IT CertificationsComprehensive Study Set

Comptia Testout

325 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

This BEST describes Information Technology (IT)?

ANSWER

IT refers to everything tat involves computers.

QUESTION 2

Which of the following is something that an Information Technology (IT) professional would do?

ANSWER

Build and repair computers

QUESTION 3

Which of the following is something that an Information Systems (IS) professional would do?

ANSWER

Turn information into meaningful decisions

QUESTION 4

Which of the following BEST describes Computer Science (CS)?

ANSWER

It is the study of computers and computing concepts.

QUESTION 5

Which of the following is something a computer scientist would do?

ANSWER

Solve problems in areas like robotics

QUESTION 6

Mike decides to humiliate a former friend by posting embarrassing photos on social media. Which ethical standard did he violate?

ANSWER

Human dignity

QUESTION 7

Which of the following BEST describes personal responsibility?

ANSWER

How you act even if no one is watching

QUESTION 8

The IT staff at a hospital shares genetic information about specific patients with a life insurance company. Which ethical standard was violated?

ANSWER

Confidentiality

QUESTION 9

Which of the following BEST describes a code of ethics?

ANSWER

A set of rules or standards you adopt that dictate how you act

QUESTION 10

Which of the following is a type of input device?

ANSWER

Touchscreen

QUESTION 11

Which of the following is data temporarily stored on?

ANSWER

Memory chips

QUESTION 12

A user has entered a search string into an application and clicked on the search icon. Which of the following is the NEXT step in the computing process?

ANSWER

Processing

QUESTION 13

Which of the following lists the basic computing and processing steps in order?

ANSWER

Input, processing, output, and storage

QUESTION 14

Which of the following provides a computer system with the ability to retrieve and manipulate data at a future time?

ANSWER

Storage

QUESTION 15

Which of the following was the most widely used personal computer application until the mid-90s?

ANSWER

Word processing

QUESTION 16

Which invention made it possible to have an entire computer on a single circuit board?

ANSWER

Microchip

QUESTION 17

Which invention allowed computers to become smaller in size?

ANSWER

Transistors

QUESTION 18

Which of the following devices would MOST likely have a 4G connection?

ANSWER

Mobile phone

QUESTION 19

Digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. What is that value called?

ANSWER

Sample height

QUESTION 20

How many possible values would an 8-bit audio sample have?

ANSWER

256

QUESTION 21

Which of the following makes videos appear smoother and more fluid?

ANSWER

Higher frame rate

QUESTION 22

Which of the following is a lossless compression algorithm?

ANSWER

Run-length encoding

QUESTION 23

What are pixels that are the exact same between multiple frames called?

ANSWER

Temporal redundancy

QUESTION 24

Which kind of file would be hurt most by a lossy compression algorithm?

ANSWER

A text document

QUESTION 25

A typical computer monitor is which type of display?

ANSWER

RGB

QUESTION 26

Which type of digital picture is made by storing individual pixel values?

ANSWER

Raster

QUESTION 27

Which type of digital picture can be scaled to any size without losing quality?

ANSWER

Vector

QUESTION 28

Which of the following professionals would be MOST likely to create a poster?

ANSWER

Graphic designer

QUESTION 29

The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which career?

ANSWER

Graphic designer

QUESTION 30

Which of the following careers typically requires at least a bachelor's degree in telecommunications?

ANSWER

Video production specialist

QUESTION 31

Mary needs someone to make sure her podcast is high quality and sounds polished. Which of the following professionals should she hire?

ANSWER

Digital audio producer

QUESTION 32

Jessica is currently editing a commercial she helped create. Which of the following is MOST LIKELY her profession?

ANSWER

Video production specialist

QUESTION 33

Which of the following is a disadvantage of notebook systems?

ANSWER

They are more expensive.

QUESTION 34

Abby needs a device that she can take to a client's location and show presentations from. Which of the following devices would be the BEST option for her?

ANSWER

Laptop

QUESTION 35

Which of the following is an example of computer hardware?

ANSWER

Microchip

QUESTION 36

Which of the following devices make use of a battery as its main power source? (Select two.)

ANSWER

Smartphone,Laptop

QUESTION 37

Which of the following devices would be easiest to repair?

ANSWER

Desktop computer

QUESTION 38

Which of the following devices would be the BEST option for a gamer?

ANSWER

Desktop computer

QUESTION 39

Tina has accepted a position as a graphic designer. She wants a powerful device that she can connect multiple large screens to. Which device would be the BEST option for her?

