CompTIA Strata Practice Exam 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Delano Vasquez
Delano Vasquez, Educator & Trainer
Denalo is an accomplished educator with over 20 years of teaching and training in technology. As an entrepreneur for 25+ years, he's excelled in technology, real estate, and sales. Additionally, Denalo serves as a Real Estate Broker, specializing in various real estate transactions and investments.
Quizzes Created: 1 | Total Attempts: 177
| Attempts: 177
SettingsSettings
Please wait...
  • 1/90 Questions

    Which of the following refers to the data rate supported by a network conncection or interface?

    • Bandwidth
    • Preboot Execution Environment (PXE)
    • Branding
    • Spam
Please wait...
IT Fundamentals Quizzes & Trivia
About This Quiz

This Comptia Strata Practice Exam 1 assesses knowledge in installing hard drives, understanding video technology, identifying power-hungry sleep modes, using XCOPY command switches, and the use of smart cards. It is essential for learners aiming to certify in IT fundamentals.


Quiz Preview

  • 2. 

    Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?

    • Min in the middle attack

    • Denial of service (DoS) attack

    • Buffer overflow attack

    • Shoulder surfing attack

    Correct Answer
    A. Shoulder surfing attack
    Explanation
    A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. This type of attack involves an unauthorized person trying to gain access to sensitive information by visually observing the victim's actions, such as passwords or confidential data, without their knowledge or consent. It is a form of social engineering that relies on exploiting human vulnerabilities and lack of awareness regarding privacy and security.

    Rate this question:

  • 3. 

    Which of the following devices provides input by analyzing printed text, handwriting, or an abject?

    • Webcam

    • Image Scanner

    • Packet analyzer

    • BD-ROM drive

    Correct Answer
    A. Image Scanner
    Explanation
    An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents into digital images, allowing the text or images to be edited, stored, or transmitted electronically. This makes it a useful tool for tasks such as document scanning, data entry, and image editing. Unlike a webcam, which captures live video, or other devices listed, an image scanner specifically focuses on analyzing printed text, handwriting, or objects.

    Rate this question:

  • 4. 

    Which of the following software displays advertisements, whether or not the user has consented?

    • Trojan horse

    • Honeypot

    • Spyware

    • Adware

    Correct Answer
    A. Adware
    Explanation
    Adware is a type of software that displays advertisements without the user's consent. It is often bundled with other software and installed without the user's knowledge. Adware generates revenue for its developers by displaying ads and collecting user data. Unlike other options listed, such as Trojan horse, Honeypot, and Spyware, which have different functionalities, Adware specifically focuses on displaying advertisements.

    Rate this question:

  • 5. 

    Which of the following ports on a computer are used to connect a keyboard? Choose two

    • USB

    • DB-25

    • PS/2

    • DB-9

    Correct Answer(s)
    A. USB
    A. PS/2
    Explanation
    USB and PS/2 ports are used to connect a keyboard to a computer. USB (Universal Serial Bus) is a widely used port that allows for easy plug-and-play connectivity. It is the most common port for connecting peripherals, including keyboards. PS/2 (Personal System/2) is an older port specifically designed for connecting keyboards and mice. While it is less commonly used nowadays, some keyboards still utilize PS/2 connections. DB-25 and DB-9 ports are not typically used for connecting keyboards, but rather for other purposes such as serial or parallel communication.

    Rate this question:

  • 6. 

    Which of the following is the most common laptop battery found today?

    • NiMH

    • Lithium-ion

    • Energizer

    • NiCad

    Correct Answer
    A. Lithium-ion
    Explanation
    Lithium-ion batteries are the most common laptop batteries found today due to their numerous advantages. They have a high energy density, allowing them to store more power in a smaller size. They also have a low self-discharge rate, meaning they can hold their charge for longer periods of time. Additionally, lithium-ion batteries have a longer lifespan compared to other types of batteries and can be recharged multiple times. These factors make them the preferred choice for laptop manufacturers and users alike.

    Rate this question:

  • 7. 

    Which of the following devices contains no moving parts and stores data in a digital format?

