Welcome to your Exam Prep
Name
Email
Which of the following is the BEST overall storage option for a laptop?
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would migrate the risk?
Ann, a user, connects to the corporate WiFi and tries to browse the internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
Given the following pseudocode: For each apple in the basket, eat two oranges unless it is the last apple, then eat three oranges. If there are seven apples in the basket, which of the following would be the number of oranges a person eats.
Which of the following is a logical structure for storing files?
Which of the following are the basic computing operations?
A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)
A programmer uses DML to modify:
When following the troubleshooting methodology, which of the following should be performed when establishing a theory of probable cause?
The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of internet service connections would BEST meet the user’s needs?
Which of the following BEST describes the purpose of a vector in programming?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?.
Which of the following is an advantage of installing an application to the cloud?
Which of the following encryption types would BEST be used to protect data on a shared computer?
Which of the following would indicate the FASTEST processor speed?
A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?
Which of the following data types BEST performs calculations?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concept does “jump” represent?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
A user, has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?
A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?
Which of the following would MOST likely use an ARM processor?
Which of the following is a reason why complex passwords are required?
Which of the following would BEST to keep the data on a laptop safe if the laptop is lost or stolen?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
Which of the following computer components allows for communication over a computer network.
Which of the following should have the HIGHEST expectation of privacy?
Which of the following is the closest to machine language?
A help desk has initiated a new policy requiring that technicians manually categorize the reason for a customer call. After several months, they are unable to perform any analysis on the information. Which of the following concepts is MOST closely tied to the root cause of this issue?
Which of the following are the primary functions of an operating system? (choose two.)
A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?.
A global variable called “age” will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Which of the following is the BEST method for ensuring there is no Telnet access?
Which of the following operating systems do not require extensions on files to execute a program? (Choose two.)
In which of the following situations should there be come expectation of privacy?
A technician is concerned that sensitive data transmitted over the internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
Which of the following programming construct would be used to repeat a statement 100 times in a loop?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?.
Which of the following network protocols will MOST likely be used when sending and receiving internet email? (Choose two).
A user needs to connect a laptop to an Ethernet port in the room. Which of the following types of connections does the user need?
Which of the following is both an input and output devices?
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?
Which of the following could a company consider an asset?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Which of the following has the longest range?
A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?
Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member?
Which of the following is the LOWEST unit for measuring bandwidth?
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at the point in time. Which of the following types of license is this an example of?
Which of the following language types would a web developer MOST likely use to create a website?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
A developer embeds a query in a high-level program to extract information from a database. This an example of:
Which of the following should be used to store a list of strings?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?
A schema is a critical part of which of the following?
The broadcast signal from a recently installed wireless access point is not as strong an expected. Which of the following actions would BEST improve the signal strength?
Which of the following does a NoSQL database use to organize data?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
An IP address is 32 bits long. If converted to bytes, it would be:
Which of the following computing devices is MOST likely to have an internal wireless antenna?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create the list?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?
Which of the following is an example of multifactor authentication?
A WPA2 enterprise wireless network has been subject to several attacks within last month. Which of the following would be the BEST option to improve the security of the network?
A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation?
Which of the following programming language types is generally the FASTEST way to write a program adhoc tasks quickly?
Which of the following contains exactly four copper wires?
Which of the following is a compiled language?.
A developer is troubleshooting code in an application. The code is supposed to return the word “vegetables” if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter?
Which of the following would allow an application to run automatically when a computer is started?
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
Which of the following BEST describes the physical location of the data in the database?
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (choose two.)
A database administrator has placed data from another source into a database. Which of the following did the database administrator perform?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
SQL databases use primary and foreign keys to enable which of the following?
Which of the following would be used to send messages using the SMTP protocol?
Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the following best practices should she implement?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated.
A company has installed an application that only requires a workstation to function. Which of the following architectures types is this application using?
Which of the following data types should a developer use when creating a variable to hold a postal code?