cyber security 5-9

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following would be the BEST answer to the question, "What is your greatest weakness"?

"I lack patience but this is something I'm working on."

Which of the following should be done to protect your identity when creating aa social media profile?

Always review and set privacy settings.

Which of the following features of an integrated development environment (IDE) BEST allow a programmer to code faster and with less effort? (Select two.)

An IDE can autocomplete key words. An IDE has a library of built-in functions.

An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email?

Cipher text

A major capability of Alexa is its ability to do what?

Control smart devices

Clickable text or images that take you to different sites on the World Wide Web are called __________.

Hyperlinks

Which of the following can recognize different voices that it records and tailor its responses accordingly?

Google Assistant

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

IMAP

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?

Internet

Which of the following describes the declarative programming paradigm?

It uses a domain-specific language (DSL) to instruct the program what needs to be done.

What does JavaScript do?

Makes web pages interactive

Which of the following DBMS programs is open source?

MySQL

When working with an application such as Microsoft Excel to generate graphical reports, which of the following chart types would work BEST for data that has relative percentages of a whole?

Pie chart

Which of the following is NOT a good response to cyberbullying?

Post the bully's physical address on social media

Your company wants to use multifactor authentication. Which of the following would you most likely suggest?

PIN and smart card

Which of the following provides security for wireless networks?

WPA2

Which application makes sure your computer has the most recent versions of its system software?

Windows Update

Files that you send along with an email message called

attachments

Which of the following are considered asynchronous technologies?

message boards email

Which command is used to add, change, or remove fields on an existing table?

ALTER TABLE

You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in

Accidental

Which of the following is the most common type of resume?

Chronological

Social media marketers need the ability to do what?

Collaborate across teams

Which of the following is a disadvantage of the VolP system

Relies fully on a stable internet connection

Which of the following should you do before going to an interview?

Research the company history and culture

Small files that a website saves on your computer to remember your preferences are called ______________.

Cookies

What is the general term for software that creates and manages databases?

DBMS

What is asking specific questions to interpret Big Data called?

Data analytics

Which of the following are advantages of cloud computing? (Select two.)

Data security Easier collaboration

Which installation method is most likely to put your computer at risk of downloading a

Internet installation

Which type of data have elements in common but do not fit into rigid rows and columns in a table?

Semi-structured

Which of the following would be the BEST thing to do following an interview?

Send a thank you note

Which of the following describes the strategy that defines a business social media goals and objectives

Social media optimization (SMO)

Speaking in front of a mirror can help to improve which of the following traits?

Social skills

Which Information Systems career would MOST LIKELY provide user training for new or modified systems?

Systems analyst

Wikipedia is considered which of the following sources

Tertiary

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not?

Wikis

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?

Zombie/botnet

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?

import random

Which of the following typically does NOT save a conversation after it has taken place?

online chats

Which type of analytical data can help you make investment decisions?

Market

Which of the following allows for access to the internet without either a Wi-Fi or a wired connection? 2G

Mobile Data

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

Modem

Which of the following is found in one or more columns of data and contains a unique identifier for the row?

Primary key

Which of the following rights is NOT guaranteed by copyright?

Right to avoid criticism

Which of the following is NOT a drawback of social media

Social media makes it difficult to keep in touch with friends and family

Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations?

Statistical tools and formulas

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Use data wiping software to clear the hard drives

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. Which of the following should the technician configure?

VPN

A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?

data and information

Which cellular network type was the first kind of network to use encryption?

2G

How many heading tags are available for heading and subheading when using HTML?

6

Which of the following statements is true regarding a VPN?

A VPN masks a user's IP address in order to make their actions untraceable.

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?

Access point

Which programming language type is the most basic human-readable and closest to actual machine language?

Assembly

What is a disadvantage of using the cloud for data storage?

Cloud storage backups require a reliable internet connection.

Which of the following are features of using an Excel table to store data? (Select two.)

Column sorting Total row

Which of the following is a common form of social engineering attack?

Hoax virus information emails.

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?