ANSWER

Desktop computer

QUESTION 40

Which of the following is primarily operated by a touchscreen?

ANSWER

Mobile device

QUESTION 41

Abby wants a high-end computer system for her home office that can be upgraded. Which of the following should she choose?

ANSWER

Desktop

QUESTION 42

Which of the following components stores values in short-term memory?

ANSWER

RAM

QUESTION 43

Which hardware component processes data?

ANSWER

CPU

QUESTION 44

Which of the following components converts AC to DC?

ANSWER

Power supply

QUESTION 45

Which of the following computer components typically has the FASTEST performance?

ANSWER

CPU

QUESTION 46

Becca is working on a program that will store data. The program will need quick access to data and data persistence is not important. Where should the data be stored?

ANSWER

In memory

QUESTION 47

Which of the following should be done before working on hardware in a computer system?

ANSWER

Ground yourself using an ESD wrist strap

QUESTION 48

Which of the following voltages from an ESD discharge would be the minimum to short a computer's hardware components?

ANSWER

100 volts

QUESTION 49

Where are values the computer is directly working with at a particular moment in time stored?

ANSWER

On the CPU register

QUESTION 50

Which of the following companies is a manufacturer of CPUs?

ANSWER

Intel

QUESTION 51

Which CPU type would MOST LIKELY be found in a smartphone?

ANSWER

ARM

QUESTION 52

Which of the following is NOT a long-term storage device?

ANSWER

RAM

QUESTION 53

Which of the following uses persistent memory chips to store data?

ANSWER

Flash drive

QUESTION 54

Which of the following stores data using microscopic light and dark spots?

ANSWER

Compact disc

QUESTION 55

You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs?

ANSWER

Hard disk

QUESTION 56

Which of the following is not an advantage of SSDs over HDDs?

ANSWER

Inexpensive

QUESTION 57

Which of the following are optical storage devices? (Select three.)

ANSWER

BD,CD,DVD

QUESTION 58

Which of the following has the ability to store user data even if the power to the computer is off?

ANSWER

Hard drive

QUESTION 59

Which of the following methods will NOT open a file from the desktop?

ANSWER

Single-click the icon

QUESTION 60

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?

ANSWER

Full Control

QUESTION 61

Which of the following is often the hardest part of troubleshooting?

ANSWER

Reproducing the problem

QUESTION 62

Which of the following problems would be the MOST difficult to troubleshoot?

ANSWER

Intermittent problem

QUESTION 63

Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology?

ANSWER

Establish a theory of probable cause

QUESTION 64

While troubleshooting a problem with a computer, a technician has tested and confirmed a theory on how to fix the problem. Which of the following is the NEXT step the technician should perform?

ANSWER

Establish a plan of action to solve the problem and identify potential effects

QUESTION 65

Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed?

ANSWER

Document findings/lessons learned, actions, and outcomes

QUESTION 66

The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step?

ANSWER

Duplicate the problem, if possible

QUESTION 67

Which of the following is a top cause of motherboard failure?

ANSWER

Physical damage

QUESTION 68

A computer has power, but there are no beeps and the computer does not boot. Which of the following would be the MOST LIKELY cause?

ANSWER

CPU failure

QUESTION 69

Which of the following would be the MOST LIKELY cause for a computer to perform sluggishly?

ANSWER

Hard drive

QUESTION 70

Which of the following would a PC repair technician work on?

ANSWER

Laptop

QUESTION 71

Which of the following is the MOST important skill for a PC technician?

ANSWER

Customer service

QUESTION 72

Which of the following would be the MINIMUM qualification for a PC technician job?

ANSWER

Industry certification

QUESTION 73

Which of the following careers consists of designing tiny microchips?

ANSWER

Electrical engineer

QUESTION 74

Which of the following should an electrical engineer be proficient in using?

ANSWER

CAD software

QUESTION 75

Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software?

ANSWER

Utility Software

QUESTION 76

Which category of system software provides a platform for application software to run on?

ANSWER

Operating System

QUESTION 77

Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

ANSWER

Device drivers

QUESTION 78

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?

ANSWER

Firmware

QUESTION 79

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. Which of the following BEST describes the next step you should perform?

ANSWER

Check the vendor's website for an updated driver.

QUESTION 80

As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is installed on most of the machines in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility will allow you to manually update this new driver?