    • Solid state drive

    • Cartridge tape drive

    • Floppy disk drive

    • Hard disk drive

    Correct Answer
    A. Solid state drive
    Explanation
    A solid state drive contains no moving parts and stores data in a digital format. Unlike other devices listed, such as cartridge tape drives, floppy disk drives, and hard disk drives, which all have mechanical components that physically move to read and write data, a solid state drive uses flash memory to store data electronically. This makes the solid state drive faster, more durable, and more reliable than traditional storage devices.

    Rate this question:

  • 8. 

    Which of the following stores user preferences related to a Web site?

    • Cookie

    • SSID

    • Local user profile

    • MAC address

    Correct Answer
    A. Cookie
    Explanation
    A cookie is a small piece of data that is stored on a user's computer by a website. It is used to store information about the user's preferences and interactions with the website. This allows the website to remember the user's preferences, such as language preference, login information, and personalized settings. Therefore, a cookie is the correct answer as it is specifically designed to store user preferences related to a website.

    Rate this question:

  • 9. 

    Which of the following types of parental controls is used to limit access to the internet contents?

    • Content filter control

    • Bandwidth control

    • Usage management tool

    • Monitoring control

    Correct Answer
    A. Content filter control
    Explanation
    Content filter control is a type of parental control that is used to limit access to internet contents. It allows parents to block or filter specific websites, keywords, or types of content that they deem inappropriate or unsafe for their children. By using content filter control, parents can ensure that their children are only accessing age-appropriate and safe online content, protecting them from potentially harmful or inappropriate material.

    Rate this question:

  • 10. 

    You have a wireless printer that is connected to your Windows XP laptop via infrared, and it prints proplerly. However, when you relocate the wireless infrared printer, you find that your laptop is not able to send print jobs to the printer. What is the most likely cause of the issue?

    • The printer driver is uninstalled from the laptop

    • The printer driver is not updated on the laptop

    • Printer is located at the distance of more than three feet from the laptop

    • The printing option is disabled in the control panel on the laptop

    Correct Answer
    A. Printer is located at the distance of more than three feet from the laptop
    Explanation
    The most likely cause of the issue is that the printer is located at a distance of more than three feet from the laptop. Infrared connections have a limited range, typically around three feet, so if the printer is moved further away, the laptop will not be able to send print jobs to the printer.

    Rate this question:

  • 11. 

    Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?

    • Session initiation Protocol

    • Streaming Media

    • HTTP streaming

    • Slipstreaming

    Correct Answer
    A. Streaming Media
    Explanation
    Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, instead of waiting for the download to complete. This technology enables the continuous playback of audio and video content, delivering it in a real-time streaming format. Unlike downloading, where the entire file needs to be retrieved before playback can begin, streaming media allows for immediate access and playback while the content continues to be downloaded in the background. This enhances the user experience by reducing waiting times and providing seamless playback.

    Rate this question:

  • 12. 

    Which of the following features are related to power management? Choose two

    • Hot plugging

    • Hibernate mode

    • Standy mode

    • Safe mode

    Correct Answer(s)
    A. Hibernate mode
    A. Standy mode
    Explanation
    Hibernate mode and Standby mode are both related to power management. Hibernate mode allows the computer to save the current state and power off completely, while Standby mode allows the computer to enter a low-power state but still be quickly resumed. Both modes help to conserve power and extend battery life in laptops or reduce electricity usage in desktop computers. Hot plugging and Safe mode, on the other hand, are not directly related to power management. Hot plugging refers to the ability to connect or disconnect devices without rebooting, while Safe mode is a troubleshooting mode used to diagnose and fix software or driver issues.

    Rate this question:

  • 13. 

    Which of the following interfaces has the ability to support digital audio as well as video through a single cable?

    • VGA

    • HDMI

    • SVGA

    • DVI

    Correct Answer
    A. HDMI
    Explanation
    HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only interface listed that has the ability to support both digital audio and video through a single cable. VGA (Video Graphics Array) and SVGA (Super Video Graphics Array) are analog interfaces that do not support audio, while DVI (Digital Visual Interface) supports video but requires a separate cable for audio. Therefore, HDMI is the only option that fulfills the requirement of supporting both digital audio and video through a single cable.

    Rate this question:

  • 14. 

    Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

    • Bluetooth

    • 802. 11

    • 802. 11b

    • Infrared

    Correct Answer
    A. Bluetooth
    Explanation
    Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported wireless technology that allows for seamless and reliable connections between devices. It is designed for short-range communication and is commonly used for connecting peripherals such as printers and mice to laptops and other devices. Bluetooth offers low power consumption, easy pairing, and a secure connection, making it the ideal choice for this scenario.