Improved performance

Which of the following can be used by a programmer to debug code?

Integrated development environment (IDE)

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?

Proprietary Software

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem?

Proxy settings

Which of the following terms is used to describe a lightweight development process with very little overhead?

Scrum

Which of the following provides services to hosts on its network?

Server

Which of the following is considered part of a smart home?

Thermostat

Which of the following components is NOT required to create a network?

Wireless adapter

Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?

802.11n

Select the tags you MUST use to have a proper HTML document. (Select three.)

<head> <body> <html>

Which network type uses a coaxial cable to receive its signal?

Cable

On a flowchart, which of the following represents a decision?

Diamond

What does the following JavaScript code snippet do when the code is loaded in a browser?

Displays the text "My JavaScript Button" and a button labeled "Click me!"

Which of the following is a good general rule to go by when deciding what to wear to an interview?

Dress one step above what the position requires.

A value that's used to identify a record from a linked table is called a ________________.

Foreign key

Which option should you choose to send an email you've received to a new person

forward

Which digital assistant was one of the earliest?

siri

Which of the following is a valid email address

[email protected]

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer?

Device Manager

A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values?

Float

Which of the following BEST describes a front-end developer?

He or she is concerned with the aesthetics of a website.

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take?

Ignore the paper and tell no one of its contents.

What are non-relational databases that deal with Big Data often referred to as?

NoSQL

Which of the following Application Architecture Model tiers describes office productivity software?

One Tier

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Power outage

Which medium does Wi-Fi use to send data between networks and devices?

Radio waves

Which of the following database objects provides a summary of data?

Reports

Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device?

Smart door locks

Web services that help people meet, interact, and share content with other people online are called

Social media

What is a web designer responsible for?

The look and feel of a website

What is the main purpose of agile methodologies?

To divide large IT projects into smaller, more manageable projects as part of an iterative process

Which software is Microsoft's anti-malware product that is preinstalled on most new computers?

Windows Defender

Which service would be most useful when looking for information about your favorite TV show

search engine

You want to have a hyperlink to testout.com on your web page. What is the correct HTML syntax to accomplish this?

<a href="www.testout.com">Link to the TestOut homepage</a>

Which of the following tags contains all the elements that will be presented on the visual portion of a website?

<body></body>

To be a proper HTML document, there are a few tags that every web page needs. Put these tags in the proper order.

<html> <head> </head> <body> </body> </html>

Which of the following are the proper HTML tags used to create a numbered list?

<ol> <li>Item 1</li> <li>Item 2</li> <li>Item 3</li> </ol>

A person that can use HTML, CSS, and JavaScript to create websites (as well as service the website and manage user accounts) is known as which of the following?

A full-stack web developer

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office.

When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?

Bar graph

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next BEST step to perform?

Contain the problem.

Which digital assistant was named after an artificial intelligence in an Xbox video game?

Cortana

If your network does not have a DHCP server, what must you do to access the internet?

Manually change the TCP/IP properties to match your network's settings.

Multiple computers configured to be able to communicate and share information with each other form a ____________.

Network

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?

Network Architect

Which of the following IT jobs includes installing and configuring network media?

Network administrator

Which of the following IT jobs typically do not require as much education or on-the-job experience?

Network technician

Making real and authentic connections with people is known as which of the following?

Networking

Which Creative Commons license type states that a work can be distributed as long as it is not changed?

No Derivative Works

Diana is using an image she found online in a poster that she is selling, even though the license states she is not allowed to make money off of it. Which license type would Diana MOST LIKELY be violating?

Non-Commercial

Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?

Non-repudiation

Which of the following programming models are built from class templates that have properties, attributes, and methods?

Objects

Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called _____________.

OneDrive

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model?

Open Source

What is the term for software that anyone can use or modify for free?

Open-source Software

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?

POP3

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon. Which of the following steps have you forgotten in your troubleshooting process?

Perform a backup.

Rita is a network administrator at a small office supplies company. She has been asked to design and implement a major upgrade of the company's network infrastructure. Which of the following activities will best help Rita to successfully manage this project? (Choose TWO.)