ANSWER

Device Manager

QUESTION 81

Carrol purchased a new printer and attached it to her workstation with a USB cable. The printer is powered on, but the computer does not recognize the printer. Which of the following should Carrol do NEXT to be able to send print jobs to the printer?

ANSWER

Install the latest printer driver

QUESTION 82

Which component gets things running until the operating system takes over?

ANSWER

BIOS

QUESTION 83

You need to test a version of macOS but only have a Windows computer. What technology could you use?

ANSWER

Virtualization

QUESTION 84

If you select a file on the desktop and press "Delete" on your keyboard, what happens to the file?

ANSWER

It's moved to the Recycle Bin

QUESTION 85

Designations at the end of file names such as .docx and .html are called _____________.

ANSWER

File extensions

QUESTION 86

Which permission option lets a user view files but not change them?

ANSWER

Read

QUESTION 87

Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?

ANSWER

Modify

QUESTION 88

The accounting department needs to be able to share files, such as spreadsheets, that can be accessed by everyone in the department. Which of the following would work BEST to provide a collaborative workspace?

ANSWER

Network share

QUESTION 89

Which of the following operating systems require a file extension to execute a program?

ANSWER

Windows

QUESTION 90

What type of file system is NTFS?

ANSWER

Journaling

QUESTION 91

Which of the following commands is used to navigate to different folders in Command Prompt?

ANSWER

cd

QUESTION 92

Mary needs to rename her report.txt file to final_report.txt. Which command will allow her to do this?

ANSWER

ren report.txt final_report.txt

QUESTION 93

In Windows PowerShell, which key can be used to autocomplete a command?

ANSWER

Tab

QUESTION 94

Which of the following is NOT an example of a web browser?

ANSWER

Microsoft Word

QUESTION 95

Which of the following applications can be used for storing, modifying, extracting, and searching data?

ANSWER

Database software

QUESTION 96

When composing an email message, why might you want to use the Bcc field?

ANSWER

To copy the email confidentially

QUESTION 97

What is junk email?

ANSWER

Unwanted, unsolicited email

QUESTION 98

Which of the following digital communication media does NOT require a connection to the Internet?

ANSWER

SMS

QUESTION 99

What is the name of the menu in the bottom left corner of the Windows environment?

ANSWER

Start Menu

QUESTION 100

What is the name of the narrow strip along the bottom of the Windows environment?

ANSWER

Taskbar

QUESTION 101

What is the name of the large background area of the Windows environment that holds icons for files, folders, and applications?

ANSWER

Desktop

QUESTION 102

Which of the following commands makes an application shortcut appear on the taskbar?

ANSWER

Pin to taskbar

QUESTION 103

Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do?

ANSWER

Install the latest driver

QUESTION 104

Where is the BEST place to obtain the latest printer driver?

ANSWER

Manufacturer's website

QUESTION 105

Windows stores print jobs in a temporary file on the hard drive. What is this file called?

ANSWER

Print queue

QUESTION 106

Julie has 3 printers installed on her Windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?

ANSWER

Settings > Devices > Printers & scanners

QUESTION 107

anice installed a printer on her computer and shared it with Steve. Steve configured the printer on his computer and was able to print a test page. Later on that day, Steve attempts to print but gets an error that the printer is not responding. Which of the following would be the MOST LIKELY reason for this?

ANSWER

Janice has turned off her computer

QUESTION 108

Where would you go to cancel a print job?

ANSWER

Print queue

QUESTION 109

Which of the following is a proper path name to a shared network printer?

ANSWER

\\computer_name\printer_name

QUESTION 110

Which component is responsible for reformatting print jobs so that the printer can understand and process them?

ANSWER

Print driver

QUESTION 111

Which of the following processes does 3D printing use?

ANSWER

Additive

QUESTION 112

Which of the following is a benefit of 3D printing over traditional manufacturing?

ANSWER

Consumes less material

QUESTION 113

Martin's computer suddenly displayed a blue screen and then restarted. Which of the following BEST describes what happened?

ANSWER

System crash

QUESTION 114

Sarah turned on her computer and noticed that some important documents that were stored in her User folder are now missing. Which of the following would be the MOST LIKELY cause?

ANSWER

Malware infection

QUESTION 115

Which of the following terms describes the process of rearranging files on the hard drive so that the computer runs more efficiently?

ANSWER

Defragmentation

QUESTION 116

Which of the following keys is used to enter Safe Mode on a Windows computer?

