1) Which Windows tool allows for a driver to be updated for hardware? a) lusrmgr.msc b) dfrgui.exe c) devmgmt.msc d) certmgr.msc 2) Which operating system is considered open-source? a) Windows b) macOS c) Linux d) iOS 3) What does GUI stand for? a) General User Interface b) Graphical User Interface c) Global Utility Index d) Graphical Unifying Interface 4) Which Windows OS cannot be joined to a domain? a) Windows Home b) Windows Pro c) Windows Pro for Workstations d) Windows Enterprise 5) What file system does macOS use? a) NTFS b) APFS c) FAT32 d) ext4 6) Which is a Linux distribution? (Select all that apply) a) Ubuntu b) Red Hat c) Debian d) macOS 7) Which Linux command allows for the permissions of a file to be changed? a) chown b) chmod c) chgrp d) cat 8) Which is not a mobile OS? a) Android b) iOS c) Windows d) DOS 9) Which command would show any active networks connections for a PC? a) top b) netstat c) dig d) tracert 10) Which Windows version requires a minimum of a 1 GHz processor, 1 GB RAM, and 16 GB of hard disk space? a) Windows 10 32-bit b) Windows 10 64-bit c) Windows 11 32-bit d) Windows 11 64-bit 11) Virtual memory is created from which of these components? a) RAM b) GPU c) Disk space d) CPU cache 12) Which command lists directory contents in Linux? a) dir b) ls c) list d) show 13) What is the purpose of a device driver? a) File storage b) Hardware communication c) Internet browsing d) Data encryption 14) Which is a feature of Windows Pro editions? a) BitLocker b) Paint c) Calculator d) Media Player 15) Which macOS tool is used for password management? a) Spotlight b) Keychain c) Dock d) FileVault 16) Which utility diagnoses system information and problems in Windows? a) Disk Defragmenter b) Disk Cleanup c) System Configuration d) Task Manager 17) Which command allows for hard drives to be mapped as a shared resource to your local computer? a) netstat b) net use c) net view d) net user 18) What is the maximum amount RAM that can be utilized by a 32-bit system? a) 1 GB b) 2 GB c) 3 GB d) 4 GB 19) Dock in macOS is similar to what feature in Windows? a) File Explorer b) Control Panel c) Taskbar d) Task Manager 20) Which file system is used by Windows? a) NTFS b) HFS+ c) ext3 d) APFS 21) What is the command to check IP configuration in Windows? a) ipconfig b) ifconfig c) netstat d) tracert 22) A technician needs to perform a system restore on a Windows 10 computer, but the user’s restore points are missing. Which of the following is the MOST likely reason the restore points are unavailable? a) The system drive has insufficient space. b) The restore points were deleted manually. c) System Restore is disabled in the group policy. d) System File Protection is turned off. 23) A user is unable to install software on a Windows 10 PC. The error message indicates that the software installation is blocked by Windows Defender. Which of the following actions should the technician take FIRST? a) Disable Windows Defender and try again. b) Run a malware scan on the computer. c) Uninstall Windows Defender. d) Add an exception for the software in Windows Defender. 24) Which type of installation removes all existing data, settings, and programs to accommodate a new user/owner of a computer? a) Repair install b) Clean install c) In-place upgrade d) Swap install 25) Which tool would be the MOST helpful in locating a .dll file? a) msinfo32.exe b) dfrgui.exe c) regedit.exe d) msconfig.exe 26) A company is concerned about unauthorized users accessing confidential documents via physical theft. Which of the following methods would BEST protect data on a laptop? a) Enabling BitLocker encryption b) Configuring a BIOS password c) Using a cable lock d) Installing a firewall 27) An IT manager has requested that all network devices sending traffic on port 47 should be granted access into the network. Based on the request, what rule should be set on the firewall? a) Implicit allow b) Implicit deny c) Explicit allow d) Explicit deny 28) Which type of attack makes use of an access point to pose as a legitimate network and intercept personal/corporate data? a) Zero-day b) Evil twin c) War driving d) Denial of Service (DoS) 29) Which of these Wi-Fi security standards can support the Temporal Key Integration Protocol (TKIP)? (Select all that apply) a) WEP b) WPA c) WPA2 d) WPA3 30) Which authentication server is meant to support Single Sign-On (SSO)? a) RADIUS b) TACACS+ c) Kerberos d) SCADA 31) Which data destruction method involves using a strong magnet to permanently erase data and dispose of the hard drive? a) Drilling b) Degaussing