Welcome to your Exam Prep
Name
Email
Which of the following is an example of an interpreted language?
Which of the following statements BEST describes binary?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two).
A WPA2 enterprise wireless network has been subject to several attacks within last month. Which of the following would be the BEST option to improve the security of the network?
Which of the following is a logical structure for storing files?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Which of the following is a reason why complex passwords are required?
Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?
A function is BEST used for enabling programs to:
Which of the following are the primary functions of an operating system? (choose two.)
A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?
A technician is concerned that sensitive data transmitted over the internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?.
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
A computer user is downloading software from the internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A developer embeds a query in a high-level program to extract information from a database. This an example of:
A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation?
A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?
Which of the following data types BEST performs calculations?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
A user connects a company computer to free WiFi at a local coffee shop. Which of the following BEST describes this situation?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the following best practices should she implement?
Which of the following should be used to store a list of strings?
In which of the following situations should there be come expectation of privacy?
Which of the following filesystems would a Linux computer MOST likely use?
Consider the following statement: Given the input( userin )of “analyst” , to which of the following would the clearance variable be set?
A technician is given a document with step-by-step instructions to perform a task. Which of the following BEST describes that document?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Ann, a user, connects to the corporate WiFi and tries to browse the internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
Which of the following concerns does installing cross-platform software address?
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at the point in time. Which of the following types of license is this an example of?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?.
Which of the following is primarily a confidentiality concern?
A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?
A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (choose two.)
A technician installs a webcam to a webcam to a computer and wants to install an updated driver. In which of the following would the technician find the MOST current driver?
Which of the following computing devices is MOST likely to have an internal wireless antenna?
Which of the following BEST explains the use of float over integer to store monetary values?
A user revisits a website and receives a message that the site may not be sure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
If the Breakfast program ran on Sunday, which of the following would be the output?.
Which of the following should have the HIGHEST expectation of privacy?
Which of the following storage types is MOST vulnerable to magnetic damage?
Which of the following storage devices have a spinning disk? (choose two.)
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
A user, has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?
A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on:
The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
Which of the following programming language types is generally the FASTEST way to write a program adhoc tasks quickly?
Which of the following data types should a developer use when creating a variable to hold a postal code?
A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the BEST choice to accomplish this task?.
Which of the following services is used to translate a URL to an IP address?
A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
Given the following pseudocode:
Which of the following is both an input and output devices?
Which of the following internal computing has the primary function of producing visual output to a monitor or other display device?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of internet service connections would BEST meet the user’s needs?
A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
An IP address is 32 bits long. If converted to bytes, it would be:
A user logs into a laptop using a username and complex password. This is an example of:
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
Which of the following requires the MOST frequent updating to remain effective?
A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
Which of the following programming construct would be used to repeat a statement 100 times in a loop?
Which of the following network protocols will MOST likely be used when sending and receiving internet email? (Choose two).
Which of the following is the closest to machine language?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
Which of the following would MOST likely use an ARM processor?
Which of the following is the WEAKEST link in the security posture of an organization?
A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated.
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Which of the following would BEST to keep the data on a laptop safe if the laptop is lost or stolen?
A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by internet browsing?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?
A small company wants to set up a server that is accessible from the company network as well as the internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?.
A Systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Which of the following is the BEST example of structured data?
A programmer uses DML to modify:
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
Which of the following is a benefit of a locally hosted network solution?