:0002:0000:0000:0001?
a. | FEFE::0002:0000:0000:0001 | c. | FEFE:0:0:0:2:0:0:1 | b. | FEFE::2::1 | d. | FEFE::2:0:0:1 |
|
|
18.
|
Which of the following creates an environment that behaves in a hardware-like
manner to run software meant for other hardware?
a. | Virtualization | c. | Emulator | b. | Virtual desktop | d. | Zero client |
|
|
19.
|
If the chip’s surface is dull or matted, or you can scratch off the
markings with a fingernail or knife, suspect that the chip has been ____.
a. | re-burned | c. | installed new | b. | re-marked | d. | defaced |
|
|
20.
|
Memory in the processor package, but not on the processor die, is called ____
cache.
a. | Level 1 | c. | Level 3 | b. | Level 2 | d. | Level 4 |
|
|
21.
|
The ____-conductor IDE cable has half the number of pins as it has wires.
|
|
22.
|
What is a possible remedy if your system hangs at
odd times or during the boot?
a. | Flash the BIOS/UEFI | c. | Remove the TPM chip | b. | Install new CMOS RAM | d. | Format the hard
disk |
|
|
23.
|
A mobile device user has tried to install a new app numerous times without
success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an
attempt to get the app to install. Which of the following steps should the user take
next?
a. | Check for sufficient available storage space. | c. | Generate a new public
key. | b. | Disable full device encryption. | d. | Back up all user data and perform a factory
reset. |
|
|
24.
|
To use System Information, in the Vista Start Search box or the Windows XP Run
box, type ____ and press Enter.
a. | msinfo32 | c. | msconfig | b. | msinfo | d. | wininfo |
|
|
25.
|
A technician is troubleshooting a printer connected to a computer via USB. The
printer will print using the controls at the printer but fails to print from the
computer. Which of the following steps should be taken next?
a. | Verify the USB cable is attached. | c. | Check for low memory errors on the
printer. | b. | Verify the printer is powered on. | d. | Make sure printing paper is
installed. |
|
|
26.
|
Using the ____ technology, the Intel processor, chipset, and wireless network
adapter are all interconnected as a unit, which improves laptop performance.
a. | Centrino | c. | vPro | b. | Centrum | d. | Core |
|
|
27.
|
Over the past week, every time Larry has started his computer, he has noticed
that the time is not correct. Larry didn’t consider this a problem because his computer was
working properly. However, now Larry has decided that he should investigate why the time is not
accurate. ?3? What can you tell Larry to check to find
out why the clock does not keep the right time?
a. | The motherboard is going bad and needs to be replaced | c. | The internal time clock is
malfunctioning | b. | The CMOS battery is bad and needs to be replaced | d. | POST is failing |
|
|
28.
|
Gina is upgrading your computer with a new processor. She installs the processor
into your motherboard and adds the cooling system. She powers up the computer, and it begins to boot
but then shuts down. What could be the cause of this
problem?
a. | Processor is not compatible | c. | Thermal paste was not
used | b. | Computer is overclocked | d. | Processor is not seated properly |
|
|
29.
|
Your company received a call from a historical society inquiring about the
possibility of networking a two-century-old building with no existing network. In 1924, someone added
electrical outlets to the building, but the layout and design of the building prohibits adding any
additional copper or fiber cable. You completed a wireless site survey and concluded that wireless
networking is out of the question and will not properly function due to environmental
interference. Which of the following could be used to network
this building?
|
|
30.
|
According to the text, today’s DIMMs use what
size data path?
a. | 32-bit | c. | 64-bit | b. | 128-bit | d. | 16-bit |
|
Multiple Response Identify one
or more choices that best complete the statement or answer the question.
|
|
31.
|
A mobile device user is having problems keeping malware off his device. The user
is continuously removing offending apps and regularly running a check for OS updates. After a short
period of relief, the malware continues to be a problem. Which of the following are the
best actions for the user to take? (Select TWO.)
|
|
32.
|
A Windows computer is shared between several users, each with his own local user
account. Each user has his own dedicated, uniquely configured VM stored in a public folder on the
computer. Which of the following steps should be taken to secure the VMs so no user can
copy or delete another user’s VM files? (Select TWO.)
|
|
33.
|
Molly, a technician, has been tasked with researching an emulator for the
software developers to test cross-platform applications on various PCs and a variety of mobile
devices. Which of the following will be a required step in selecting an emulator?
(Select TWO.)
|
|
34.
|
Which of the following are secure protocols, ports, services, or applications?
(Select TWO.)
|
|
35.
|
A technician is working at a client’s office after hours and needs two
cables to finish the work but does not have immediate access to prebuilt cables. One cable needed is
for a dial-up connection from the dial-up modem to the existing analog POTS jack on the wall. The
other cable is for an Ethernet connection from the computer to the existing keystone jack on the
wall. The technician has the necessary wire and connectors to make the cables. Which of
the following tools will the technician use to make the cables and then verify that they both work
properly? (Select THREE.)
|
Matching
|
|
|
Match each item with a statement
below. a. | Bluetooth | f. | CPU | b. | POST | g. | DIMM | c. | PCIe | h. | airplane mode | d. | microATX | i. | SO-DIMM | e. | DisplayPort | j. | heat sink |
|
|
36.
|
All wireless technologies are turned off resulting in no transmission or
reception of wireless signals
|
|
37.
|
A diagnostic program built into a computer to test the hardware components
before the computer boots up
|
|
38.
|
The standard for computer expansion cards
|
|
39.
|
A short-range wireless technology used to connect two devices in a small
personal network
|
|
40.
|
The smaller form factor of the ATX. Its smaller size and reduced
expansion ports helps reduce costs and power consumption
|
|
41.
|
Smaller connectors for memory on laptops
|
|
42.
|
Performs most of the processing for data and instructions for the entire
system
|
|
43.
|
Draws heat away from the CPU or other heat sensitive components so that it can
be dissipated quickly
|
|
44.
|
The connector for memory found on a motherboard
|
|
45.
|
Transmits digital video and audio. They are slowly replacing VGA and DVI ports
on computers
|
True/False Indicate whether the
statement is true or false.
|
|
46.
|
Most often, placing memory on the motherboard and updating the BIOS manually is
all that is necessary for installation.
|
|
47.
|
A hard disk drive (HDD), most often called a hard drive, comes in two sizes for
personal computers: the 1.8" size is used for laptop computers and the 2.5" size is used
for desktops.
|
|
48.
|
Excessive heat can damage the CPU and the motherboard.
|
|
49.
|
A simple problem of replacing a bad memory module can become a complex research
project if you don’t have a good grasp of current and past memory technologies.
|
|
50.
|
If you are replacing a floppy drive, you must inform BIOS setup by accessing
setup and changing the drive type.
|