c) Incinerating d) Shredding 32) Which of these physical security measures is meant to prevent a tailgating attack? a) Magnetometer b) Bollards c) Access control vestibule d) Video surveillance 33) What common security threat is usually executed by email? a) Phishing b) Vishing c) Quishing d) Smishing 34) Which one of these combinations meet the guidelines for two-factor authentication? a) thumbprint/retina scan b) RFID badge/PIN c) username/password d) Swipe lock/Signature 35) A user sets up a SOHO router in their home but doesn't see it on their phone when trying to connect. What is the MOST likely reason for this? a) The router doesn't have updated firmware. b) The router doesn't have the right channel. c) The SSID broadcast is disabled. d) The Wi-Fi password is incorrect. 36) Which type of malware can replicate without user interaction? a) Phishing b) Botnet c) Worm d) Virus 37) Which Wi-Fi security standard uses the Simultaneous Authentication of Equals (SAE) to verify wireless device connections? a) WEP b) WPA c) WPA2 d) WPA3 38) What is shoulder surfing? a) Network scanning b) Physical observation c) Online shopping d) Data mining 39) A password attack that uses randomized combinations to guess is referred to as a __________ attack. a) Watering hole b) Honeypot c) Dictionary d) Brute force 40) What is a man-in-the-middle attack? a) Data interception b) Email spamming c) Hardware theft d) Software piracy 41) Which corporate policy demonstrates the biggest security threat? a) CYOD b) COPE c) COBO d) BYOD 42) If an online retail company wants to have a public server for consumers to connect to while still protecting their LAN from outside attacks, they can deploy a _______________. a) Anti-spam management b) Atomic filter c) Screened subnet d) VPN 43) A company implements multifactor authentication for all employees. However, one user is still able to access the company’s internal systems without providing the second factor. Which of the following is MOST likely the issue? a) The user’s password is too simple. b) The second factor is disabled for the user’s account. c) The second factor is being sent to the wrong device. d) The user’s account is locked out. 44) What is a security patch? a) Software update b) Network test c) Password reset d) User manual 45) A company has a policy requiring employees to use a combination of a password and a fingerprint scan to access their systems. Which of the following security concepts does this policy implement? a) Least privilege b) Multifactor authentication c) Single Sign-On d) Encryption 46) An operating system or software that won't receive any more updates is referred to as ___________. a) EOL b) EOW c) EOT d) EOF 47) Which type of malware payload is designed to hide from antimalware detection inside the operating system? a) Virus b) Rootkit c) Ransomware d) Worm 48) Which type of authentication server uses the AAA security architecture? a) RADIUS b) TACACS+ c) Kerberos d) SCADA 49) An employee wants to protect sensitive financial documents on a USB drive. Which program can help to encrypt the documents on the drive? a) BitLocker b) BitLocker-to-Go c) System Restore d) FileLock 50) Which of the following is the MOST secure way to manage passwords? a) Use the same password for all accounts for simplicity. b) Store passwords in a text file on the desktop. c) Use a password manager to generate and store complex passwords. d) Write passwords down and keep them in a secure place. 51) What is the third step in malware removal process? a) Quarantine infected systems. b) Identify malware symptoms. c) Disable System Restore. d) Schedule scans and run updates. 52) A Windows PC is stuck in a continuous reboot loop. What should be your first step? a) Boot into safe mode and disable startup programs. b) Perform a clean installation of Windows c) Run the System File Checker (SFC) tool. d) Check the power supply connections. 53) A user reports their application is crashing immediately after opening. What would you check first? a) Increase the system’s virtual memory. b) Check the Event Viewer for related logs. c) Update the application to the latest version. d) Run the application in safe mode. 54) Which is NOT a Windows OS recovery option? a) Safe Mode b) System Restore c) Factory Reset d) Time Machine 55) A user is unable to access a shared folder on the network. The technician verifies that the user is properly connected to the network. What is the NEXT step? a) Verify the user’s permissions for the shared folder. b) Reboot the computer and the server. c) Disable the firewall on the computer. d) Uninstall and reinstall the network drivers. 