Exam (I): Your Path to IT Certification-
Exam Question and Answers [100%
Correct] 2025/2026
Which of the following computer file types serves as a shortcut to access a different program or file?
A. File link
B. Shortcut
C. URL
D. Application link Shortcut
In which of the following operating systems would you most likely find software dedicated to
professional video and audio production?
A. Ubuntu
B. Mac OS X
C. Windows 10 Pro
D. Android OS Mac OS X
A technician cannot access a user’s files, and none of the folders or files open. What is the most likely
cause of this problem?
A. Corrupted file system
B. Incorrect file extensions
C. Missing user permissions
D. Damaged hardware Missing user permissions
When trying to secure access to an online banking account, which two actions are considered best
practice for maintaining a secure login?
A. Use easily memorable passwords
B. Change the default password
1
,C. Write down the password in a secure location
D. Enable two-factor authentication
E. Create a complex password Change the default password, Create a complex password
Which of the following storage devices offers the quickest performance for an operating system
installation?
A. 7200 RPM Hard Drive
B. Optical Drive (DVD)
C. SSD
D. Flash Drive SSD
What does an RoHS certification on a hardware device indicate?
A. The hardware has been certified for reduced energy consumption
B. The device must be disposed of in a particular manner
C. The hardware is guaranteed to work with all systems
D. The hardware operates free from electromagnetic interference The device must be disposed of
in a particular manner
When initially setting up a new operating system, which two options must a user configure?
A. Set up a backup schedule
B. Select the time zone
C. Create multiple user accounts
D. Set the computer name
E. Adjust accessibility settings Set the time zone, Set the computer name
What should a user do if an application warns it will only work for 24 more uses?
A. The user should reinstall the application
B. The user must activate the application
C. The user should switch to a 64-bit version
2
, D. The user needs to upgrade to a premium version The user must activate the application
What action should follow after completing a backup?
A. Encrypt the backup file
B. Verify the backup
C. Delete the backup
D. Schedule the backup for the next run Verify the backup
Which connection method offers the highest level of security for data protection?
A. Bluetooth
B. Wired connection
C. Wi-Fi
D. Satellite connection Wired connection
To secure a wireless network in an office with the best encryption, which option should the technician
select?
A. WEP
B. WPA
C. WPA2
D. WAP WPA2
Which of the following is the most sensitive type of Personally Identifiable Information (PII) and should
be shared only with trusted individuals?
A. Social security number
B. Mother's maiden name
C. Date of birth
D. Email address Mother's maiden name
Which of the following is a free, open-source operating system that anyone can modify?
3