Welcome to your Exam Prep
Name
Email
To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
Which of the following has the longest range?
Ann, the president of a company, has requested assistance with choosing the appropriate internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
Which of the following is an example of an interpreted language?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?.
An IP address is 32 bits long. If converted to bytes, it would be:
Which of the following programming construct would be used to repeat a statement 100 times in a loop?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Which of the following is the BEST example of structured data?
Which of the following contains exactly four copper wires?
Which of the following storage devices have a spinning disk? (choose two.)
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this?
Which of the following is an example of a compiled computer language?
The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
Consider the following statement: Given the input( userin )of “analyst” , to which of the following would the clearance variable be set?
Which of the following BEST explains the use of float over integer to store monetary values?
Which of the following is the closest to machine language?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of internet service connections would BEST meet the user’s needs?
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at the point in time. Which of the following types of license is this an example of?
A developer embeds a query in a high-level program to extract information from a database. This an example of:
Which of the following is the LOWEST unit for measuring bandwidth?
A company is concerned with ensuring its database are highly available. Which of the following can be used to increase database availability?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
In which of the following situations should there be come expectation of privacy?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
The computer language that is closest to machine code is:
A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?
A computer user is downloading software from the internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
A schema is a critical part of which of the following?
Which of the following would be considered BEST method of securely distributing medical records?
Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
Which of the following encryption types would BEST be used to protect data on a shared computer?
A developer needs to add a table to a database. Which of the following database activities should the user perform?
Which of the following is an IP address?
Which of the following would allow an application to run automatically when a computer is started?
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
Which of the following would indicate the FASTEST processor speed?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
Which of the following is primarily a confidentiality concern?
A database administrator has placed data from another source into a database. Which of the following did the database administrator perform?
Which of the following are the primary functions of an operating system? (choose two.)
Which of the following is a reason why complex passwords are required?
Which of the following is an advantage of installing an application to the cloud?
A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would migrate the risk?
Which of the following is the number of bytes that is in 2KB?
Which of the following could a company consider an asset?
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step technician should do?
A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the BEST choice to accomplish this task?.
During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?
An end user reports seeing the old company intranet site and not the recently released updated version. Which of the following would MOST likely solve the problem?
Which of the following BEST describes the physical location of the data in the database?
The IT department has established a new policy for employees. Specifically, the policy reads: i. Passwords must not contain common dictionary words ii. Passwords must contain at least one special character iii. Passwords must be different from the last six passwords used iv. Passwords must use at least one capital letter or number
Which of the following is the BEST method for ensuring there is no Telnet access?
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create the list?
A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?
A function is BEST used for enabling programs to:
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Which of the following is an example of multifactor authentication?
A user connects a company computer to free WiFi at a local coffee shop. Which of the following BEST describes this situation?
The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two).
A user is having issues connecting to the internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Which of the following does a NoSQL database use to organize data?
Which of the following is the BEST overall storage option for a laptop?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?.
A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?
A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?
Which of the following should have the HIGHEST expectation of privacy?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
A technician is concerned that sensitive data transmitted over the internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
A small company wants to set up a server that is accessible from the company network as well as the internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?.
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
A user, has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?
Which of the following BEST describes the purpose of a vector in programming?
A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:
Which of the following should be used to store a list of strings?
Which of the following are the basic computing operations?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated.
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
A developer is troubleshooting code in an application. The code is supposed to return the word “vegetables” if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?
Which of the following would MOST likely use an ARM processor?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician NEXT step?
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?