1. After five minutes of struggling with a painfully sluggish device, you finally manage to close the offending application. What’s the best next step? A. Reopen the application and hope it doesn’t freeze again. B. Uninstall the application and look for a replacement. C. Perform a soft reset and see if the app runs smoothly afterwards. D. Close all open applications and attempt to reopen the application to see if it freezes again. 2. What is the difference between a hard reset, a factory reset, and a reset to factory default? A. A hard reset merely requires holding down a few buttons as directed by the manufacturer, while both factory resets are the same and require mailing the device to the manufacturer. B. A hard reset involves removing or disconnecting the battery for 20 seconds, but factory resets are performed by holding down a few buttons as directed by the manufacturer. C. Both of the above. D. None of the above. 3. What are the first two things you should try with a device that has an unresponsive touchscreen? (Select two.) A. Make sure you aren’t accidentally triggering the touch sensor. B. Check whether the device can receive calls or texts. C. Wipe the screen down with a microfiber cloth to remove any fingerprints, dust, dirt, or grease. D. See if the device has a touchscreen diagnostic to confirm whether the touchscreen is damaged. 4. Your long-lost cousin Eric called to tell you he’d be in the Macy’s Thanksgiving Day Parade and asked you to text when his float was on TV. You did, but he didn’t get the message until hours later. You ask if his signal was okay, thinking the tall buildings might have interfered, but he insists his phone had three or more bars every time he checked. What might have happened? A. All of the texts he was receiving from friends and family exceeded his carrier’s texts-per-hour rate and the extra messages were queued for later delivery. B. Electromagnetic interference from the generators animating nearby floats kept his phone from receiving messages. C. The wire framing in parade floats is notorious for interfering with cellular reception. D. The huge crowd may have overloaded the nearby cell towers. 5. What is the first step to managing battery life well? A. Turn down the display brightness setting. B. Keep the device in airplane mode while you sleep. C. Use a dark theme in any apps that support one. D. Make sure the device’s battery life exceeds the user’s needs to start with. 6. When a device is exhibiting strange symptoms such as creaks, pops, heat, gaps between the frame and screen, and wobbling when laid on a flat surface, which should you urgently confirm or rule out? A. Swelling caused by water damage B. Incorrectly installed protective cover C. A swollen battery D. Frame damage caused by dropping the device 7. What is a good reason to avoid saving user names and passwords for services like corporate e-mail or VPN? A. Users who save their credentials are more likely to forget them, wasting your time with avoidable password resets. B. Because user name and password are both the same authentication factor (knowledge), it isn’t safe to store them together. C. Devices with saved credentials may attempt to sign in repeatedly if the service is unreachable, overloading the network. D. If the device is lost or stolen, whoever holds it can use the device to access and abuse these services. 8. A client calls and is upset that he’s misplaced his iPad. The mobile device has literally thousands of client records, including business addresses, e-mail addresses, phone numbers, and, in some cases, credit card information. What is the first thing he should do? A. There’s nothing he can do. B. He should call his ISP and have them track his iPad. C. He should access his iCloud account and reset his iPad to erase all personal data. D. He should purchase another iPad and sync with his iTunes account. This automatically erases the information on the old tablet. 9. Which of the following authentication schemes uses three factors? A. A door lock requiring a PIN code, an ID badge, and a key. B. A Web application login process requiring your user name, password, social security number, and date of birth. C. A door lock requiring a fingerprint scan, a speech sample, and an ID badge. D. A door lock requiring a fingerprint scan, a PIN code, and an ID badge. 10. What is the first step towards preventing unintended wireless connections? A. Configure devices not to automatically connect. B. Get a protective cover that blocks the USB ports. C. Set up a geofence to block signals from outside the building. D. Use a Wi-Fi analyzer to spot suspicious access points. 11. What do app scanners do? A. Scan QR codes and barcodes for hidden codes B. Analyze the traffic into an out of an application for suspicious behavior C. Analyze the permissions used by installed applications to highlight security risks D. Analyze Wi-Fi signals to identify evil-twin WAPs 12. What can cause a device to be unable to decrypt e-mail? (Select two.) A. The e-mail application doesn’t support the encryption method used or is misconfigured. B. The device doesn’t have the other user’s key to decrypt the e-mail with. C. The device is over its data transmission limit. While it can still download e-mail, you can’t decrypt it; you’ll need to increase the plan size or wait for the next billing period. D. You can only send and receive encrypted e-mail if the entire device has been encrypted first. 13. If used regularly, which of the following gives you the best chance of realizing a Stingray or similar device has been deployed near your company’s headquarters? A. Geofencing B. App scanner C. Cell tower analyzer D. Pretty Good Privacy (PGP) 14. Which of the following is not a risk when you root, jailbreak, or unlock a mobile device? A. Voiding the manufacturer warranty B. Being denied access to a corporate network C. Bricking the device D. System lockout 15. What is geofencing used for? A. Prevent smartphones from accidentally connecting to cell towers in a neighboring country B. Track smartphones that enter or exit an area C. Block smartphones smuggled into a prison from making calls D. Prevent applications from installing or running in a country that has banned them
> Most attacks on computer data are accomplished through _____________.