56) A user reports that their computer has become unresponsive. The technician checks the Task Manager and finds that the system is using 100% of the CPU. Which of the following should the technician do FIRST? a) Reboot the system in Safe Mode. b) End the processes that are using the most CPU resources. c) Perform a disk cleanup. d) Reinstall the operating system. 57) What is the MOST likely cause of a computer crashing during graphics-intensive tasks? a) Insufficient disk space b) Slow CPU speed c) Outdated graphics drivers d) Too many background processes running 58) Which is a sign of malware infection? a) Fast Performance b) Frequent Pop-ups c) Increased Storage d) Longer Battery 59) What can cause slow performance in mobile OS? a) Full Battery b) Too Many Apps c) Screen Brightness d) Airplane Mode 60) How to address Windows update failures? a) Clear Cache b) Reboot Twice c) Troubleshooter d) Ignore Updates 61) What is NOT a common PC security issue? a) Phishing b) Spyware c) Overheating d) Ransomware 62) What is the MOST important step in the malware removal process? a) Schedule scans and run updates. b) Disable System Restore. c) Educate the end user. d) Enable System Restore and create a restore point. 63) A user reports that an application on their phone is not responding. What should you do to address this issue? a) Perform a hard reset. b) Clear the application cache. c) Delete the user's contacts. d) Ignore the user's complaint and wait the issue out. 64) A user reports that a laptop cannot connect to the Internet. You find that their smartphone can't connect to the Internet either. Which option would BEST address this issue? a) Reset the Wi-Fi channel. b) Disable the firewall.  c) Update the firmware on the router. d) Update the antivirus software. 65) A user tries to visit an online retailer website that she frequently goes to. This time, however, her browser blocks this website. What is the MOST likely reason for this? a) The user's browser has been infected. b) The website's certificate isn't updated. c) The user's RAM cache is full. d) The user's profile is corrupted. 66) You are troubleshooting a user’s Windows laptop that repeatedly shows a BSOD with the error code "0x0000007B". What step should you take NEXT? a) Restart the computer. b) Research the error code. c) Navigate into the BIOS. d) Boot into Safe Mode. 67) Which of the following is the best approach when troubleshooting an issue with a user's email account not syncing? a) Check the email server's status for outages. b) Reinstall the email client software. c) Reboot the computer. d) Disable the firewall. 68) A user’s printer stopped working after they installed a new software program. What is the most likely cause of this issue? a) The printer’s network connection is disrupted. b) The printer driver is incompatible with the new software. c) The printer's toner cartridge is empty. d) The software update caused a system crash. 69) A user cannot launch a program, and an error message indicates “Insufficient system resources.” What is the most likely cause of this issue? a) The program is incompatible with the operating system. b) The hard drive is full and cannot load the program. c) The system is low on RAM or virtual memory. d) The program is corrupted or misconfigured. 70) What is a symptom of a failing Windows update? a) Slow boot b) Update error c) Loud fan noise d) Frequent reboots 71) Which mode allows running only essential processes in Windows? a) Safe Mode b) Sleep Mode c) Hibernate d) Airplane Mode 72) What is the purpose of a recovery partition? a) File backup b) System repair c) Data transfer d) Password reset 73) A user is having trouble with the Windows bootloader starting up her laptop. Which command would BEST assist in fixing this issue? a) bootrec b) regedit c) chkdsk d) sfc 74) Which of the following is the MOST effective way to prevent malware from spreading to other computers on a network? a) Reinstall the operating system frequently. b) Keep all network cables unplugged. c) Disable automatic Windows updates. d) Regularly update antivirus software and perform scans. 75) Which Windows tool helps manage startup programs? a) Task Manager b) Control Panel c) Device Manager d) Disk Cleanup 76) Which regulation deals with consumers' credit and debit card data? a) AUP b) PCI-DSS c) DRM d) SLA 77) Which of the following should be done before performing maintenance on a computer or electronic device? a) Perform a virus scan. b) Update the system drivers. c) Restart the device. d) Disconnect it from the power source. 