IT study set
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: A. a storage area network. B. an embedded OS. C. network attached storage. D. a Type 1 hypervisor.
type 1 hypervisor
Which of the following is MOST likely used to represent international text data? A. ASCII B. Octal C. Hexadecimal D. Unicode
unicode
1. Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.) A. RAID storage B. Uninterruptible power supplies C. Off-site backups D. Private cloud servers E. Virtual-hosted desktops F. Warm sites
uninterruptible power supplies off-site backups
1. A user is having issues connecting to the Internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue? A. Validate the certificate. B. Verify the proxy settings. C. Disable the pop-up blocker. D. Clear the browser cache.
verify the proxy settings
A programmer uses DML to modify: A. files B. permissions C. data D. backups
data
Which of the following is the number of bytes that is in 2KB? A. 1024 B. 2048 C. 20000 D. 1048576
2048
Which of the following would indicate the FASTEST processor speed? A. 3.6GHz B. 3.6MHz C. 3.6Mbps D. 3.6Gbps
3.6GHz
An IP address is 32 bits long. If converted to bytes, it would be: A. 4 bytes B. 8 bytes C. 16 bytes D. 64 bytes
4 bytes
When transferring a file across the network, which of the following would be the FASTEST transfer rate? A. 1001Kbps B. 110Mbps C. 1.22Gbps D. 123Mbps
1.22Gbps
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign? A. 127.0.0.1 B. 172.16.2.189 C. 192.168.257.1 D. 255.255.255.0
172.16.2.189
Which of the following is a logical structure for storing files? A. Folder B. Extension C. Permissions D. Shortcut
folder
A developer needs to add a table to a database. Which of the following database activities should the user perform? A. UPDATE B. ALTER C. CREATE D. REPORT
CREATE
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data? A. UPDATE B. DELETE C. ALTER D. DROP
DROP
1. Which of the following services is used to translate a URL to an IP address? A. ARP B. IMAP C. DNS D. MAC
DNS
Which of the following storage types is MOST vulnerable to magnetic damage? A. Flash B. SSD C. Optical D. HDD
HDD
A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated? A. EXPORT B. IMPORT C. SELECT D. ALTER
IMPORT
A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this? A. POP3 B. IMAP C. ICMP D. SMTP
POP3
Which of the following is an example of an interpreted language? A. C++ B. Java C. Python D. Go
Python
Which of the following contains exactly four copper wires? A. RJ45 B. VGA C. RJ11 D. USB
RJ11
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use? A. SELECT B. INSERT C. DELETE D. UPDATE
SELECT
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task? A. Text editing software B. Visual diagramming software C. Spreadsheet software D. Web browsing software
Spreadsheet software
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk? A. DLP B. ACL C. TLS D. IPS
TLS
1. In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity? A. RF B. IR C. VPN D. NFC
VPN
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen? A. Host-based firewall B. Strong administrator password C. Anti-malware software D. Full disk encryption
full disk encryption
Which of the following allows wireless devices to communicate to a wired network? A. Modem B. Switch C. Firewall D. Access point
access point
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems.Which of the following is being developed? A. Algorithm B. Software C. Pseudocode D. Flowchart
algorithm
1. Which of the following should be used to store a list of strings? A. Array B. Constant C. Variable D. Branch
array
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration? A. Array B. Vector C. List D. String
array
The computer language that is closest to machine code is: A. query language B. scripting language C. markup language D. assembly language
assembly language
Which of the following is the closest to machine language? A. Scripted languages B. Compiled languages C. Query languages D. Assembly languages
assembly languages
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent? A. Method B. Object C. Property D. Attribute
attribute
Which of the following describes something in a database that refers to the unique identifier in the parent table? A. Attribute B. Constraint C. Foreign key D. Schema
attribute
Which of the following does a NoSQL database use to organize data? A. Primary keys B. Schemas C. Keys/values D. Tables
keys/values
Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses? A. Behavior security B. Information Identity Management C. Unauthorized hacking D. Authorized hacking
behavior security
1. A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router? A. Enabling encryption B. Setting a new SSID C. Changing the default password D. Using 802.11ac
changing the default password
1. A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST? A. Check Knowledge Base B. Search local logs C. Research possible theories D. Question users
check knowledge base
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use? A. Standalone application B. Client-server application C. Web application D. Cloud application
client-server application
1. A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts? A. Text editor B. Word processor C. Command line D. Spreadsheet
command line
Which of the following relational database constructs is used to ensure valid values are entered for a column? A. Schema B. Permissions C. Constraint D. Column
constraint
1. A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document? A. Patent B. Trademark C. Watermark D. Copyright
copyright
A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network? A. Change the SSID. B. Change the default password. C. Change to WEP security. D. Create a guest network.
create a guest network
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports? A. Data capture and collections B. Asset inventory inputs C. Sales statistics D. Average loss output
data capture and collections
An administrator grants permission for a user to access data in a database. Which of the following actions was performed? A. Data correlation B. Data manipulation C. Data gathering D. Data definition
data definition
1. Which of the following database concepts would MOST likely use a CSV file? A. Data querying B. Data reports C. Data importing D. Data persistence
data importing
A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data? A. Flat file B. Word processor C. Database D. Network share
database
An organization exports an inventory database nightly. This is an example of: A. database query. B. database report. C. database backup. D. database import.