> The process of keeping software updated in a safe and timely fashion is known as_____________ .
> Mac OS X uses __________ and most Linux distributions use ______ to run all sorts of tasks automatically in the background.
> You can use ___________ to disable certain graphical flourishes, such as animations, transparencies, and more.
> In Windows Vista and 7, Microsoft occasionally packaged several updates for Windows together into a(n) _____________ .
> If installing a new driver causes problems in your system, ____________ enables you to roll back the driver to a previously installed version.
> To change which programs and services start with Windows 8/8.1/10, you would use the __________ .
> In Mac OS X, you access updates through the __________ pane in System Preferences
> The __________ tool enables you to create a__________ , a snapshot of your computer’s configuration at a specific point in time.
> In Windows, you use the ____________ applet to uninstall, change, or repair programs.
> ________________ requires a special Trusted Platform Module (TPM) on the motherboard to verify on boot that the computer has not changed.
> Although not all ____________ is malicious, it can lead to data destruction.
> The _________ command enables you to change the owner and the group with which a file or folder is associated in Linux and Mac OS X.
> By default, any file you drop into a folder on an NTFS drive gets the same permissions as those assigned to the folder, a feature called___________ .
> _______________ enables standard users to perform common tasks and provides a permissions dialog box when standard users and administrators do certain things that could potentially harm the computer.
> A(n) __________ is a collection of user accounts that share the same access capabilities.
> When you create a new file or folder on an NTFS partition, you become the _______ of that file or folder.
> The process that defines what resources an authenticated user may access and what he or she may do with those resources is called ___________ .
> To log on to a standalone Windows PC, you need a(n)______________ .
> The _____________ enables you to scramble a file or folder and thus hide the contents from anyone, even an administrator.
> The _____________ enables you to manage user accounts in Windows.
> You can open the ___________ directly by pressing CTRL-SHIFT-ESC.
> Enable __________ to create Event Viewer entries when a specific file is accessed.
> The __________ tracks everything about your computer, from file types to user preferences.
> Windows 8.1 uses ________ to boot the OS.
> You can right-click on a user in the __________ tab of the Task Manager to disconnect them.
> When you open the Registry Editor, you will see the five _________ on the left side of the window.
> The Performance Monitor requires a ________ and an _________ to create logs about resource usage.
> The ___________ tab in the Task Manager displays overall CPU and memory usage.
> __________ is a command-line version of the Task Manager.
> When programmers need to use objects across multiple applications, they turn to _________ .
> The __________ tab in Task Manager shows applications that will run on boot.
> Windows tracks the installation progress with a set of text files called _________ .
> Antivirus software uses updatable __________ to identify a virus by its______________.
> During the Windows installation, you will need to agree to a legal document called the ____________ .
> If you wish to have only one OS and keep the applications and configuration of the current system, you should choose to do a(n) _______________ of the new OS.