Perform a thorough needs assessment for the company Make sure the project requirements are clear and comprehensive

In which of the following should you expect some privacy?

Personally identifiable information entered into a human resource database

Which of the following tools would you use to check connectivity between two computers?

Ping

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?

Plain text

Which of the following future IT trends will require many data analysts who can collect data, decide which data is relevant, and make good decisions based on that data?

Predictive healthcare

Which of the following would you do as a computer forensics expert?

Recover digital evidence, some of which may have been damaged or deleted from storage devices.

Which of the following disaster recovery concepts applies when a server needs to be online and accessible at all times?

Redundancy

Even if you perform regular backups, what must be done to ensure that you are protected against data loss?

Regularly test restoration procedures.

Which of the following database features would provide a formatted, easy-to-read listing of the results of a query?

Report

Which of the following Artificial Intelligence (AI) concepts includes self-driving cars?

Robotics

Which of the following access controls gives only backup administrators access to all servers on the network?

Role-based

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satilite

You submitted the same paper from high school for a college class. Which form of plagiarism is this?

Self

Which of the following flow chart concepts is depicted below?

Sequence

Once you've identified a specific IT career you'd like to pursue, which of the following can BEST help you create a career plan? (Select two.)

Set clearly defined goals Compare your current experience with job qualifications

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue?

Targeted ads, Selling user-generated data to other companies

Which of the following schools allows students to receive dedicated training for a specific career?

Technical college

An information system is made up of which of the following general components?

Technology, people, and procedures

An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice?

Text-based flat file

Which of the following are primary resources

The United States Constitution and Jane Austen's Pride and Prejudice

Which of the following is the MOST important skill an internet service technician can possess?

The ability to quickly troubleshoot and fix any issues that may arise from customers

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

World Wide Web

What is the first step of the data analytics process?

collecting raw data

A NOT NULL __________ is a rule that prevents certain fields in a database from being left blank.

constraint

Which of the following is NOT one of the essential components of an information system?

hyperlinks

Which of the following lines will initiate an Internet search from the address bar of a web browser?

microsoft gov

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use?

network and internet

The password policy below incorporates the following: Passwords must include at least one capital letter Passwords must include a mix of letters and numbers Passwords must be different from the past eight passwords Passwords must contain at least one non-alphanumeric character Which of the following password best practices are being used? (Select TWO).

password history Password complexity

A pop-up blocker is a web browser feature that _________________.

prevents unwanted advertisements

What is the person called on an Agile team who gets to decide what goes on the sprint backlog and whether a task is done or not?

product owner

What is the collective name for creations that are not the intellectual property of anybody?

public domain

Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report?

query builder

Which option should you use to respond to the sender of an email but not all the recipients

reply

Which option should you use to respond to every single person included on an email

reply all

Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?

reports

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet?

satillite

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?

MAC address filtering

Which of the following does NOT rely on cloud technologies?

Microsoft Paint

Owners of internet-enabled cars can use their phones to do which of the following?

Monitor fuel usage

John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in

Mosaic

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones?

NFC chips

Which of the following is a category of SaaS applications?

Office tools

Which of the following is NOT an element of effective cost control in IT project management?

Waterfall methods

The ______________ is an information system that connects documents to each other by hypertext links.

World Wide Web

Which of the following is most likely to have peer-reviewed material written by an expert in the field?

Academic journal

Which of the following is the best device to deploy to protect your private network from an untrusted public network?

Firewall

Which of the following would best prevent an unauthorized person from remotely accessing your computer?

Firewall

Which of the following should not be used as a primary key in a table?

First Name

Which digital communication medium consists of top-level posts with threads of response posts?

Discussing Board

Which of the following utilities would you use to find the path between two computers?

tracert

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select two.)

-Your company is exposed to litigation by violating the software license agreement. -You risk losing your job.

How many pages should a resume be for someone looking for their first job?

