Welcome to your Exam Prep
Name
Email
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Which of the following BEST describes the physical location of the data in the database?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?.
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
Which of the following programming language types is generally the FASTEST way to write a program adhoc tasks quickly?
Which of the following should be used to store a list of strings?
Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician NEXT step?
A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
Consider the following statement: Given the input( userin )of “analyst” , to which of the following would the clearance variable be set?
Which of the following would be used to send messages using the SMTP protocol?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
Which of the following does a NoSQL database use to organize data?
SQL databases use primary and foreign keys to enable which of the following?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?
A function is BEST used for enabling programs to:
A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step technician should do?
Which of the following contains exactly four copper wires?
Which of the following network protocols will MOST likely be used when sending and receiving internet email? (Choose two).
During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?.
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?
Which of the following has the longest range?
The IT department has established a new policy for employees. Specifically, the policy reads: i. Passwords must not contain common dictionary words ii. Passwords must contain at least one special character iii. Passwords must be different from the last six passwords used iv. Passwords must use at least one capital letter or number
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
Which of the following are the basic computing operations?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the BEST choice to accomplish this task?.
Which of the following is the closest to machine language?
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would migrate the risk?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?.
Which of the following is a benefit of a locally hosted network solution?
If the Breakfast program ran on Sunday, which of the following would be the output?.
Which of the following should have the HIGHEST expectation of privacy?
Which of the following is the BEST overall storage option for a laptop?
Which of the following would BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following language types would a web developer MOST likely use to create a website?
A global variable called “age” will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member?
A WPA2 enterprise wireless network has been subject to several attacks within last month. Which of the following would be the BEST option to improve the security of the network?
Which of the following could a company consider an asset?
To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?
Ann, a user, connects to the corporate WiFi and tries to browse the internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
A user connects a company computer to free WiFi at a local coffee shop. Which of the following BEST describes this situation?
Which of the following is a logical structure for storing files?
A user is having issues connecting to the internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue?
A user logs into a laptop using a username and complex password. This is an example of:
A Systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at the point in time. Which of the following types of license is this an example of?
A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?
A programmer uses DML to modify:
A small company wants to set up a server that is accessible from the company network as well as the internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?.
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
Which of the following storage types is MOST vulnerable to magnetic damage?
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concept does “jump” represent?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by internet browsing?
A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)
Which of the following encryption types would BEST be used to protect data on a shared computer?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
Which of the following computing devices is MOST likely to have an internal wireless antenna?
Which of the following services is used to translate a URL to an IP address?
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?
A technician is given a document with step-by-step instructions to perform a task. Which of the following BEST describes that document?
A technician installs a webcam to a webcam to a computer and wants to install an updated driver. In which of the following would the technician find the MOST current driver?
A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST escribes the fact that the operation is only performed if the input is correct?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (choose two.)
Which of the following concerns does installing cross-platform software address?
A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?
Which of the following BEST describes a kilobyte?.
A UPS provides protection against.
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
Which of the following computer components allows for communication over a computer network.
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
A developer embeds a query in a high-level program to extract information from a database. This an example of:
In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?
Given the following pseudocode:
Which of the following BEST describes the purpose of a vector in programming?
Which of the following is the number of bytes that is in 2KB?
Which of the following is primarily a confidentiality concern?