ANSWER

F8

QUESTION 117

Which of the following is the first step in verifying that a problem has been fixed?

ANSWER

Rebooting the system

QUESTION 118

Which of the following is used to force-close a program on an Apple computer?

ANSWER

Option, Command, Escape

QUESTION 119

Which Windows tool shows currently running programs and can be used to end a process?

ANSWER

Task Manager

QUESTION 120

Which of the following key combinations lets you open Task Manager?

ANSWER

CTRL, ALT, DELETE

QUESTION 121

Which tab in Task Manager can be used to manage programs that load with Windows?

ANSWER

Startup

QUESTION 122

Which of the following is the BEST way to handle a program that is unresponsive?

ANSWER

Force-close the program

QUESTION 123

What is the main difference between a regular technical support specialist and a managed service provider technician?

ANSWER

Managed service provider's services are outsourced as a third party.

QUESTION 124

Which of the following would be responsible for resetting a user's password?

ANSWER

Level 1 support technician

QUESTION 125

What should a level 1 technician do when they are unable to solve an issue?

ANSWER

Escalate to a higher level of support.

QUESTION 126

Which of the following would be a reason a company would outsource their IT support?

ANSWER

To cut costs

QUESTION 127

How many years of prior experience in tech support do most MSP positions require?

ANSWER

2

QUESTION 128

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?

ANSWER

Internet

QUESTION 129

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

ANSWER

World Wide Web

QUESTION 130

Which of the following terms describes an organization that connects users to the Internet?

ANSWER

Internet Service Provider

QUESTION 131

A _________ is a private network that utilizes the same technologies as the Internet.

ANSWER

Intranet

QUESTION 132

Which of the following is used to identify specific hypertext resources on the World Wide Web?

ANSWER

Uniform Resource Locator

QUESTION 133

Which medium does Wi-Fi use to send data between networks and devices?

ANSWER

Radio waves

QUESTION 134

Which of the following technologies can be used to make a phone call over an Internet connection?

ANSWER

VoIP

QUESTION 135

Which of the following is a disadvantage of web applications?

ANSWER

Web applications can carry a monthly or yearly fee.

QUESTION 136

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not?

ANSWER

Wikis

QUESTION 137

Which service would be most useful when looking for information about your favorite TV show?

ANSWER

Search engine

QUESTION 138

Wikipedia is considered which of the following sources?

ANSWER

Tertiary

QUESTION 139

Which of the following is most likely to have peer-reviewed material written by an expert in the field?

ANSWER

Academic journal

QUESTION 140

Which of the following are primary sources? (Select two.)

ANSWER

Jane Austen's Pride and Prejudice, The United States Constitution

QUESTION 141

Which of the following is the BEST reason to search for articles in an online academic database?

ANSWER

The sources are more likely to be peer reviewed

QUESTION 142

Which method should be used to search for an exact phrase?

ANSWER

Put the search terms in "quotes"

QUESTION 143

You submitted the same paper from high school for a college class. Which form of plagiarism is this?

ANSWER

Self

QUESTION 144

John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in?

ANSWER

Mosaic

QUESTION 145

You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in?

ANSWER

Accidental

QUESTION 146

What is a web designer responsible for?

ANSWER

The look and feel of a website

QUESTION 147

In addition to good design sense, what else do web designers need to be proficient in?

ANSWER

Front-end coding languages

QUESTION 148

Social media marketers need the ability to do what?

ANSWER

Collaborate across teams

QUESTION 149

Which of the following is the MOST important skill an internet service technician can possess?

ANSWER

The ability to quickly troubleshoot and fix any issues that may arise from customers

QUESTION 150

Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels?

ANSWER

Internet service technician

QUESTION 151

Which of the following components is NOT required to create a network?

ANSWER

Wireless adapter

QUESTION 152

Multiple computers configured to be able to communicate and share information with each other form a ____________.

ANSWER

Network

QUESTION 153

Which of the following is the best definition for a LAN?

ANSWER

A network in a small geographic area, like in an office.

QUESTION 154

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.Which of the following features lets you allow or reject client connections based on the hardware address?

ANSWER

MAC address filtering

QUESTION 155

Which of the following provides services to hosts on its network?

ANSWER

Server

QUESTION 156

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter.Which of the following is the technology being used in these phones?

ANSWER

NFC chips

QUESTION 157

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

ANSWER

Ethernet

QUESTION 158

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network.Which of the following network devices would be the BEST choice for this connectivity?

