Welcome to your Exam Prep
Name
Email
A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST escribes the fact that the operation is only performed if the input is correct?
Which of the following is the BEST example of structured data?
A WPA2 enterprise wireless network has been subject to several attacks within last month. Which of the following would be the BEST option to improve the security of the network?
A user revisits a website and receives a message that the site may not be sure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
Which of the following security concerns is a threat to confidentiality.
The computer language that is closest to machine code is:
A help desk has initiated a new policy requiring that technicians manually categorize the reason for a customer call. After several months, they are unable to perform any analysis on the information. Which of the following concepts is MOST closely tied to the root cause of this issue?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?.
A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?
The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Which of the following has the longest range?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?.
Which of the following BEST explains the use of float over integer to store monetary values?
A user needs to connect a laptop to an Ethernet port in the room. Which of the following types of connections does the user need?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
Which of the following concerns does installing cross-platform software address?
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
Which of the following programming language types is generally the FASTEST way to write a program adhoc tasks quickly?
A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)
Which of the following language types would a web developer MOST likely use to create a website?
A developer is troubleshooting code in an application. The code is supposed to return the word “vegetables” if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?
Which of the following data types BEST performs calculations?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
A technician is concerned that sensitive data transmitted over the internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
Which of the following statements BEST describes binary?
A user, has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?
Which of the following is an advantage of installing an application to the cloud?
A UPS provides protection against.
Which of the following is an example of a compiled computer language?
A computer user is downloading software from the internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A developer needs to add a table to a database. Which of the following database activities should the user perform?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?.
Which of the following is both an input and output devices?
A technician installs a webcam to a webcam to a computer and wants to install an updated driver. In which of the following would the technician find the MOST current driver?
Which of the following storage types is MOST vulnerable to magnetic damage?
A global variable called “age” will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by internet browsing?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of internet service connections would BEST meet the user’s needs?
Which of the following is the LOWEST unit for measuring bandwidth?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the BEST choice to accomplish this task?.
A schema is a critical part of which of the following?
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter?
Which of the following computing devices is MOST likely to have an internal wireless antenna?
Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
A user is having issues connecting to the internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue?
Ann, a user, connects to the corporate WiFi and tries to browse the internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
The broadcast signal from a recently installed wireless access point is not as strong an expected. Which of the following actions would BEST improve the signal strength?
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at the point in time. Which of the following types of license is this an example of?
Which of the following does a NoSQL database use to organize data?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?.
Given the following pseudocode: For each apple in the basket, eat two oranges unless it is the last apple, then eat three oranges. If there are seven apples in the basket, which of the following would be the number of oranges a person eats.
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Which of the following operating systems do not require extensions on files to execute a program? (Choose two.)
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
Which of the following is the BEST overall storage option for a laptop?
A technician is given a document with step-by-step instructions to perform a task. Which of the following BEST describes that document?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
Which of the following is a logical structure for storing files?
During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?
Which of the following is an IP address?
A small company wants to set up a server that is accessible from the company network as well as the internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?.
A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?
Which of the following programming construct would be used to repeat a statement 100 times in a loop?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member?
Which of the following should have the HIGHEST expectation of privacy?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated.
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
Which of the following would BEST to keep the data on a laptop safe if the laptop is lost or stolen?
A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concept does “jump” represent?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
Which of the following BEST describes the physical location of the data in the database?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
Which of the following is a reason why complex passwords are required?
Which of the following contains exactly four copper wires?
In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?.
A technician has worked through all the steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do NEXT?
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?
Which of the following is the closest to machine language?