78) Which of these backup methods uses three different intervals to periodically back up data? a) Tower of Hanoi b) Grandfather-father-son c) FIFO d) 3-2-1 79) What is the purpose of an MSDS? a) Data recovery b) Chemical safety c) Customer support d) Inventory listing 80) A user installs unauthorized software on their workstation. What is your next step? a) Uninstall the software immediately. b) Report the incident to management or the security team. c) Check if the unauthorized software has caused any security vulnerabilities. d) All of the above 81) What should be done before beginning work on a customer's computer? a) Run updates b) Backup data c) Replace hardware d) Install software 82) Which action is recommended when dealing with an irate customer? a) Argue back b) Be defensive c) Remain calm d) Ignore them 83) What is the best practice for lifting heavy objects? (Select all that apply) a) Use your back b) Bend at waist c) Lift with legs d) Ask for help 84) A patient's Social Security number was leaked from an insurer's database server used by a doctor's office. Which body of guidelines does this incident violate? a) APIPA b) HIPAA c) GRIPA d) GDPR 85) A technician comes across sensitive information on a hard drive. What must the technician do to preserve the data? a) Enter the hard drive into a chain of custody. b) Clone the hard drive to an encrypted copy. c) Report the information to a supervisor. d) All of the above. 86) Which action should you do before performing BIOS updates? a) Disconnect power b) Check version c) Replace CMOS battery d) Install drivers 87) Which file extension types are primarily associated with Windows? (Select all that apply) a) .ps1 b) .js c) .py d) .bat e) .vbs f) .sh 88) What is the best practice for password management? a) Write them down b) Reuse passwords c) Use complex passwords d) Share with others 89) Which aspect(s) of change management deals with a contingency where the change is unsuccessful? a) Scope b) Risk analysis c) Rollback plan d) Purpose 90) What should you do if you receive a suspicious email attachment? (Select all that apply) a) Open it b) Delete it c) Forward it to the help desk d) Print it 91) Which of the following is an appropriate action to take if a fire breaks out in a data center? a) Try to extinguish the fire yourself. b) Disconnect the network cables to prevent further damage. c) Evacuate the area and call emergency services. d) Wait for the fire to burn out on its own. 92) A technician is concerned with maintaining servers in an area susceptible to hurricanes. Which tool would ensure maximum backup time for the servers to be accessible? a) UPS b) Surge suppressor c) Line conditioner d) Humidifier 93) What is the best practice when documenting a troubleshooting process? a) Note the customer's attitude. b) Use jargon to describe the problem. c) Be detailed in issues and solutions. d) Post to social media about the experience. 94) Which body of guidelines applies to residents in the European Union concerning data privacy? a) GDPR b) DRM c) DMCA d) OSHA 95) What is the best practice when installing a new hardware component? a) Force fit b) Use ESD protection c) Ignore manuals d) Mix cables 96) A teacher wants to use a free, customizable software application to help their students study in a classroom. What type of software license should they get? a) Personal b) Business c) Enterprise d) Open-source 97) A Linux user has requested their laptop to be fixed remotely. Which tool would be MOST likely used to troubleshoot? a) MSRA b) Remote Assist c) VNC d) Wireshark 98) A technician is about to replace a hard drive in a customer’s desktop. Which of the following safety precautions should the technician take? a) Use a grounding strap to prevent electrostatic discharge (ESD). b) Always wear gloves to avoid getting fingerprints on the drive. c) Ensure the computer is powered on before working on it. d) Open the case without turning off the computer. 99) The 3-2-1 backup rule requires three backups, two forms of media, and one backup being __________ . a) Data-in-transit b) Encrypted c) Off-site d) Partitioned 100) A technician is troubleshooting an employee's workstation when their lunch break comes up. What action would be the MOST appropriate for the technician to take? a) Inform the employee and walk away. b) Keep fixing the workstation until complete. c) Inform the user and hand off the issue to a fellow technician.  d) Leave the workstation and come back after lunch.

排行榜

視覺風格

選項

切換範本

恢復自動保存: ?