1

Drag the correct HTML tag on the left to its description on the right. 1.Contains the title of the web page, links to stylesheets, and metadata to help search engines find the page. 2.Lets the browser know that it should interpret the document as HTML. 3.Contains all the elements that will be presented on the screen.

1.<head> 2.<html> 3.<body>

Match each language to its general purpose in a website. 1.Makes website elements interactive 2.Adds colors, fonts, and other design elements to website 3.Creates website structure and content

1.JavaScript 2.CSS 3.HTML

Match each database object on the left to its description on the right. 1.Formatted summary of information from a database. 2.User-friendly interface for adding to or retrieving information from a database. 3.Stores raw data in a relational database. 4.Retrieves specific information from a database. Can also be used to update, edit, and delete information.

1.Report 2.Form 3.Table 4Query

1.Verifies that each packet has been transmitted and received correctly 2.Encrypts and transfers hypertext pages on the World Wide Web 3.Matches unique IP addresses with easy-to-read URLs 4.Transfers hypertext pages on the World Wide Web 5.Divides files into packets and routes them through the Internet to their destination 6.Transmits packets in a continuous stream but doesn't verify packets

1.TCP 2.HTTPS 3.DNS 4.HTTP 5.Internet Protocol 6.UDP

After running the following pseudocode, what will the value of VARIABLE be? Set value of VARIABLE to 5 Increase the value of VARIABLE by 3 If the value of VARIABLE is odd, increase its value by 1 If the value of VARIABLE is even, increase its value by 1 If the value of VARIABLE is odd, increase its value by 1

10

How long should a good elevator pitch be?

30 seconds

Which cellular network type was the first to have gigabit-per-second speeds?

4G

Which of the following acronyms describes the traditional way to make sure data stays consistent across the entire database?

ACID

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts. Which of the following policies are BEST to configure? (Select TWO).

Account lockout threshold Minimum password length

If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?

Accounting

Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?

Algorithm

You are working on a program that needs to keep track of many values at the same time. Which of the following would you use?

An array

Which of the following describes a Man-in-the-Middle attack?

An attacker intercepts communications between two network hosts by impersonating each host.

Which areas of Information System (IS) technology can lead to better communication with customers? (Select two.)

Automation Order management

Databases, authentication, and user accounts are all part of a website's ______________.

Backend

Which data type uses historical data to make decisions in the present?

Analytical

In which of the following careers does one usually work together in teams to create software programs?

Application developer

A software developer wants to add a custom Google Map to a customer's website. Which of the following would the developer use to accomplish this?

Application programming interface (API)

In object-oriented programming, which of the following concepts is used to describe properties?

Attributes

Bill wants to use an image he found online. The license says he can use it but must credit the original creator. Which Creative Commons license was used?

Attribution

The process of proving to the computer that you are who you say you are is called ____________.

Authentication

The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________.

Big Data

Vast amounts of data are collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. What is this known as?

Big Data

What do biometrics use to perform authentication of identity?

Biological attributes

Which of the following is cryptocurrency?

Bitcoin

Dana has performed a transaction online. The transaction is recorded in a public database. Which future IT trend was MOST LIKELY used?

Blockchain technology

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?

Boolean

A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used?

Branching

Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.) IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%.

Branching 8%

A software developer wants to provide a compiled executable program to a customer. Which of the following computer languages would provide this capability?

C++

Mary is interested in moving into a career as a penetration manager. Which of the following IT certifications should she pursue?

CEH

Which of the following would be the BEST option to help you narrow down choices when identifying a career in IT?

Career Assessment Tests

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password

Which of the following certifications would you pursue to help you land a job as a network administrator?

Cisco CCNA

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?

Client error

Which data model focuses on high-level concepts?

Conceptual

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely backup important data to the Cloud.

Which of the following is a programming identifier that would be used to define values that don't change?

Constants

Which of the following careers often requires that one works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes?

Data analyst

Which of the following are the four general tasks a user needs to perform for a database to function properly?

Create, Read, Update, Delete

Why is it better to use a credit card than a debit card for online purchases?

