Welcome to your Exam Prep
Name
Email
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
Which of the following is a reason why complex passwords are required?
Which of the following filesystems would a Linux computer MOST likely use?
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
The IT department has established a new policy for employees. Specifically, the policy reads: i. Passwords must not contain common dictionary words ii. Passwords must contain at least one special character iii. Passwords must be different from the last six passwords used iv. Passwords must use at least one capital letter or number
A global variable called “age” will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
Which of the following would indicate the FASTEST processor speed?
Which of the following is MOST likely to be considered protected personal information?
Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member?
In which of the following situations should there be come expectation of privacy?
Which of the following is an example of a compiled computer language?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Which of the following computer components allows for communication over a computer network.
Which of the following operating systems do not require extensions on files to execute a program? (Choose two.)
Which of the following computing devices is MOST likely to have an internal wireless antenna?
A user, has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?
Which of the following BEST describes the purpose of a vector in programming?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of internet service connections would BEST meet the user’s needs?
Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
Which of the following would MOST likely use an ARM processor?
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated.
Which of the following BEST describes a LAN-hosted application? (Choose two.)
Which of the following should have the HIGHEST expectation of privacy?
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
Which of the following is the BEST example of structured data?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
Which of the following services is used to translate a URL to an IP address?
Which of the following is the LOWEST unit for measuring bandwidth?
Which of the following internal computing has the primary function of producing visual output to a monitor or other display device?
Which of the following programming construct would be used to repeat a statement 100 times in a loop?
Which of the following programming language types is generally the FASTEST way to write a program adhoc tasks quickly?
Which of the following BEST describes the practice of providing user credentials when logging onto the network?.
Consider the following statement: Given the input( userin )of “analyst” , to which of the following would the clearance variable be set?
A technician is given a document with step-by-step instructions to perform a task. Which of the following BEST describes that document?
A developer is troubleshooting code in an application. The code is supposed to return the word “vegetables” if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?
Which of the following contains exactly four copper wires?
Given the following pseudocode:
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
Which of the following concerns does installing cross-platform software address?
Which of the following would be considered BEST method of securely distributing medical records?
A programmer uses DML to modify:
A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?
Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.)
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by internet browsing?
A UPS provides protection against.
A company is concerned with ensuring its database are highly available. Which of the following can be used to increase database availability?
A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?
In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?.
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two).
Which of the following is MOST likely used to represent international text data?
The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
Which of the following is primarily a confidentiality concern?
A schema is a critical part of which of the following?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician NEXT step?
Which of the following is an advantage of installing an application to the cloud?
Which of the following should be used to store a list of strings?
Which of the following encryption types would BEST be used to protect data on a shared computer?
Which of the following requires the MOST frequent updating to remain effective?
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?.
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Which of the following is the WEAKEST link in the security posture of an organization?
A user connects a company computer to free WiFi at a local coffee shop. Which of the following BEST describes this situation?
A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
An IP address is 32 bits long. If converted to bytes, it would be:
Which of the following is a logical structure for storing files?
When following the troubleshooting methodology, which of the following should be performed when establishing a theory of probable cause?
The broadcast signal from a recently installed wireless access point is not as strong an expected. Which of the following actions would BEST improve the signal strength?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter?
Which of the following is the BEST method for ensuring there is no Telnet access?
A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?
A small company wants to set up a server that is accessible from the company network as well as the internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?.
A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?
Which of the following language types would a web developer MOST likely use to create a website?
A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
Which of the following are the basic computing operations?
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step technician should do?
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (choose two.)
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?.