    Rate this question:

  • 15. 

    Which of the following programs can collect various types fo personal information, such as internet surfing habits, and Web sites that the user has visited?

    • Malware

    • Spyware

    • Honeypot

    • Worm

    Correct Answer
    A. Spyware
    Explanation
    Spyware is a type of program that can collect various types of personal information, including internet surfing habits and the websites that the user has visited. Unlike malware, which is a broad term for malicious software, spyware specifically focuses on gathering personal information without the user's knowledge or consent. Honeypots are decoy systems used to lure hackers, and worms are self-replicating malware that spread across networks. Therefore, the correct answer is spyware.

    Rate this question:

  • 16. 

    Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?

    • DVI

    • S-Video

    • SVGA

    • HDMI

    Correct Answer
    A. HDMI
    Explanation
    HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only option that transmits all ATSC HDTV standards and supports 8-channel digital audio. DVI (Digital Visual Interface) only supports video signals, S-Video transmits analog video signals, and SVGA (Super Video Graphics Array) is a video display standard. HDMI, on the other hand, is capable of transmitting high-definition video and audio signals, making it the most suitable option for connecting HDTVs and audio devices.

    Rate this question:

  • 17. 

    Which of the following is an international standard for energy efficient consumer products?

    • Energy star rating

    • Standby mode

    • Trusted Computer System Evaluation Criteria(TCSEC

    • Advanced Configuration and Power Interface(ACPI)

    Correct Answer
    A. Energy star rating
    Explanation
    The Energy Star rating is an international standard for energy efficient consumer products. It is a program developed by the United States Environmental Protection Agency (EPA) and the Department of Energy (DOE) to help consumers identify energy-efficient products. Products with the Energy Star rating meet strict energy efficiency guidelines set by these agencies and are proven to save energy and reduce greenhouse gas emissions. This rating is widely recognized and used by consumers and manufacturers worldwide to make informed decisions about energy-efficient products.

    Rate this question:

  • 18. 

    Which of the following can be installed in an AGP slot?

    • Video card

    • RAM

    • Micoprocessor

    • Modem card

    Correct Answer
    A. Video card
    Explanation
    An AGP slot is specifically designed to accommodate a video card. It provides a high-speed connection between the video card and the motherboard, allowing for efficient data transfer and improved graphics performance. Therefore, a video card is the correct answer as it is the only component listed that is compatible with an AGP slot. RAM, microprocessors, and modem cards are typically installed in different types of slots on a motherboard.

    Rate this question:

  • 19. 

    Which of the following refers to a location away from the computer center where document copies and backups are kept?

    • Off Site storage

    • Network attached storage

    • Storage Area network

    • On site storage

    Correct Answer
    A. Off Site storage
    Explanation
    Off Site storage refers to a location away from the computer center where document copies and backups are kept. This is done to ensure that in the event of any disaster or damage to the computer center, the data and documents stored in the off-site location remain safe and can be easily accessed. Off-site storage is a common practice in data management and helps to prevent loss of important information.

    Rate this question:

  • 20. 

    Which of the following protocols handles the reliable delivery data?

    • TCP

    • ARP

    • IPX

    • UDP

    Correct Answer
    A. TCP
    Explanation
    TCP (Transmission Control Protocol) is the correct answer because it is a reliable transport protocol that ensures the delivery of data packets in a network. It provides error detection, flow control, and retransmission of lost packets, making it suitable for applications that require reliable and ordered data delivery, such as web browsing, file transfer, and email. TCP establishes a connection between the sender and receiver, guarantees the correct sequencing of packets, and acknowledges the successful delivery of data, ensuring reliable communication.

    Rate this question:

  • 21. 

    Which of the following statements is true about modem?

    • It amplifies the digital signals

    • It converts digital signals into analog signals and vice versa

    • It reduces the noise in analog signal.

    • It converts AC current to DC current and vice versa

    Correct Answer
    A. It converts digital signals into analog signals and vice versa
    Explanation
    A modem is a device that allows computers to transmit data over telephone lines. It converts digital signals from the computer into analog signals that can be transmitted over the telephone lines, and vice versa, it converts analog signals from the telephone lines back into digital signals that the computer can understand. This enables the computer to communicate with other computers or access the internet through the telephone network.

    Rate this question:

  • 22. 

    You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?

    • His operating system is incompatible.

    • A firewall is blocking him

    • His laptop is incompatable

    • MAC filtering is blocking him

    Correct Answer
    A. MAC filtering is blocking him
    Explanation
    The problem is that MAC filtering is blocking the employee's laptop from connecting to the company wireless network. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's laptop is not on the approved list, it is being blocked from accessing the network.

    Rate this question:

  • 23. 

    Which of the following storage devices uses SRAM or DRAM?

    • USB flash drive

    • Solid state drive(SSD)

    • Blu ray disc

    • CD drive

    Correct Answer
    A. Solid state drive(SSD)
    Explanation
    Solid state drives (SSDs) use either SRAM (Static Random Access Memory) or DRAM (Dynamic Random Access Memory) as storage devices. SRAM and DRAM are types of volatile memory that are commonly used in computers. Unlike traditional hard disk drives (HDDs) that use spinning disks to store data, SSDs use flash memory technology, which is faster and more reliable. SSDs are known for their high-speed performance, durability, and low power consumption. Therefore, the correct answer is Solid state drive (SSD).

    Rate this question:

  • 24. 

    Which of the following conditions does BIOS need to be updated? Choose two

    • If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS

    • If the operating system installed on the computer has bugs

    • If the BIOS does not support new devices

    • If the software application installed on the computer stops responding frequintly.

    Correct Answer(s)
    A. If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS
    A. If the BIOS does not support new devices
    Explanation
    BIOS needs to be updated if users want to utilize new hardware features or options that are supported by the motherboard but not supported by the computer BIOS. Additionally, BIOS should be updated if the current BIOS does not support new devices.

    Rate this question:

  • 25. 

    Which of the following statements about a riser card is true?

    • It is used to connect a computer in a network

    • It is used to connect extra microprocessors

    • It provides extra memory for expansion cards

    • It is used to extend slots for expansion cards.

    Correct Answer
    A. It is used to extend slots for expansion cards.
    Explanation
    A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected to the motherboard by raising them up vertically, providing more space for installation. This is particularly useful in compact computer cases where there is limited horizontal space for expansion cards. By using a riser card, users can add more functionality to their computer by connecting additional expansion cards such as graphics cards, sound cards, or network cards.

    Rate this question:

  • 26. 

    You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorith. Which encryption standards should you use?

    • WEP

    • WPA

    • TKIP

    • WPA 2

    Correct Answer
    A. WPA 2
    Explanation
    The correct answer is WPA 2 because it is the most secure encryption standard among the options given. WEP (Wired Equivalent Privacy) is an outdated and weak encryption standard that can be easily hacked. WPA (Wi-Fi Protected Access) and TKIP (Temporal Key Integrity Protocol) are also outdated and have known vulnerabilities. WPA 2 (Wi-Fi Protected Access 2) is the current industry standard and provides strong encryption and security features, making it the best choice for implementing wireless access at a defense contractor.

    Rate this question:

  • 27. 

    Which of the following color code is used for a PS/2 keyboard connector on new motherboards?

    • Purple

    • Pink

    • Green

    • Blue

    Correct Answer
    A. Purple
    Explanation
    The color code used for a PS/2 keyboard connector on new motherboards is purple. This color coding is a standard convention followed by motherboard manufacturers to differentiate the PS/2 keyboard connector from other connectors. The purple color makes it easier for users to identify and connect their PS/2 keyboards to the correct port on the motherboard.

    Rate this question:

  • 28. 

    Which of the following aims to restrict certain dangerous substances commonly used in electronics equipment?

    • RoHS directive

    • IEEE standards

    • IETF standards

    • W3C standards

    Correct Answer
    A. RoHS directive
    Explanation
    The RoHS directive aims to restrict certain dangerous substances commonly used in electronics equipment. It stands for Restriction of Hazardous Substances and is a European Union directive that restricts the use of substances such as lead, mercury, cadmium, and certain flame retardants in electrical and electronic products. The directive aims to protect human health and the environment by reducing the negative impact of these substances on both. It requires manufacturers to ensure that their products comply with the specified restrictions before they can be sold in the European market.

