1) While working at a help desk Tanya is troubleshooting a storage device issue. She notices a number labeled 0x1A3. She wants to convert it to decimal to explain to the customer how much space is involved. Which numbering system is Tanya using? a) Decimal b) Binary c) Hexadecimal d) Octal 2) During an introductory cybersecurity course, a student is asked to convert the binary number 1010 into a more readable format. What decimal number does the binary 1010 represent? a) 5 b) 10 c) 12 d) 15 3) Julio is designing a form where users will input their phone numbers. He needs to decide the best way to store this information in his program. What data type should he use? a) Boolean b) Integer c) String d) Float 4) During a database design meeting, Nia is asked to create a field that stores "True or False" values indicating whether costumers are on a mailing list. What data type should she use? a) Integer b) String c) Float d) Boolean 5) Ravi is explaining the basic operation of a computer to a new team member. He mentions a component that performs calculations and decision-making. What component is Ravi refering to? a) RAM b) Hard Drive c) CPU d) Power Supply 6) Kim notices her laptop runs slower when she opens many applications at once. A technician explains it may be due to insufficient short-term memory. Which component is most likely responsible? a) ROM b) SSD c) CPU d) RAM 7) A company experiences a data breach, and customer payment information is leaked. What kind of data does this represent in terms of value? a) Public Data b) Proprietary Data c) Sensitive Data d) Open-Source Data 8) Leo works in marketing and compiles customer behavior data from multiple sources. His boss tells him this data is now a valuable business asset. What term best describes this transformation of raw data into valuable information? a) Encryption b) Insight c) Data Valuation d) Information Processing 9) Priya is transferring a video file and notices it is labeled as 2 GB. Her friend asks how many megabytes that is. Which of the following is the correct conversion? a) 512 MB b) 1024 MB c) 2048 MB d) 4096 MB 10) While comparing internet plans, Devin sees a speed listed as 100 Mbps. What does the lowercase "b" in Mbps stand for? a) Bytes b) Blocks c) Bits d) Bundles 11) Monique's printer won't work. She checks the power, confirms the paper is loaded, a tries another outlet. What troubleshooting step is she performing? a) Documenting the issue b) Escalating the problem c) Establishing a theory d) Testing the theory 12) David is troubleshooting a failed login issue. He interviews the user, checks the access logs, and gathers system data. What step in the troubleshooting methodology is this? a) Establish a plan b) Document findings c) Identify the problem d) Implement a solution 13) After solving a persistent Wi-Fi issue, Jasmine updates her help desk system with notes on what caused the problem and how it was fixed. Which step is she completing? a) Identify the problem b) Verify functionality c) Establish a theory d) Document findings 14) Maya is connecting a high-definition webcam to her laptop for a video interview. She wants a fast connection that also provides power. Which port is the most appropriate? a) HDMI b) VGA c) USB-C d) RJ-45 15) Jared plugs a monitor into his desktop using a blue connector with multiple pins. He's using an older analog interface. What interface is he using? a) HDMI b) DisplayPort c) VGA d) DVI 16) Sandra is setting up a new wireless mouse. After inserting the USB receiver, the mouse automatically starts working. What processed allowed the system to recognize the device without manual driver installation? a) BIOS configuration b) Device polling c) Plug and Play d) Firmware flashing 17) Louis installs a new external hard drive but it’s not showing up on his system. What is the most likely reason? a) The hard drive has a virus b) The system BIOS is outdated c) The drive needs to be formatted or initialized d) The monitor cable is disconnected 18) During a PC upgrade, Nina replaces the component responsible for short-term memory storage to improve multitasking. Which part did she most likely upgrade? a) CPU b) SSD c) GPU d) RAM 19) A technician tells a client that their computer's "brain" needs to be replaced after a power surge. Which component is he referring to?? a) Power Supply b) CPU c) Hard Drive d) BIOS 20) Ryan lives in a rural area with limited broadband access. His only option is a connection that relies on a dish mounted outside and offers high latency. What type of internet service is this? a) DSL b) Satellite c) Cable d) Fiber 21) Marta's apartment building offers high-speed internet over coaxial cables shared among tenants. What type of internet service is this? a) Cable b) DSL c) Dial-up d) Fiber 22) Ken is choosing between storage options for