ANSWER

Access point

QUESTION 159

Which of the following is the best device to deploy to protect your private network from an untrusted public network?

ANSWER

Firewall

QUESTION 160

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

ANSWER

Modem

QUESTION 161

Which of the following are characteristics of Bluetooth? (Select two.)

ANSWER

Ad hoc connections, 2.4 GHz radio wireless

QUESTION 162

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)

ANSWER

802.11a, 802.11g

QUESTION 163

Which of the following is used on a wireless network to identify the network name?

ANSWER

SSID

QUESTION 164

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

ANSWER

WPA2

QUESTION 165

Which of the following features is supplied by WPA2 on a wireless network? (Select two.)

ANSWER

Encryption, Authentication

QUESTION 166

Which of the following provides security for wireless networks?

ANSWER

WPA2

QUESTION 167

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?

ANSWER

5 GHz

QUESTION 168

Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?

ANSWER

802.11n

QUESTION 169

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?

ANSWER

Improved performance

QUESTION 170

Which network type uses a coaxial cable to receive its signal?

ANSWER

Cable

QUESTION 171

Which network type uses light pulses to transmit data?

ANSWER

Fiber optic

QUESTION 172

Which of the following is not an example of wireless networking communications?

ANSWER

DSL

QUESTION 173

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

ANSWER

Satellite

QUESTION 174

Which of the following Internet technologies provides the FASTEST speeds?

ANSWER

Fiber optic

QUESTION 175

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet?

ANSWER

Satellite

QUESTION 176

Which cellular network type was the first to have gigabit-per-second speeds?

ANSWER

4G

QUESTION 177

Which cellular network type was the first kind of network to use encryption?

ANSWER

2G

QUESTION 178

Which of the following allows for access to the internet without either a Wi-Fi or a wired connection?

ANSWER

Mobile data

QUESTION 179

Which of the following statements is true regarding a VPN?

ANSWER

A VPN masks a user's IP address in order to make their actions untraceable.

QUESTION 180

What is the name of the protocol suite used on the Internet?

ANSWER

TCP/IP

QUESTION 181

The ______________ is an information system that connects documents to each other by hypertext links.

ANSWER

World Wide Web

QUESTION 182

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

ANSWER

IMAP

QUESTION 183

What protocol is used to send email messages from a mail client to a mail server?

ANSWER

SMTP

QUESTION 184

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email.Which of the following should be implemented?

ANSWER

Email filtering

QUESTION 185

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?

ANSWER

POP3

QUESTION 186

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?

ANSWER

Client error

QUESTION 187

What is the biggest benefit to using a DHCP server in a large network?

ANSWER

They save time for the network administrator.

QUESTION 188

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

ANSWER

Local installation

QUESTION 189

Which of the following Application Architecture Model tiers describes office productivity software?

ANSWER

One Tier

QUESTION 190

What is the term for software that anyone can use or modify for free?

ANSWER

Open-source Software

QUESTION 191

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality.What is the name of this model?

ANSWER

Open Source

QUESTION 192

Which installation method is most likely to put your computer at risk of downloading a virus?

ANSWER

Internet installation

QUESTION 193

Which application makes sure your computer has the most recent versions of its system software?

ANSWER

Windows Update

QUESTION 194

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features.Which of the following would BEST protect your computers?

ANSWER

Windows updates

QUESTION 195

Which of the following tools would you use to check connectivity between two computers?

ANSWER

Ping

QUESTION 196

How many ping packets are sent by default in a successful ping request?

ANSWER

Four

QUESTION 197

Which of the following utilities would you use to find the path between two computers?

ANSWER

Tracert

QUESTION 198

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer?

ANSWER

Device Manager

QUESTION 199

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use?

ANSWER

Network & Internet

QUESTION 200

If your network does not have a DHCP server, what must you do to access the internet?

ANSWER

Manually change the TCP/IP properties to match your network's settings.

QUESTION 201

Which of the following utilities would you use to automatically assign IP addresses on a network?

ANSWER

DHCP

QUESTION 202

Which of the following BEST describes the ipconfig utility?

ANSWER

It is a utility that displays all current TCP/IP network configuration values.

QUESTION 203

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use?

ANSWER

Tracert

QUESTION 204

Which of the following BEST describes the ping utility?

ANSWER

It sends a single packet to a specified network address and then waits for a reply.

QUESTION 205

Which of the following IT jobs includes installing and configuring network media?