> A(n) ________ is a fix for a single problem with the OS, while a(n) _________ is a combination of fixes.
> If you have a new hard drive with nothing on it, you will likely choose to do a(n) ____________ .
> If you want to share files and printers over your home network, you can set up a(n) ________ .
> _________ cases are used to make your computer blend in with the rest of your home theater equipment.
> A(n) ___________ is a box that you hook up to your PC with inputs that enable you to connect professional microphones and instruments.
> Windows uses the ____________ tool for migrating user files and settings.
> A(n) __________ is a system designed to handle only very basic applications with an absolute minimum amount of hardware required by the operating system.
> A series of instructions telling a computer how to read a compressed file is called a(n)______ .
> A(n) __________ masquerades as a legitimate program, yet does something different than what is expected when executed.
> 1. Which command pauses after displaying a screen’s worth of directory contents? (Choose two.) A. dir p B. ls | more C. ls -p D. dir /p 2. Which of the following commands will delete all of the files in a directory in Terminal? A. del *.* B. del all C.
> 1. What process determines the identity of a user? A. Authentication B. Authorization C. Identification D. Indemnification 2. Which of the following user account types can create other user accounts? A. Administrator B. Limited user C. Restricted user D
> 1. What is the process of using or manipulating people to gain access to network resources? A. Cracking B. Hacking C. Network engineering D. Social engineering 2. Which of the following might offer good hardware authentication? A. Strong password B. Enc
> 1. Which part of a laser printer applies a positive charge to the paper that attracts the toner particles to it? A. Erase lamp B. Transfer roller C. Laser D. Primary corona 2. Janet just bought a new computer. She wants to install her three-yearold inkj
> 1. Which operating system powers an Apple mobile device? A. Android B. iOS C. OS X D. Windows Mobile 2. Which feature of some mobile devices allows you to place phone calls over an 802.11 network? A. Roaming B. Airplane mode C. Mobile hotspot D. Wi-Fi c
> 1. Which of the following statements best describes hard drives typically found in laptops? A. They are 2.5-inch SATA drives, but they do not hold as much data as the 3.5-inch hard drives found in desktops. B. They are 3.5-inch ATA drives just like those
> 1. What is the name for the router that your PC uses to connect to your Internet service provider? A. Loopback address B. Backbone C. IP address D. Default gateway 2. A Virtual Private Network creates a(n) _______________ through the Internet. A. Tunnel
> 1. Two wireless nodes that are communicating directly with each other, without any intermediary systems or hardware, are using what wireless mode? A. Ad hoc B. Bluetooth C. Infrastructure D. 802.11ac 2. What device centrally connects wireless network no
> Unlike recorded sounds, ______________ uses specialized text files that tell the sound card which sounds to play.
> 1. Everything worked fine on your 1000BaseT network yesterday, but today no one can connect to the server. The server seems to be in good running order. Which of the following is the most likely problem? A. Someone changed all of the passwords for server
> 1. How many bits are in a MAC address? A. 24 B. 36 C. 48 D. 64 2. What is the minimum CAT level cable required for a 100BaseT network? A. CAT 1 B. CAT 5 C. CAT 5e D. CAT 6 3. A typical CAT 6 cable uses which connector? A. RJ-11 B. RJ-45 C. Plenum D. PV
> 1. If one of the colors is missing on the monitor and you cannot fix the problem by adjusting the front controls, you should then check for __________________. A. A refresh rate that is set higher than that recommended by the manufacturer B. A corrupted
> 1. Tom is installing a Windows 10 virtual machine onto a VMware Workstation. Which of the following does he need? A. A valid Windows 10 installation media B. The IP address for the virtual machine host C. A disk image of another computer’s installed Wind
> 1. Which utility is useful in identifying a program that is hogging the processor? A. Task Manager B. Device Manager C. System Monitor D. System Information 2. Which Windows utility uses points in time that allow you to return your system to a previous
> 1. What tool enables you to modify which programs start when Windows 8.1 starts? A. msstartup B. msinfo32 C. msconfig D. Task Manager 2. Mark loaded a new video card on his system, but now everything looks very bad. What should he do first? A. Go to Eve
> 1. Which of the following tabs is not found in the Task Manager? A. Users B. Processes C. Services D. Objects 2. Which of the following root keys contains the data for a system’s nonuser- specific configurations? A. HKEY_LOCAL_MACHINE B. HKEY_USERS C. H
> 1. What is a thin client? A. computer with a 32-bit-wide address bus B. A portable computer C. A system designed to handle only very basic applications with the minimum hardware required by the operating system D. A computer in a narrow, small form-facto
> How many devices can a single USB host controller support? A. 2 B. 4 C. 63 D. 127 2. What is the maximum USB cable length as defined by the USB 2.0 specification? A. 4.5 feet B. 4.5 meters C. 5 feet D. 5 meters 3. Which of the following is a high-speed
> A(n) ___________ is useful when scanning a page from a book.
