Welcome to your Exam Prep
Name
Email
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would migrate the risk?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Which of the following would BEST to keep the data on a laptop safe if the laptop is lost or stolen?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?.
A Systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A schema is a critical part of which of the following?
Which of the following is a benefit of a locally hosted network solution?
A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
Which of the following computer components allows for communication over a computer network.
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concept does “jump” represent?
The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
Which of the following does a NoSQL database use to organize data?
Which of the following BEST describes the purpose of a vector in programming?
A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?.
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
The IT department has established a new policy for employees. Specifically, the policy reads: i. Passwords must not contain common dictionary words ii. Passwords must contain at least one special character iii. Passwords must be different from the last six passwords used iv. Passwords must use at least one capital letter or number
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?
Which of the following security concerns is a threat to confidentiality.
Given the following pseudocode: For each apple in the basket, eat two oranges unless it is the last apple, then eat three oranges. If there are seven apples in the basket, which of the following would be the number of oranges a person eats.
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
Which of the following are the basic computing operations?
A technician installs a webcam to a webcam to a computer and wants to install an updated driver. In which of the following would the technician find the MOST current driver?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
Which of the following systems is used to represent MAC address?
Which of the following is a compiled language?.
Ann, the president of a company, has requested assistance with choosing the appropriate internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
A user needs to connect a laptop to an Ethernet port in the room. Which of the following types of connections does the user need?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?
A programmer uses DML to modify:
A user revisits a website and receives a message that the site may not be sure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
A user, has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?
If the Breakfast program ran on Sunday, which of the following would be the output?.
When following the troubleshooting methodology, which of the following should be performed when establishing a theory of probable cause?
A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?
SQL databases use primary and foreign keys to enable which of the following?
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
A database administrator has placed data from another source into a database. Which of the following did the database administrator perform?
A developer needs to add a table to a database. Which of the following database activities should the user perform?
Which of the following would be used to send messages using the SMTP protocol?
A user is having issues connecting to the internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?.
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
A technician is given a document with step-by-step instructions to perform a task. Which of the following BEST describes that document?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician NEXT step?
Which of the following programming construct would be used to repeat a statement 100 times in a loop?
The broadcast signal from a recently installed wireless access point is not as strong an expected. Which of the following actions would BEST improve the signal strength?
A developer is troubleshooting code in an application. The code is supposed to return the word “vegetables” if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?.
Which of the following network protocols will MOST likely be used when sending and receiving internet email? (Choose two).
Ann, a user, connects to the corporate WiFi and tries to browse the internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
A technician has worked through all the steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do NEXT?
During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?
A company has installed an application that only requires a workstation to function. Which of the following architectures types is this application using?
Which of the following has the longest range?
A small company wants to set up a server that is accessible from the company network as well as the internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?.
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?.
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?.
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
Which of the following is the BEST overall storage option for a laptop?
A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the BEST choice to accomplish this task?.
A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Which of the following would MOST likely use an ARM processor?
Which of the following concerns does installing cross-platform software address?
Which of the following contains exactly four copper wires?
Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the following best practices should she implement?
Which of the following could a company consider an asset?
Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?
Which of the following is both an input and output devices?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?.
A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST escribes the fact that the operation is only performed if the input is correct?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Which of the following is primarily a confidentiality concern?
Which of the following storage devices have a spinning disk? (choose two.)
A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?
Which of the following would allow an application to run automatically when a computer is started?
Which of the following statements BEST describes binary?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on:
A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
Which of the following is an advantage of installing an application to the cloud?
Which of the following is the WEAKEST link in the security posture of an organization?