ANSWER

Network administrator

QUESTION 206

Which of the following IT jobs typically do not require as much education or on-the-job experience?

ANSWER

Network technician

QUESTION 207

Which of the following statements is true regarding a network architect?

ANSWER

They typically require an industry certification in network design and implementation.

QUESTION 208

Which of the following statements is true regarding a network technician?

ANSWER

They troubleshoot reported problems and assist users in resolving network-connection issues.

QUESTION 209

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?

ANSWER

Network Architect

QUESTION 210

Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report?

ANSWER

Query builder

QUESTION 211

A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?

ANSWER

Programmatic access

QUESTION 212

What is the computer language that makes relational databases work?

ANSWER

SQL

QUESTION 213

Which command is used to add, change, or remove fields on an existing table?

ANSWER

ALTER TABLE

QUESTION 214

Mary needs to view all records from the Clients table. Which command should she use?

ANSWER

SELECT * FROM Clients

QUESTION 215

Mary needs to view the records from the Clients table that pertain to Travis. Which command should she use?

ANSWER

SELECT * FROM Clients WHERE name = Travis

QUESTION 216

Which SQL command is used to give a user permission to a specific database object?

ANSWER

GRANT

QUESTION 217

Which process exports a database into a format that can be read by another program like a spreadsheet?

ANSWER

Database dump

QUESTION 218

Which of the following are the four general tasks a user needs to perform for a database to function properly?

ANSWER

Create, Read, Update, Delete

QUESTION 219

Which of the following can be used to ask a database questions and receive the data we're looking for?

ANSWER

Queries

QUESTION 220

Which of the following careers is responsible for backing up and securing an organization's databases?

ANSWER

Database administrator

QUESTION 221

Which of the following careers typically requires programming expertise in languages such as Java and Python, in addition to skills in optimizing database systems?

ANSWER

Database developer

QUESTION 222

Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns in data?

ANSWER

Data analyst

QUESTION 223

Which of the following careers requires advanced programming and analytical skills related to data mining and big data analytics?

ANSWER

Data scientist

QUESTION 224

Which of the following careers often requires that one works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes?

ANSWER

Data analyst

QUESTION 225

On a flowchart, which of the following represents a decision?

ANSWER

Diamond

QUESTION 226

Which of the following BEST describes a flowchart?

ANSWER

It is a visual representation of the logic in a program.

QUESTION 227

What is the term for code that keeps running as long as a certain condition is met?

ANSWER

While loop

QUESTION 228

You are working on a program that needs to keep track of many values at the same time. Which of the following would you use?

ANSWER

An array

QUESTION 229

A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used?

ANSWER

Branching

QUESTION 230

Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?

ANSWER

Looping

QUESTION 231

Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?

ANSWER

Algorithm

QUESTION 232

Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.)IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%.

ANSWER

Branching, 8%

QUESTION 233

A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Which of the following describes the procedural, or imperative, programming paradigm?

ANSWER

It uses a linear, top-down approach to solving problems.

QUESTION 234

Which of the following describes the declarative programming paradigm?

ANSWER

It uses a domain-specific language (DSL) to instruct the program what needs to be done.

QUESTION 235

Which of the following can be used by a programmer to debug code?

ANSWER

Integrated development environment (IDE)

QUESTION 236

Which of the following features of an integrated development environment (IDE) BEST allow a programmer to code faster and with less effort? (Select two.)

ANSWER

An IDE has a library of built-in functions, An IDE can autocomplete key words.

QUESTION 237

A software developer wants to add a custom Google Map to a customer's website. Which of the following would the developer use to accomplish this?

ANSWER

Application programming interface (API)

QUESTION 238

A software developer wants to create an application that will work on Windows and Apple iOS operating systems. What can the developer do to make this task easier?

ANSWER

Use the APIs for each operating system.

QUESTION 239

Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do?

ANSWER

It gets input and produces output.

QUESTION 240

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?

ANSWER

import random

QUESTION 241

A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?

ANSWER

JavaScript

QUESTION 242

A person that can use HTML, CSS, and JavaScript to create websites (as well as service the website and manage user accounts) is known as which of the following?

ANSWER

A full-stack web developer

QUESTION 243

Which of the following job tasks would be something a QA specialist would do?

ANSWER

Monitor software development in order to maintain a high-quality product.

QUESTION 244

In which of the following careers does one usually work together in teams to create software programs?

ANSWER

Application developer

QUESTION 245

Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________.