Credit cards have better fraud protection

Which of the following utilities would you use to automatically assign IP addresses on a network?

DHCP

Which of the following is not an example of wireless networking communications?

DSL

Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns in data?

Data analyst

Which of the following describes the process of turning data points into useful information?

Data analytics

Forensics experts need to be thoroughly familiar with which of the following?

Data encryption methods, operating systems, and programming languages

The concern that Big Data is often obtained without the knowledge or consent of users falls under which Big Data concept?

Data ethics

Which of the following needs to be done before Big Data can be analyzed and interpreted?

Data extraction

Which of the following is a way for programmers and others to make sense of complex business flows?

Data modeling

Which of the following careers requires advanced programming and analytical skills related to data mining and big data analytics?

Data scientist

What is the technology that aggregates structured data from one or more sources called?

Data warehousing

Which of the following describes using data analytics to inform business operations?

Data-driven business decisions

Which of the following careers is responsible for backing up and securing an organization's databases?

Database administrator

Which process exports a database into a format that can be read by another program like a spreadsheet?

Database dump

Which of the following BEST describes a system administrator?

He or she is typically responsible for securing networks and responding to intrusions in smaller organizations.

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

Delete the email without opening the attachment.

Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can't save the file. Which of the following digital security methods is MOST likely preventing this?

Directory permission

Which of the following is NOT an example of an information system?

Electrical system

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

Email filtering

Which type of Information System (IS) is used to help doctors diagnose diseases?

Expert systems

A short piece of copyrighted music is used in a news story covering the musical artist. Which DMCA provision would MOST LIKELY allow this?

Fair Use

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?

Fair Use

In a relational database table, columns are better known as ________________.

Feilds

Which of the following Internet technologies provides the FASTEST speeds?

Fiber optic

In which of the following situations should you expect total privacy?

Financial transactions

Which of the following security measures is a form of biometrics?

Fingerprint scanner

Marty, a database administrator, has added a foreign key to a table in a database. Which of the following describes the purpose of a foreign key?

For one table to reference records in another table.

Which of the following makes it easier for users to enter data into their tables?

Forms

How many ping packets are sent by default in a successful ping request?

Four

Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________.

Frontend

The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen?

Full disk encryption

Which SQL command is used to give a user permission to a specific database object?

Grant

Which Internet protocol is used to transmit encrypted data?

HTTPS

Which of the following BEST describes a back-end developer?

He or she accesses information from databases and prevents unauthorized access.

Which of the following future trends in Information Technology (IT) refers to an organization automating as many tasks as possible?

Hyper-automation

The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select three.)

IMAP SMTP POP3

Which Information Systems (IS) career oversees integrating different technologies and systems within an organization?

IS manager

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe.

A security analyst does which of the following?

Inspects the company's network for security breaches and recommends measures to prevent future attacks.

Which of the following personality traits means that you possess high moral character regardless of whether you're being watched by others?

Integrity

Which of the following terms describes an organization that connects users to the Internet?

Internet Service Provider

Steve has just installed a new thermostat in his home that allows him to monitor and adjust the temperature from his phone even while he's away. Which future IT trend is this part of?

Internet of Things (IoT)

Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels?

Internet service technician

Alan, a programmer, needs to create an interactive web page. Which of the following programming languages types would he MOST likely use?

Interpreted

A _________ is a private network that utilizes the same technologies as the Internet.

Intranet

Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?

Looping

Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do? color = input('What is your favorite color?\n')print('Your favorite color is %s.' % color)

It gets input and produces output.

Which of the following BEST describes the ipconfig utility?

It is a utility that displays all current TCP/IP network configuration values.

Which of the following BEST describes a flowchart?

It is a visual representation of the logic in a program.

Which of the following BEST describes a customer relationship management (CRM) system?

It organizes notes, activities, and metrics into one system that works altogether.

Which of the following BEST describes the ping utility?

It sends a single packet to a specified network address and then waits for a reply.

A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Which of the following describes the procedural, or imperative, programming paradigm?