his new gaming PC. He wants fast boot times and rapid load speeds. Which type of drive should he choose? a) HDD b) SSD c) Optical Drive d) Tape Drive 23) Angela uses an external drive for daily backups, which stores data magnetically and offers large capacity at a lower cost. What type of device is she most likely using? a) Solid-state drive b) Tape cartridge c) Flash drive d) Hard disk drive 24) Carlos configures his home router with an IP address of 192.168.1. What class of IP address is this, and what does it represent? a) Public Class B b) Private Class A c) Private Class C d) Public Class C 25) Melissa wants her PC to always have the same IP address, even after rebooting. What should she configure? a) Static IP b) DNS c) DHCP d) NAT 26) David is setting up a website and wants to ensure all information entered by visitors is encrypted during transmission. Which protocol should he use? a) HTTPS b) HTTP c) FTP d) SNMP 27) Sarah needs to transfer several large files to her team across the country. She wants a protocol that allows for file transfers over the network. Which protocol is most appropriate? a) SMTP b) FTP c) HTTP d) DNS 28) Jacob is connecting several computers on the same office network to communicate and share files. What device should he use to direct traffic between them within the same subnet? a) Router b) Firewall c) Switch d) Modem 29) An IT admin sets up a device that connects a local network to the internet and assigns local IPs via DHCP. Which device is she configuring? a) Switch b) Repeater c) Router d) Access Point 30) Marisol is installing software on a new device. She wants to ensure it can handle file management, memory allocation, and hardware communication. What kind of software must be present for these functions to work? a) Device driver b) Operating system c) Hypervisor d) Utility 31) Tom is troubleshooting a Mac system and notices the user interface is graphical and mouse-driven. What type of interface is Tom interacting with? a) Command-Line Interface (CLI) b) BIOS c) Application Programming Interface (API d) Graphical User Interface (GUI) 32) Carlos is testing software on multiple operating systems without needing several computers. He uses a tool that lets him run multiple OS environments on one machine. What technology is Carlos using? a) Multibooting b) Virtualization c) RAID d) Partitioning 33) In a cybersecurity lab, students are experimenting with malware in isolated digital environments that won't affect their main system. What is the main benefit of using virtualization in this context? a) Safe sandbox testing b) Better battery life c) Increased application performance d) Expanded display resolution 34) Joanne connects a USB drive to a Windows PC and gets a message saying it needs to be formatted. She chooses the NTFS file system. What is a key feature of NTFS that makes it useful? a) Simple folder layout b) Automatic cloud syncing c) Support for large files and file permissions d) Compatibility with Linux only 35) Nina needs to share a USB flash drive between a Mac and a Windows PC. Which file system should she choose to ensure compatibility across both platforms? a) NTFS b) ext4 c) HFS+ d) FAT32 36) Tyler installs a new printer, but it doesn’t work until the system downloads a file that allows the OS to communicate with it. What did the system install? a) Firmware b) Patch c) Utility d) Driver 37) After installing an antivirus program, Jackson runs a disk cleanup and removes temporary files. What type of software is he using to perform these maintenance tasks? a) Application software b) Device driver c) Utility software d) BIOS 38) Carlos is using a system diagnostic tool that checks memory and hardware settings before the OS loads. Which interface is he likely using? a) GUI b) BIOS/UEFI c) IDE d) Task Manager 39) Karen is writing a report in a word processing application and emailing it to her boss. Which type of software is she using? a) System software b) Utility software c) Application software d) Firmware 40) Anthony is coding a new application. He uses tools that help him write, test, and debug code, all in one place. What kind of software environment is he likely using? a) CLI b) API c) IDE d) BIOS 41) Lena uses an online spreadsheet app that doesn’t require any installation. All she needs is an internet connection and browser. What type of delivery model is this? a) Desktop software b) Cloud-based software c) Local software d) Proprietary software 42) An IT manager wants to deploy a single version of software that is centrally hosted and updated, with access for hundreds of users. What delivery model should he choose? a) SaaS (Software as a Service) b) Open-source software c) On-premises software d) Freeware 43) When visiting a website, Emily sees a padlock symbol in the browser’s address bar. What