ANSWER

Frontend

QUESTION 246

Databases, authentication, and user accounts are all part of a website's ______________.

ANSWER

Backend

QUESTION 247

Which type of Information System (IS) is used to help doctors diagnose diseases?

ANSWER

Expert systems

QUESTION 248

An information system is made up of which of the following general components?

ANSWER

Technology, people, and procedures

QUESTION 249

Which of the following is NOT an example of an information system?

ANSWER

Electrical system

QUESTION 250

Which of the following BEST describes expert systems?

ANSWER

They are programs designed to solve complex problems in specific domains.

QUESTION 251

Which of the following Artificial Intelligence (AI) concepts includes self-driving cars?

ANSWER

Robotics

QUESTION 252

The flow of goods and services from the producer to the consumer is known as which of the following?

ANSWER

Supply chain

QUESTION 253

Which of the following BEST describes a customer relationship management (CRM) system?

ANSWER

It organizes notes, activities, and metrics into one system that works altogether.

QUESTION 254

Which of the following is cryptocurrency?

ANSWER

Bitcoin

QUESTION 255

Which of the following is both an advantage and disadvantage of using cryptocurrencies?

ANSWER

They allow for complete privacy.

QUESTION 256

Which of the following describes the process of turning data points into useful information?

ANSWER

Data analytics

QUESTION 257

Which of the following describes using data analytics to inform business operations?

ANSWER

Data-driven business decisions

QUESTION 258

Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations?

ANSWER

Statistical tools and formulas

QUESTION 259

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?

ANSWER

Bar graph

QUESTION 260

When working with an application such as Microsoft Excel to generate graphical reports, which of the following chart types would work BEST for data that has relative percentages of a whole?

ANSWER

Pie chart

QUESTION 261

When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?

ANSWER

Line graph

QUESTION 262

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?

ANSWER

Reports

QUESTION 263

What is the first step of the data analytics process?

ANSWER

Collecting raw data

QUESTION 264

A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?

ANSWER

Data and information

QUESTION 265

What is the collective name for creations that are not the intellectual property of anybody?

ANSWER

Public Domain

QUESTION 266

Which of the following rights is NOT guaranteed by copyright?

ANSWER

Right to avoid criticism

QUESTION 267

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?

ANSWER

Fair Use

QUESTION 268

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?

ANSWER

Trademark

QUESTION 269

Which of the following exist to help consumers know what products they're buying?

ANSWER

Trademarks

QUESTION 270

Bill wants to use an image he found online. The license says he can use it but must credit the original creator. Which Creative Commons license was used?

ANSWER

Attribution

QUESTION 271

Diana is using an image she found online in a poster that she is selling, even though the license states she is not allowed to make money off of it. Which license type would Diana MOST LIKELY be violating?

ANSWER

Non-Commercial

QUESTION 272

Which Creative Commons license type states that a work can be distributed as long as it is not changed?

ANSWER

No Derivative Works

QUESTION 273

Which of the following is a Digital Millennium Copyright Act (DMCA) provision that protects ISPs from being held liable for the copyright infringement others who use their systems commit?

ANSWER

Safe Harbor

QUESTION 274

A short piece of copyrighted music is used in a news story covering the musical artist. Which DMCA provision would MOST LIKELY allow this?

ANSWER

Fair Use

QUESTION 275

Which of the following security measures is a form of biometrics?

ANSWER

Fingerprint scanner

QUESTION 276

What do biometrics use to perform authentication of identity?

ANSWER

Biological attributes

QUESTION 277

Which of the following is not a form of biometrics?

ANSWER

Smart card

QUESTION 278

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?

ANSWER

Multifactor authentication

QUESTION 279

Your company wants to use multifactor authentication. Which of the following would you most likely suggest?

ANSWER

PIN and smart card

QUESTION 280

A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

ANSWER

Principle of least privilege

QUESTION 281

Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can't save the file. Which of the following digital security methods is MOST likely preventing this?

ANSWER

Directory permission

QUESTION 282

Which of the following access controls gives only backup administrators access to all servers on the network?

ANSWER

Role-based

QUESTION 283

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

ANSWER

Accounting

QUESTION 284

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

ANSWER

Non-repudiation

QUESTION 285

Which Internet protocol is used to transmit encrypted data?

ANSWER

HTTPS

QUESTION 286

Which of the following protocols can be enabled so email is encrypted on a mobile device?

ANSWER

SSL

QUESTION 287

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened.Which of the following email protocols is being used?