> A(n) _____________ captures digital images on removable media; a(n) ________ transmits digital images across the Internet for video communication.
> The _______________ is responsible for cleaning the photosensitive drum of electrical charge.
> A printer’s speed is rated in _____________ .
> The resolution of a printer is measured in _____________ .
> Windows uses the ______________ component of the operating system to handle print functions.
> Adobe systems’ ___________ is a device-independent printer language capable of high-resolution graphics and scalable fonts.
> The _______________ on a standard laser printer contains a pressure roller and a heated roller.
> Laser printers use lasers to create the print image on a(n)______________________.
> A scanner’s ability to produce color, hue, and shade is defined by its ____________ .
> A printer that creates an image on paper by physically striking an ink ribbon against the paper’s surface is known as a(n)___________.
> You can __________ a stolen device in order to remove any confidential documents before the thief has a chance to break into the device.
> Bar code readers read standard _______________ bar codes, primarily to track inventory.
> Protect your data from access by putting a good __________ on the device, which requires you to enter a series of letters, numbers, or motion patterns to unlock the mobile device each time you press the power button.
> Android devices can use ___________ to terminate a single running application and all of its services or background processes.
> A fingerprint lock is an example of ___________________.
> A(n) ______________ policy enables individual employees to use personal mobile devices at work.
> Knowledge, possession, and inherence are the primary elements of_________________ .
> A factory reset is also known as a(n) ___________ or a(n)____________ .
> In order to protect against password guessing, _____________ may occur after too many failed attempts to unlock the lock screen.
> ___________ , _____________, and _______________are processes for removing restrictions and gaining elevated access to Android, iOS, and Windows Phone devices.
> Much like a reboot on a regular computer, a(n) __________ restarts a device.
> App developers use a mobile operating system’s _____________ to build apps for devices running the OS.
> A(n) ______________ is a monitor with some type of sensing device across its face that detects the location and duration of contact, usually by a finger or stylus.
> The _____________ system can send a(n) ___________ such as an AMBER alert to devices in the relevant area.
> A wearable device that counts your steps or measures your heart rate is called a(n)___________.
> When you want to buy software for an Android device, you buy from ___________..
> The _____________ enables a mobile device to determine where you are on a map.
> A(n) ___________ is a standalone device designed to be easier to use for the purpose of reading.
> The feature that enables a user to rotate a tablet and have the screen rotate with the device is called a(n)____________.
> A(n) __________ is a compromise between the functionality of a(n) ________ and the greater screen space of a(n)__________.
> Swiping your finger across the screen on a mobile device to switch the screen to the next item, such as the next page in an eBook, is one example of the role ________ play in the user interface.
> All mobile operating systems have a(n) ____________ that enables users to interact with the device.
> Laptops using ______________ are less expensive because the video card has less built-in memory, but the RAM it borrows from the system results in less memory available to programs.
> A(n) ____________ scans the chip embedded in such devices as ID badges to enhance access and security.
> Windows enables ____________ for storing and automatically syncing files and folders between a portable and a file server.
> Today’s laptops use _____________ for batteries because that battery chemistry provides the highest energy density for the weight.