
Let’s find your level!
Quiz Summary
0 of 26 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 26 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- Current
- Review
- Answered
- Correct
- Incorrect
- Question 1 of 26
1. Question
Which of the following utilizes TCP ports 20/21 and transfers data in cleartext?
CorrectIncorrect - Question 2 of 26
2. Question
A user connects a smartphone to a laptop. Which of the following types of networks has the user created?
CorrectIncorrect - Question 3 of 26
3. Question
Which of the following BEST describes the main function of a web server?
CorrectIncorrect - Question 4 of 26
4. Question
A junior Linux systems administrator needs to update system software.
Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?CorrectIncorrect - Question 5 of 26
5. Question
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet.
Which of the following actions should the user take?CorrectIncorrect - Question 6 of 26
6. Question
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis.
Which of the following is an important part of the change request process for which the administrator still must plan?CorrectIncorrect - Question 7 of 26
7. Question
A wireless access point is going to be configured in a small office located in a crowded building.
Which of the following should the installation technician perform to increase the security of the wireless network? (Choose two.)CorrectIncorrect - Question 8 of 26
8. Question
Which of the following Wi-Fi protocols is the MOST secure?
CorrectIncorrect - Question 9 of 26
9. Question
Which of the following is a proprietary Cisco AAA protocol?
CorrectIncorrect - Question 10 of 26
10. Question
A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?
CorrectIncorrect - Question 11 of 26
11. Question
A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine.
The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?CorrectIncorrect - Question 12 of 26
12. Question
A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state, but the malware persists.
Which of the following would MOST likely resolve the issue?CorrectIncorrect - Question 13 of 26
13. Question
After setting up a new computer, a user states that the mouse and keyboard will not work. Which of the following is the MOST likely reason?
CorrectIncorrect - Question 14 of 26
14. Question
Which of the following interfaces are used to simultaneously transfer video and audio at high rates?
CorrectIncorrect - Question 15 of 26
15. Question
To configure two drives for MAXIMUM performance, which of the following RAID types should be used?
CorrectIncorrect - Question 16 of 26
16. Question
A small office’s wireless network was compromised recently by an attacker who brute-forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)CorrectIncorrect - Question 17 of 26
17. Question
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.
Which of the following needs to be adjusted on the workstation to fix the issue?CorrectIncorrect - Question 18 of 26
18. Question
Which feature enables a single-core CPU to function like two CPUs?
CorrectIncorrect - Question 19 of 26
19. Question
What is the most common type of memory upgraded in a PC to increase the number of programs and applications that can be run simultaneously?
CorrectIncorrect - Question 20 of 26
20. Question
An email client will utilize which TCP/IP port to send email to its email server?
CorrectIncorrect - Question 21 of 26
21. Question
What term is used to express the number of pixels needed to draw the screen when discussing video displays?
CorrectIncorrect - Question 22 of 26
22. Question
Which of the following is not a typical format supported by virtual printing?
CorrectIncorrect - Question 23 of 26
23. Question
Which type of cabling is immune to electromagnetic interference?
CorrectIncorrect - Question 24 of 26
24. Question
Which of the following options is synonymous with the term Hypervisor?
CorrectIncorrect - Question 25 of 26
25. Question
What 15-pin connector is commonly used to transmit video?
CorrectIncorrect - Question 26 of 26
26. Question
A technician is having trouble with what appears to be a RAM issue on a PC. Which of the following symptoms would indicate if this is a RAM issue?
CorrectIncorrect