ANSWER

S/MIME

QUESTION 288

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

ANSWER

WPA2 and AES

QUESTION 289

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. Which of the following should the technician configure?

ANSWER

VPN

QUESTION 290

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?

ANSWER

Plain text

QUESTION 291

An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email?

ANSWER

Cipher text

QUESTION 292

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used?

ANSWER

WPA2

QUESTION 293

The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen?

ANSWER

Full disk encryption

QUESTION 294

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?

ANSWER

VPN

QUESTION 295

The process of proving to the computer that you are who you say you are is called ____________.

ANSWER

Authentication

QUESTION 296

Which of the following would best prevent an unauthorized person from remotely accessing your computer?

ANSWER

Firewall

QUESTION 297

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________.

ANSWER

Spam

QUESTION 298

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

ANSWER

Change the router's default password

QUESTION 299

Why is it better to use a credit card than a debit card for online purchases?

ANSWER

Credit cards have better fraud protection

QUESTION 300

Which software is Microsoft's anti-malware product that is preinstalled on most new computers?

ANSWER

Windows Defender

QUESTION 301

Which of the following BEST describes a system administrator?

ANSWER

He or she is typically responsible for securing networks and responding to intrusions in smaller organizations.

QUESTION 302

A security analyst does which of the following?

ANSWER

Inspects the company's network for security breaches and recommends measures to prevent future attacks.

QUESTION 303

Which of the following is the system administrator's MOST important task?

ANSWER

Monitoring and maintaining system security

QUESTION 304

Which of the following would you do as a computer forensics expert?

ANSWER

Recover digital evidence, some of which may have been damaged or deleted from storage devices.

QUESTION 305

Forensics experts need to be thoroughly familiar with which of the following?

ANSWER

Data encryption methods, operating systems, and programming languages

QUESTION 306

Which of the following would be the BEST option to help you narrow down choices when identifying a career in IT?

ANSWER

Career Assessment Tests

QUESTION 307

Once you've identified a specific IT career you'd like to pursue, which of the following can BEST help you create a career plan? (Select two.)

ANSWER

Compare your current experience with job qualifications, Set clearly defined goals

QUESTION 308

Which of the following future trends in Information Technology (IT) refers to an organization automating as many tasks as possible?

ANSWER

Hyper-automation

QUESTION 309

Dana has performed a transaction online. The transaction is recorded in a public database. Which future IT trend was MOST LIKELY used?

ANSWER

Blockchain technology

QUESTION 310

Steve has just installed a new thermostat in his home that allows him to monitor and adjust the temperature from his phone even while he's away. Which future IT trend is this part of?

ANSWER

Internet of Things (IoT)

QUESTION 311

Which of the following future IT trends will require many data analysts who can collect data, decide which data is relevant, and make good decisions based on that data?

ANSWER

Predictive healthcare

QUESTION 312

Which of the following schools allows students to receive dedicated training for a specific career?

ANSWER

Technical college

QUESTION 313

Which type of college would you attend to earn a bachelor's degree?

ANSWER

University

QUESTION 314

Which of the following certifications would you pursue to help you land a job as a network administrator?

ANSWER

Cisco CCNA

QUESTION 315

Mary is interested in moving into a career as a penetration manager. Which of the following IT certifications should she pursue?

ANSWER

CEH

QUESTION 316

Which of the following personality traits means that you possess high moral character regardless of whether you're being watched by others?

ANSWER

Integrity

QUESTION 317

Speaking in front of a mirror can help to improve which of the following traits?

ANSWER

Social skills

QUESTION 318

Making real and authentic connections with people is known as which of the following?

ANSWER

Networking

QUESTION 319

How long should a good elevator pitch be?

ANSWER

30 seconds

QUESTION 320

How many pages should a resume be for someone looking for their first job?

ANSWER

1

QUESTION 321

Which of the following is the most common type of resume?

ANSWER

Chronological

QUESTION 322

Which of the following should you do before going to an interview?

ANSWER

Research the company history and culture

QUESTION 323

Which of the following would be the BEST answer to the question, "What is your greatest weakness"?

ANSWER

"I lack patience but this is something I'm working on."

QUESTION 324

Which of the following would be the BEST thing to do following an interview?

ANSWER

Send a thank you note

QUESTION 325

Which of the following is a good general rule to go by when deciding what to wear to an interview?

ANSWER

Dress one step above what the position requires.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials