PDF Download
FREE AND STUDY GAMES ABOUT ITC-FA8 EXAM
QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -54 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: Assume that because information is on the Web, it is accurate.
Answer:
FALSE Question 2: Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
Answer:
CVS Question 3: A surge protector absorbs small over voltages - generally without damage to the computer or equipment.
Answer:
TRUE Question 4: A(n) ________ has the same intent as a cracker but does not have the technical skills and knowledge.
Answer:
Script Kiddie
Question 5: To prevent repetitive strain injury, take all of the following precautions except ____.
Answer:
use the heel of the hand as a pivot point while typing or using the mouse Question 6: ________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
Answer:
Noise Question 7: For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet.
Answer:
FALSE
Question 8: A brownout is a complete power failure.
Answer:
FALSE Question 9: Under voltages can cause equipment damage, but generally do not cause data loss.
Answer:
FALSE Question 10: A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons.
Answer:
Cyberterrorist Question 11: The higher a surge protector's Joule rating, the poorer the protection.
Answer:
FALSE Question 12: Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
Answer:
War Driving
Question 13: Web ____ software is a program that restricts access to specified Web sites.
Answer:
Filtering Question 14: The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
Answer:
Electronic Communications Privacy Act (ECPA) Question 15: To remove spyware, users need to obtain a special program that can detect and delete it.
Answer:
TRUE Question 16: Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion.
Answer:
TRUE Question 17: A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
Answer:
RSI
Question 18: To ________ a file means to make a copy of it.
Answer:
Back up Question 19: An online UPS switches to battery power when a problem occurs in the power line.
Answer:
FALSE Question 20: A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
Answer:
UPS
Question 21: A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection.
Answer:
FALSE Question 22: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.
Answer:
TRUE Question 23: A cyber extortionist uses the Internet or network to destroy or damage computers for political reasons.
Answer:
FALSE (Cyberterrorist) Question 24: Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http.
Answer:
TRUE
Question 25: A system ________ is the prolonged malfunction of a computer.
Answer:
Failure Question 26: A spyware program communicates information it collects to some inside source while a user is offline.
Answer:
FALSE Question 27: Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network.
Answer:
TRUE