    Rate this question:

  • 29. 

    Which of the following are types social engineering attacks? Choose two

    • An unauthorized person gains entrance to the building where the companys database server resides and accesses the server by pretending to be an employee

    • An unauthorized person inserts and intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts

    • An unauthorized person calls a user to be a system adminstrator in order to get the users password

    • An unauthorized person modifies packet headers by using someone elses IP address to his identity

    Correct Answer(s)
    A. An unauthorized person gains entrance to the building where the companys database server resides and accesses the server by pretending to be an employee
    A. An unauthorized person calls a user to be a system adminstrator in order to get the users password
    Explanation
    The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks. In the first scenario, the attacker manipulates their way into the building by impersonating an employee, gaining physical access to the server. In the second scenario, the attacker tricks a user into believing they are a system administrator and convinces them to disclose their password. Both of these attacks exploit human vulnerabilities to gain unauthorized access to systems or information.

    Rate this question:

  • 30. 

    Which of the following devices is used for accessing the data on Secure Digital SD card, MMC and CompactFlash(CF)?

    • E book reader

    • Memory card reader

    • Smart card reader

    • Barcode reader

    Correct Answer
    A. Memory card reader
    Explanation
    A memory card reader is used for accessing the data on Secure Digital SD card, MMC, and CompactFlash (CF). This device allows users to connect their memory cards to a computer or other device and transfer data between them. It provides a convenient way to access and transfer files, photos, videos, and other data stored on these types of memory cards.

    Rate this question:

  • 31. 

    Your office uses Windows vista. A patch was applied automatically. Suddenly the users who have scanners attached to their computers complain that they cannot access the scanners. When you check their device manager, you notice there is on exlamation point next to the scanner. What should you do now?

    • Reinstall vista

    • Find a Vista compatible scanner

    • Manually uninstall and reinstall the device driver

    • Roll back the patch

    Correct Answer
    A. Manually uninstall and reinstall the device driver
    Explanation
    When a patch is applied automatically and users with scanners attached to their computers complain about not being able to access the scanners, the presence of an exclamation point next to the scanner in the device manager suggests that the issue may be related to the device driver. Manually uninstalling and reinstalling the device driver can help resolve compatibility issues caused by the patch, allowing the scanners to be accessed again.

    Rate this question:

  • 32. 

    Which of the following software can also be used as a basic security measure?

    • Adware

    • Visual TimeAnalyzer

    • Screensaver

    • Cookie

    Correct Answer
    A. Screensaver
    Explanation
    A screensaver can be used as a basic security measure because it helps to protect sensitive information on a computer screen from being viewed by unauthorized individuals. When a screensaver is activated after a certain period of inactivity, it obscures the contents of the screen, preventing others from seeing what is displayed. This can be particularly useful in shared spaces or public areas where there is a risk of someone accessing the computer without permission. By activating a screensaver, users can ensure that their information remains secure when they are away from their computer.

    Rate this question:

  • 33. 

    Which of the following terms refers to properitary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, vailability or convenice?

    • Spyware

    • Shareware

    • Freeware

    • Adware

    Correct Answer
    A. Shareware
    Explanation
    Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.

    Rate this question:

  • 34. 

    Which of the following can occur if the power cable runs along with the computer network cable?

    • EMI

    • ESD

    • Broadcast Storm

    • Surge

    Correct Answer
    A. EMI
    Explanation
    If the power cable runs along with the computer network cable, electromagnetic interference (EMI) can occur. EMI is the disturbance caused by electromagnetic radiation from external sources that can interfere with the signals transmitted through the network cable. This interference can lead to data corruption, signal degradation, and communication errors. It is important to keep power cables and network cables separated to minimize the risk of EMI.

    Rate this question:

  • 35. 

    Which of the following maximum resolutions does the UXGA video technology supports?

    • 2560 x 1600

    • 1600 x 1200

    • 2048 x 1536

    • 1280 x 1024

    Correct Answer
    A. 1600 x 1200
    Explanation
    UXGA video technology supports a maximum resolution of 1600 x 1200.

    Rate this question:

  • 36. 

