Welcome to your Exam Prep
Name
Email
A database administrator has placed data from another source into a database. Which of the following did the database administrator perform?
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would migrate the risk?
Which of the following programming construct would be used to repeat a statement 100 times in a loop?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of internet service connections would BEST meet the user’s needs?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
A developer embeds a query in a high-level program to extract information from a database. This an example of:
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following is MOST likely used to represent international text data?
A developer is troubleshooting code in an application. The code is supposed to return the word “vegetables” if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?
A UPS provides protection against.
Which of the following filesystems would a Linux computer MOST likely use?
A user is having issues connecting to the internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Which of the following does a NoSQL database use to organize data?
Which of the following requires the MOST frequent updating to remain effective?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create the list?
A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?
An IP address is 32 bits long. If converted to bytes, it would be:
Which of the following storage types is MOST vulnerable to magnetic damage?
A Systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
A company is concerned with ensuring its database are highly available. Which of the following can be used to increase database availability?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?.
Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?
Which of the following are the primary functions of an operating system? (choose two.)
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?.
Which of the following computing devices is MOST likely to have an internal wireless antenna?
Which of the following encryption types would BEST be used to protect data on a shared computer?
Which of the following is primarily a confidentiality concern?
A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?
A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use?
Which of the following should have the HIGHEST expectation of privacy?
A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?.
An end user reports seeing the old company intranet site and not the recently released updated version. Which of the following would MOST likely solve the problem?
A user, has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?
Which of the following contains exactly four copper wires?
A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
Which of the following would BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following is a benefit of a locally hosted network solution?
A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Consider the following statement: Given the input( userin )of “analyst” , to which of the following would the clearance variable be set?
Which of the following is an IP address?
Which of the following data types BEST performs calculations?
A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation?
Which of the following storage devices have a spinning disk? (choose two.)
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
An organization exports an inventory database nightly. This is an example of:
Which of the following is an advantage of installing an application to the cloud?
Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the following best practices should she implement?
Which of the following BEST describes the purpose of a vector in programming?
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (choose two.)
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at the point in time. Which of the following types of license is this an example of?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?
Which of the following BEST explains the use of float over integer to store monetary values?
If the Breakfast program ran on Sunday, which of the following would be the output?.
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?
Which of the following is the closest to machine language?
Which of the following systems is used to represent MAC address?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Which of the following is an example of an interpreted language?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concept does “jump” represent?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
Which of the following language types would a web developer MOST likely use to create a website?
A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?
A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)
A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on:
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST escribes the fact that the operation is only performed if the input is correct?
A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
A computer user is downloading software from the internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?.
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
Which of the following services is used to translate a URL to an IP address?
Which of the following is MOST likely to be considered protected personal information?
A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
Which of the following BEST describes the physical location of the data in the database?
A help desk has initiated a new policy requiring that technicians manually categorize the reason for a customer call. After several months, they are unable to perform any analysis on the information. Which of the following concepts is MOST closely tied to the root cause of this issue?
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?
Which of the following network protocols will MOST likely be used when sending and receiving internet email? (Choose two).
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?
A technician is concerned that sensitive data transmitted over the internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
Which of the following is a compiled language?.
Which of the following would be considered BEST method of securely distributing medical records?
Which of the following should be used to store a list of strings?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by internet browsing?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?.
A company has installed an application that only requires a workstation to function. Which of the following architectures types is this application using?