does this symbol indicate? a) The website is powered by Google b) The browser is in incognito mode c) The website uses a secure HTTPS connection d) The website is bookmarked 44) Malik installs multiple browser extensions. Suddenly, his browser is slow and showing pop-ups. What type of software might be affecting his browser? a) Secure plug-in b) Malicious adware c) Open-source script d) System patch 45) Jordan is explaining the difference between mobile and desktop applications to a client. He notes that one is installed from an app store and optimized for touchscreens. What type of application is he describing? a) Desktop App b) Mobile App c) Virtual App d) Web App 46) Alisha uses a cloud-based calendar that syncs across all her devices. She doesn’t need to install anything. What category of application is she using? a) Local application b) Native desktop app c) Web application d) BIOS configuration tool 47) Desmond is selecting software to run a virtual meeting. He wants it to include video, chat, screen sharing, and recording features. What category does this fall into? a) Office productivity software b) Collaboration software c) Utility software d) System tools 48) Lacey wants to edit videos using professional software that runs best with high-performance hardware and full OS access. What type of app should she use? a) Web-based editor b) Mobile app c) Cloud script d) Installed desktop application 49) Jake is writing a program that needs to run directly on hardware with high performance, such as controlling an industrial robot arm. Which type of programming language is most appropriate for Jake’s task? a) Markup language b) High-level language c) Scripting language d) Assembly language 50) Sara is writing code for a website’s interactive forms using a language that runs in the browser and responds to user clicks. What language is she most likely using? a) Python b) JavaScript c) SQL d) C++ 51) Kevin is working with a team of developers. They are using version control to track changes and manage code collaboratively. Which tool is most likely part of their workflow? a) Task Scheduler b) Git c) BIOS d) CLI 52) In her development process, Olivia divides code into modules that perform distinct functions like logging in, retrieving user data, and saving files. What principle is she applying? a) Modularity b) Polymorphism c) Compilation d) Encryption 53) A developer writes a condition: "if temperature > 100 and alarm= True: sound_alarm()" What kind of logical operator is used to ensure both conditions are true before proceeding? a) NOT b) OR c) AND d) XOR 54) Taylor is troubleshooting a function in his program and realizes that an "if-else" structure determines whether a user gets access to a premium feature. What logic structure is this an example of? a) Loop b) Condition c) Exception d) Compilation 55) Lucia is developing an app and defines a reusable block of code that converts temperatures from Fahrenheit to Celsius. What programming concept is she using? a) Variable b) Array c) Function d) Loop 56) During an assignment, Malik is asked to store five test scores. He creates a structure called "scores= [78, 85, 92, 88, 79]" What kind of data structure is this? a) Variable b) Function c) Loop d) Array 57) While designing a program for a store, Jessica creates a digital product with a name, price, and method to apply a discount. This is best described as: a) A variable b) An object c) A function d) A service 58) Maria works for a small business and is helping the team store customer contact information. She chooses to use a tool that allows for data entry, searching, and sorting. What is the most appropriate solution for her needs? a) Web browser b) Spreadsheet c) Relational database d) Word processor 59) Thomas is trying to explain the difference between data and a database to a coworker. He says: "A database is like a filing cabinet. The documents inside are the __." What word best completes his analogy? a) Data b) Queries c) Software d) Servers 60) Emma is designing a database and wants to make sure she doesn't enter duplicate customer records. She assigns each customer a unique Customer ID. What kind of field is this? a) Lookup value b) Primary key c) Index d) Foreign key 61) Jayden is managing two tables: one for customers and one for orders. Each order record includes a customer’s ID to link the data. What is the customer ID in the orders table called? a) Candidate key b) Relationship c) Primary key d) Foreign key 62) Nora writes a command to extract all customer names from a database table called "Customers". She writes: "SELECT name FROM Costumers". Which language is she using to perform this task? a) HTML b) SQL c) XML d) Python 63) Leo’s company runs a customer database from a server that multiple employees can access over the company’s internal