    Which of the following ports is also known as PS/2

    • 6 - pin Mini-Din connector

    • 5- pin DIN connector

    • 4 - pin Mini-Din connector

    • USB connector

    Correct Answer
    A. 6 - pin Mini-Din connector
    Explanation
    The 6-pin Mini-Din connector is also known as PS/2.

    Rate this question:

  • 37. 

    Which of the following statements are true about USB? Choose two

    • USB supports hot plugging

    • You can connect up to 127 peripheral devices to a single USB port

    • You can connect up to 16 peripheral devices to a single USB port

    • USB does not support plug n play installation

    Correct Answer(s)
    A. USB supports hot plugging
    A. You can connect up to 127 peripheral devices to a single USB port
    Explanation
    USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without having to restart the computer. Additionally, you can connect up to 127 peripheral devices to a single USB port, allowing for a high level of connectivity and versatility.

    Rate this question:

  • 38. 

    Which of the following are types of LCD monitors? Choose two

    • SVGA

    • Active Matrix

    • Passive Matrix

    • X-Matrix

    Correct Answer(s)
    A. Active Matrix
    A. Passive Matrix
    Explanation
    Active Matrix and Passive Matrix are both types of LCD monitors. Active Matrix LCD monitors use a transistor for each pixel, resulting in faster response times and better image quality. Passive Matrix LCD monitors, on the other hand, use a grid of conductors to control the pixels, which is less expensive but also less efficient. X-Matrix is not a recognized type of LCD monitor, and SVGA refers to a type of video graphics array, not a type of LCD monitor.

    Rate this question:

  • 39. 

    At what voltage does a USB host supply power to the USB bus?

    • 15 volts

    • 5 vots

    • 50 volts

    • 3 volts

    Correct Answer
    A. 5 vots
    Explanation
    A USB host supplies power to the USB bus at a voltage of 5 volts. This is the standard voltage for USB power delivery and is used to power and charge various USB devices such as smartphones, tablets, and other peripherals. It is important to note that different USB versions may have different power delivery capabilities, but the most common and widely used voltage is 5 volts.

    Rate this question:

  • 40. 

    Which of the following devices can cause great harm to ones life with lethal electric shocks? Choose two

    • SMPS

    • Floppy drive

    • Monitor

    • Keyboard

    Correct Answer(s)
    A. SMPS
    A. Monitor
    Explanation
    SMPS (Switched Mode Power Supply) and Monitor can cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting the AC power from the wall outlet to the DC power required by the computer components. If not handled properly, it can deliver high voltage electric shocks. Similarly, monitors can store high levels of electrical charge which can be dangerous if mishandled. Floppy drives and keyboards, on the other hand, do not possess the same level of electrical risk.

    Rate this question:

  • 41. 

    Which of the following terms refers to an anti virus software file that is updated from time to time to protect a computer from new viruses?

    • Definition

    • Modules

    • Service Pack

    • Hotfix

    Correct Answer
    A. Definition
    Explanation
    An anti-virus software file that is updated from time to time to protect a computer from new viruses is referred to as a "definition." Definitions contain information about the characteristics and behavior of specific viruses, allowing the anti-virus software to identify and remove them. Regularly updating the definition file ensures that the anti-virus software can effectively detect and eliminate new threats.

    Rate this question:

  • 42. 

    Which of the following devics has its own BIOS?

    • Hard disk drive

    • South card

    • Network interface card

    • Video adapter

    Correct Answer
    A. Video adapter
    Explanation
    A video adapter is a device that is responsible for generating and displaying visual output on a computer monitor. It has its own BIOS (Basic Input/Output System) which is a firmware that initializes and controls the hardware settings of the video adapter. The BIOS allows the computer to communicate with the video adapter and ensures that it functions properly. This includes configuring display settings, resolution, color depth, and other parameters. Having its own BIOS allows the video adapter to operate independently and ensures compatibility with the computer system.

    Rate this question:

  • 43. 

    Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computer, he has authorized, can get on his Wi-Fi. What is the most appropriate security measure you can recommend?

    • A Firewall

    • WPA ecryption

    • Mac Filtering

    • WEP encryption

    Correct Answer
    A. Mac Filtering
    Explanation
    Mac Filtering is the most appropriate security measure that can be recommended in this scenario. Mac Filtering allows the customer to create a list of specific MAC addresses (unique identifiers for network devices) that are authorized to connect to the Wi-Fi network. This ensures that only the authorized computers can access the network, providing an additional layer of security.