It uses a linear, top-down approach to solving problems.

Which Information Systems career analyzes and assesses the performance of existing systems in order to suggest how a business can operate more efficiently?

Systems analyst

Which of the following terms is used to describe a cycle or version that is repeated over and over?

Iterative

A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?

JavaScript

When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?

Line graph

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

Local installation

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).

Lock the screen with some form of authentication Keep the operating system up to date

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again. Which of the following policies are BEST to configure? (Select TWO).

Minimum password age Enforce password history

Which of the following job tasks would be something a quality assurance engineer specialist would do?

Monitor software development in order to maintain a high-quality product.

Which of the following is the system administrator's MOST important task?

Monitoring and maintaining system security

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?

Multifactor authentication

A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field?

Primary key

A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

Principle of least privilege

Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?

Prioritization

Which of the following Scrum artifacts is a central list of work that needs to be done?

Product backlog

A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?

Programmatic access

Andy is a very detail-oriented person. Which of the following Information Systems careers would likely be the BEST option for him?

Project manager

Which Information Systems (IS) career can work in other fields such as construction management and engineering?

Project manager

Which method should be used to search for an exact phrase

Put the search terms in "quotes"

Which database object is essentially questions that we can ask the database?

Queries

Which of the following can be used to ask a database questions and receive the data we're looking for?

Queries

Edward, a database user, would like to gather some specific information from a database and then manipulate the data in a spreadsheet. Edward then wants to save that information in a file format that will be used by another application. Which of the following database features would work BEST to accomplish this?

Query

You've just received an email message that indicates a new, serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. Based on the email message, which of the following are the next BEST actions to complete? (Select TWO).

Run a full anti-malware scan. Verify the information on well-known malicious code threat management Web sites.

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened.Which of the following email protocols is being used?

S/MIME

Mary needs to view all records from the Clients table. Which command should she use?

SELECT * FROM Clients

Mary needs to view the records from the Clients table that pertain to Travis. Which command should she use?

SELECT * FROM Clients WHERE name = Travis

What protocol is used to send email messages from a mail client to a mail server?

SMTP

What is the computer language that makes relational databases work?

SQL

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL

Which of the following is a Digital Millennium Copyright Act (DMCA) provision that protects ISPs from being held liable for the copyright infringement others who use their systems commit?

Safe Harbor

What is the name of the protocol suite used on the Internet?

TCP/IP

Which of the following is not a form of biometrics?

Smart card

Software that requires a monthly subscription fee is often called _______________.

Software as a service

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________.

Spam

Kickstarter and indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing

Startup

The flow of goods and services from the producer to the consumer is known as which of the following?

Supply chain

Which of the following is a methodology used by systems analysts?

System Development Life Cycle (SDLC)

A business wants to set up a database to store customer and order information. They have decided to use a relational database. Which of the following is the main benefit of using a relational database?

The data can be organized into separate tables that are related to each other.

BEST reason to search for articles in an online academic database

The sources are more likely to be peer reviewed

Which of the following is both an advantage and disadvantage of using cryptocurrencies?

They allow for complete privacy.

Which of the following BEST describes expert systems?

They are programs designed to solve complex problems in specific domains.

What is the biggest benefit to using a DHCP server in a large network?

They save time for the network administrator.

Which of the following statements is true regarding a network technician?

They troubleshoot reported problems and assist users in resolving network-connection issues.

Which of the following statements is true regarding a network architect?

They typically require an industry certification in network design and implementation.

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use?

Tracert

A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?

Trademark

Which of the following exist to help consumers know what products they're buying?

Trademarks

Which of the following is used to identify specific hypertext resources on the World Wide Web?

Uniform Resource Locator

Which type of college would you attend to earn a bachelor's degree?

University

A software developer wants to create an application that will work on Windows and Apple iOS operating systems. What can the developer do to make this task easier?

Use the APIs for each operating system.

What is the best countermeasure against social engineering?

User awareness training

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?