network. What type of database infrastructure is this? a) Local b) Distributed c) Cloud-based d) Server-based 64) Isabella stores a small database file on her laptop to track her personal book collection. No one else needs access to it. What type of database is she most likely using? a) Personal database b) Distributed database c) Server-based database d) Client-server database 65) A company wants to ensure that its database can scale globally and allow different offices to access shared records while maintaining local copies. What kind of database infrastructure is most suitable? a) Cloud-native database b) Personal flat-file database c) Local desktop database d) Static reporting system 66) A tech company accidentally publishes internal financial data on its public website. What principle of the CIA triad has been compromised? a) Authentication b) Integrity c) Confidentiality d) Availability 67) After a server crash, backups are restored, but the data appears incomplete and inconsistent with the original. What has most likely been affected? a) Confidentiality b) Integrity c) Availability d) Authorization 68) Lorenzo installs antivirus software and enables a host firewall on his laptop before connecting to public Wi-Fi. What is he trying to protect against? a) Overheating b) Data loss due to power failure c) Malware and unauthorized access d) Software incompatibility 69) Sandra ensures her system auto-installs operating system patches. Why is this an important security step? a) It protects against known vulnerabilities b) It removes unused software c) It speeds up system performance d) It prevents hard drive failure 70) Eli shares his password with a coworker to help them complete a task quickly. Which policy is he violating? a) Account recovery b) Acceptable use c) Device use d) Confidential information handling 71) During training, employees are taught to lock their computers when stepping away from their desks. What kind of policy is this part of? a) Hardware maintenance b) Behavioral security c) Disaster recovery d) Backup retention 72) After a data breach, logs showed exactly which user accessed which records and when. What security concept does this represent? a) Authorization b) Encryption c) Availability d) Accounting 73) Drew’s organization limits employees to only the files they need to do their job. What principle is being applied? a) Least privilege b) Multifactor authentication c) Role-based encryption d) Availability control 74) Lisa logs in with a username and password and then must swipe a keycard. What is this an example of? a) Biometrics b) Single sign-on c) Multifactor authentication d) Authorization policy 75) Mike creates a password with his birthdate and uses it across all his online accounts. Which best practice is he ignoring? a) Using uppercase letters b) Avoiding password reuse c) Enabling password hints d) Changing keyboards 76) A company enforces a policy where employees must change their passwords every 60 days and can't reuse the last five. What is this policy trying to prevent? a) Keylogging b) System crashes c) Credential stuffing d) Account sharing 77) Karla sends a confidential report over email. She encrypts it so only the intended recipient can decrypt it with a private key. What kind of encryption is she using? a) Symmetric b) Asymmetric c) Hash-based d) Triple DES 78) A company uses full disk encryption on all laptops. If a laptop is stolen, what does encryption help protect? a) Software licenses b) Physical damage c) Data confidentiality d) User passwords 79) A law firm experiences a fire that destroys its main server. However, it restores operations within 2 hours using cloud backups. What plan ensured this recovery? a) Patch management b) Acceptable use policy c) Business continuity plan d) System audit 80) During a test, an IT team simulates a major cyberattack and practices how to respond and restore services. What kind of exercise is this? a) Disaster recovery drill b) Penetration test c) Code review d) Antivirus scan
0%
Security+ Prerequisite
Partager
Partager
Partager
par
Thruss09
College
PreReq for Sec
Modifier le contenu
Imprimer
Incorporer
Plus
Affectations
Classement
Afficher plus
Afficher moins
Ce classement est actuellement privé. Cliquez sur
Partager
pour le rendre public.
Ce classement a été désactivé par le propriétaire de la ressource.
Ce classement est désactivé car vos options sont différentes pour le propriétaire de la ressource.
Rétablir les Options
Quiz
est un modèle à composition non limitée. Il ne génère pas de points pour un classement.
Connexion requise
Style visuel
Polices
Abonnement requis
Options
Changer de modèle
Afficher tout
D'autres formats apparaîtront au fur et à mesure que vous jouerez l'activité.
Ouvrir les résultats
Copier le lien
Code QR
Supprimer
Restauration auto-sauvegardé :
?