    Rate this question:

  • 44. 

    You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

    • Rambus

    • Non Parity RAM

    • ECC RAM

    • Logic Parity RAM

    Correct Answer
    A. ECC RAM
    Explanation
    ECC RAM (Error Correcting Code RAM) should be selected because it is specifically designed to detect and correct errors in data that is being read from or written to the RAM. This type of RAM uses additional bits to store error correction codes, allowing it to identify and fix single-bit errors, and detect multiple-bit errors. By using ECC RAM, the chances of data corruption or system crashes due to memory errors are significantly reduced, making it a reliable choice for those concerned about error handling.

    Rate this question:

  • 45. 

    Your customers Windows XP machine has become ususable due to some uknown cause. You want to put the computer into a working state again. What is the best way to do this?

    • Simply put the Windows Recovery CD in and the recovery process will start

    • Reinstall Windows

    • Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state

    • Simply uninstall any new software.

    Correct Answer
    A. Use the Windows recovery console witht eh windows recovery CD to put the system back in a working state
    Explanation
    The best way to put the customer's Windows XP machine back into a working state is to use the Windows recovery console with the Windows recovery CD. This will allow the user to access advanced troubleshooting options and repair any system errors or issues that are causing the computer to be unusable. Reinstalling Windows or uninstalling new software may not address the underlying cause of the problem, while using the recovery console provides a more comprehensive solution.

    Rate this question:

  • 46. 

    Which of the following buses has a maximum data transfer rate of 2400 Mbps?

    • FireWire 800

    • ESATA

    • USB 1.1

    • USB 2.0

    Correct Answer
    A. ESATA
    Explanation
    eSATA (External Serial ATA) is the correct answer because it has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps, USB 1.1 has a maximum data transfer rate of 12 Mbps, and USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the only option that matches the given data transfer rate.

    Rate this question:

  • 47. 

    Which of the following statements about multi or authentication is true?

    • It uses a key distribution center (KDC)

    • It protects a computer from a malicious software such as worms

    • It involves two or more methods as part of the authentication process

    • It is a process in which a client process and a server are required to prove their identities to each other before performing any application function

    Correct Answer
    A. It involves two or more methods as part of the authentication process
    Explanation
    The correct answer is "it involves two or more methods as part of the authentication process". This means that multi-factor authentication requires the use of multiple methods or factors to verify the identity of a user. These factors can include something the user knows (such as a password), something the user has (such as a smart card), or something the user is (such as a fingerprint). By combining multiple factors, multi-factor authentication provides an extra layer of security compared to single-factor authentication methods.

    Rate this question:

  • 48. 

    You are handling IT support for a sales company. One of the sales representitives complains that his laptop does not have a network card. You wish to add a type of expansion card should you use?

    • MCA

    • PCMCIA

    • PCI

    • AGP

    Correct Answer
    A. PCMCIA
    Explanation
    PCMCIA stands for Personal Computer Memory Card International Association. PCMCIA cards are commonly used for adding functionality to laptops, such as network cards, modems, and wireless adapters. Therefore, if the sales representative's laptop does not have a network card, adding a PCMCIA card would be the appropriate choice to address the issue. MCA, PCI, and AGP are not relevant in this scenario as they are different types of expansion slots used in desktop computers, not laptops.

    Rate this question:

  • 49. 

    Which of the following are the most likely causes of virus attack? Choose all that apply

    • Installing an application from an unreliable source

    • Downloading a file from an unknown Website

    • Installing a DLL file from an unrelieable souce

    • Using a floppy, a compact disk, or a pen drive from an unreliable souce

    Correct Answer(s)
    A. Installing an application from an unreliable source
    A. Downloading a file from an unknown Website
    A. Installing a DLL file from an unrelieable souce
    A. Using a floppy, a compact disk, or a pen drive from an unreliable souce
    Explanation
    The most likely causes of a virus attack include installing an application from an unreliable source, downloading a file from an unknown website, installing a DLL file from an unreliable source, and using a floppy, a compact disk, or a pen drive from an unreliable source. These actions can expose a computer to malicious software that can infect the system and compromise its security.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 01, 2013
    Quiz Created by
    Delano Vasquez
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.