VPN

A developer is creating a program that will store a customer's latest order number. The value will change each time a customer creates a new order. Which of the following would MOST likely be used to store the value?

Variable

Which of the following are considered private technologies?

Video conferencing, instant messaging

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used?

WPA2

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

WPA2 and AES

Which of the following terms is most often used to describe a sequential or linear process of systems analysis and design?

Waterfall

What is the term for code that keeps running as long as a certain condition is met?

While loop

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?

Windows updates

1. Largest social media platform in the world 2.Most popular microblogging platform 3.Messaging platform that incudes built-in photo editing tools 4.Social network focused on images 5.Provides live video streaming

1. FaceBook 2.Twitter 3.Instagram 4.Instagram 5.Facebook

Match each term on the left to its definition on the right. 1. A service or software application that relies on shared resources over the Internet 2.A software application that accesses web applications and websites 3.A company that provides access to the Internet 4.An interconnected global public computer network 5.An information system that connects documents to each other by hypertext links

1.Cloud computing 2.Browser 3.Internet Service Provider 4.Internet 5.World Wide Web

Match each security policy on the left with the appropriate description on the right. 1.Provides a high-level overview of the organization's security program. 2.Specifies that user accounts should be locked after a certain number of failed login attempts. 3.Sets expectations for user privacy when using company resources. 4.Identifies a set of rules or standards that define personal behaviors.

1.Organizational Security Policy 2.Password Policy 3.Acceptable Use Policy 4.Code of Ethics

1.A catalog of all the mayor's speeches and news articles about them 2.The transcript of a speech by the mayor 3.A news article about the mayor's speech

1.Tertiary Source 2.Primary Source 3.Secondary source

Which of the following are characteristics of Bluetooth? (Select two.)

2.4 GHz radio wireless Ad hoc connections

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?

5 GHz

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)

802.11a 802.11g

Web browsers save website information in their _________, which helps the site load faster on future visits.

Cache

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer?

Change browser settings to notify before downloading.

_____________ computing refers to services and applications that run remotely over the Internet.

Cloud

A service that lets you store data in a remote location over the Internet is called _____________.

Cloud Storage

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series?

Alexa

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem?

Configure the browser proxy settings.

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses

Crowdsourcing platform

Which of the following careers typically requires programming expertise in languages such as Java and Python, in addition to skills in optimizing database systems?

Database developer

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. They use an 802.11n wireless network. The wireless network is broadcasting an SSID of Linksys. The wireless network uses WPA2 with AES security. Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.)

Disable SSID broadcast. Change the SSID to something other than the default.

What is one of the things that has set Siri apart from other digital assistants?

Easter eggs

What do cloud services provide to help with privacy and security concerns?

Encryption

Which of the following features is supplied by WPA2 on a wireless network? (Select two.)

Encryption Authentication

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet

Which network type uses light pulses to transmit data?

Fiber optic

In addition to good design sense, what else do web designers need to be proficient in?

Front-end coding languages

Which of the following charges resources used, such as bandwidth and processing power, by the second?

Google Cloud

Which of the following is used to change traffic lights for emergency vehicles?

ITCS

When protecting your online identity, which of the following is an internet security threat you need to be aware of

Phishing attempts

Which of the following is used on a wireless network to identify the network name?

SSID

What is the term for delivering an application over the internet called?

Saas

When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause

The video may become glitchy

Which of the following technologies can be used to make a phone call over an Internet connection?

VoIP

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

Which of the following is a disadvantage of web applications?

Web applications can carry a monthly or yearly fee.

When might it be most helpful to clear your browser's cache of temporary Internet files?

When a website is not functioning as it should


Conjuntos de estudio relacionados

Chapter 5 Quiz - Short-term Memory & Working Memory

View Set

CHAPTER 3: Expressions and Interactivity

View Set

Chp 7: The Skeletal System: The Axial Skeleton

View Set

Capstone Chap.8 Implementing Strategies: Marketing, Finance/Accounting, R&D, and MIS Issues

View Set

Intro. What is good nutrition & summary

View Set