Welcome to your Exam Prep
Name
Email
Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?
Which of the following is a logical structure for storing files?
An IP address is 32 bits long. If converted to bytes, it would be:
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
Which of the following would indicate the FASTEST processor speed?
Given the following pseudocode: For each apple in the basket, eat two oranges unless it is the last apple, then eat three oranges. If there are seven apples in the basket, which of the following would be the number of oranges a person eats.
Which of the following would MOST likely use an ARM processor?
A help desk has initiated a new policy requiring that technicians manually categorize the reason for a customer call. After several months, they are unable to perform any analysis on the information. Which of the following concepts is MOST closely tied to the root cause of this issue?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
A Systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
Which of the following storage devices have a spinning disk? (choose two.)
Which of the following is the BEST method for ensuring there is no Telnet access?
A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?.
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?.
A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?
Which of the following network protocols will MOST likely be used when sending and receiving internet email? (Choose two).
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
Which of the following BEST describes a kilobyte?.
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?.
Which of the following data types BEST performs calculations?
Given the following pseudocode:
Which of the following actions is the FINAL step in the standard troubleshooting methodology?.
Which of the following systems is used to represent MAC address?
If the Breakfast program ran on Sunday, which of the following would be the output?.
A technician is concerned that sensitive data transmitted over the internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (choose two.)
A user logs into a laptop using a username and complex password. This is an example of:
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
Which of the following is the WEAKEST link in the security posture of an organization?
A technician has worked through all the steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do NEXT?
A company has installed an application that only requires a workstation to function. Which of the following architectures types is this application using?
A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?
Which of the following is a reason why complex passwords are required?
In which of the following situations should there be come expectation of privacy?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.)
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by internet browsing?
Which of the following is an example of an interpreted language?
Which of the following contains exactly four copper wires?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?.
Which of the following is both an input and output devices?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of internet service connections would BEST meet the user’s needs?
A company is concerned with ensuring its database are highly available. Which of the following can be used to increase database availability?
Which of the following would be considered BEST method of securely distributing medical records?
Which of the following is an IP address?
Which of the following security concerns is a threat to confidentiality.
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Which of the following is the LOWEST unit for measuring bandwidth?
Which of the following BEST explains the use of float over integer to store monetary values?
A UPS provides protection against.
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would migrate the risk?
Ann, a user, connects to the corporate WiFi and tries to browse the internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
A WPA2 enterprise wireless network has been subject to several attacks within last month. Which of the following would be the BEST option to improve the security of the network?
A schema is a critical part of which of the following?
A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)
Which of the following is an example of a compiled computer language?
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
A developer needs to add a table to a database. Which of the following database activities should the user perform?
A user connects a company computer to free WiFi at a local coffee shop. Which of the following BEST describes this situation?
A user revisits a website and receives a message that the site may not be sure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
Which of the following BEST describes the purpose of a vector in programming?
Which of the following is MOST likely used to represent international text data?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?.
Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?
Which of the following encryption types would BEST be used to protect data on a shared computer?
A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST escribes the fact that the operation is only performed if the input is correct?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
Which of the following statements BEST describes binary?
A technician is given a document with step-by-step instructions to perform a task. Which of the following BEST describes that document?
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step technician should do?
A computer user is downloading software from the internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Which of the following has the longest range?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?.
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated.
A developer embeds a query in a high-level program to extract information from a database. This an example of:
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at the point in time. Which of the following types of license is this an example of?
Which of the following services is used to translate a URL to an IP address?
A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?
Which of the following is an advantage of installing an application to the cloud?
A programmer uses DML to modify:
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
Which of the following is the BEST overall storage option for a laptop?
Which of the following is an example of multifactor authentication?