database backup
1. A developer embeds a query in a high-level program to extract information from a database. This is an example of: A. database direct access B. database utility access C. database programmatic access D. database manual access.
database direct access
The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list? A. Database software B. Word processing software C. Conferencing software D. Presentation software
database software
A function is BEST used for enabling programs to: A. hold a list of numbers. B. be divided into reusable components. C. define needed constant values. D. define variables to hold different values.
define variables to hold different values
Which of the following types of encryption would BEST protect a laptop computer in the event of theft? A. Disk B. Email C. VPN D. HTTPS
disk
A technician overhears a systems administrator mention the term `IOPS`. To which of the following operating system functions would the term BEST apply? A. Disk management B. Process management C. Application management D. Service management
disk management
1. Which of the following is a primary confidentiality concern? A. Eavesdropping B. Impersonating C. Destructing D. Altering
eavesdropping
Which of the following would be considered the BEST method of securely distributing medical records? A. Encrypted flash drive B. Social networking sites C. Fax D. FTP file sharing
encrypted flash drive
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength? A. Update from 802.11b to 802.11g. B. Ensure sources of EMI are removed. C. Enable WPA2-Enterprise. D. Use WiFi Protected Setup.
ensure sources of EMI are removed
A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability? A. Backups B. Prioritization C. Indexes D. Failover
failover
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain? A. File backup B. Data restoration C. Fault tolerance D. Restoring access
fault tolerance
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data? A. Flat file B. Memory C. Relational database D. Solid state drive
flat file
1. Which of the following numbering systems is used to represent MAC addresses? A. Binary B. Decimal C. Octal D. Hexadecimal
hexadecimal
1. Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter? A. Web applications B. Hypervisor C. Load balancer D. Dynamic routing
hypervisor
1. A database administrator has placed data from another source into a database. Which of the following did the database administrator perform? A. Import B. Export C. Create D. Query
import
Which of the following would a company consider an asset? A. An external company used to destroy defective hard drives B. Information residing on backup tapes C. A company-sponsored technology conference D. A certified third-party vendor that provides critical components
information residing on backup tapes
Which of the following BEST describes the practice of providing user credentials when logging onto the network? A. Output B. Storage C. Input D. Processing
input
1. A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information? A. Install and configure a firewall. B. Install and run an antivirus program. C. Install and use another browser. D. Install and configure an IDS.
install and run an antivirus program
A technician replaces the video card in a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem? A. Replace the user's display. B. Update the PC's operating system. C. Replace the video cable. D. Install new video drivers.
install new video drivers
A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of: A. confidentiality concerns. B. accounting concerns. C. integrity concerns. D. availability concerns.
integrity concerns
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe? A. Local application B. Intranet application C. Extranet application D. Internet application
intranet application
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.) A. Printer B. Mouse C. Webcam D. External hard drive E. Speakers F. Display
mouse display
A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using? A. One-tier B. Two-tier C. Three-tier D. n-tier
one-tier
1. A user has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password? A. The password might be easier for an attacker to guess. B. Password compromise would allow access to all of the systems. C. Single sign-on would be unable to function correctly. D. Systems might reject the password-based or different requirements.
password compromise would allow access to all of the systems
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk? A. Password history B. Password reuse C. Password expiration D. Password age
password expiration
1. Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the fol owing best practices should she implement? A. Password history B. Password length C. Password reuse D. Password complexity
password reuse
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer? A. Email previewing B. Patching C. Clear browsing cache D. Kill process
patching
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this? A. Perform process management. B. Perform task scheduling. C. Set the system date and time. D. Set a reminder to run the script.
perform task scheduling
Which of the following is a value that uniquely identifies a database record? A. Foreign key B. Public key C. Primary key D. Private key
primary key
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of: A. redundancy. B. replication. C. prioritization. D. fault tolerance.
prioritization
Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter? A. Private B. Traditional C. Public D. Cloud
private
Which of the following BEST describes an application running on a typical operating system? A. Process B. Thread C. Function D. Task
process
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card? A. Input B. Output C. Storage D. Processing
processing
Which of the following are the primary functions of an operating system? (Choose two.) A. Provide structure for file and data management. B. Provide protection against malware and viruses. C. Provide peer-to-peer networking capability. D. Provide user data encryption. E. Provide virtual desktop capability. F. Provide system resources.
provide structure for file and data management. provide system resources
An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause? A. Script blocker B. Proxy settings C. Private browsing D. Full browser cache
proxy settings
Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored? A. Record B. Report C. Column D. Procedure
record
1. A schema is a critical part of which of the following? A. Relational database B. Key/value database C. Document database D. NoSQL database
relational database
1. SQL databases use primary and foreign keys to enable which of the following? A. Rows B. Fields C. Schemas D. Relationships
relationships
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function? A. Rule-based access control B. Mandatory access control C. Role-based access control D. Discretionary access control
role-based access control
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create? A. Record B. Constraint C. Field D. Schema
schema
1. Which of the following programming language types is generally the FASTEST way to write a program ad hoc tasks quickly? A. Compiled programming language B. Assembly language C. Scripting language D. Pseudocode
scripting language
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data? A. Server B. Tape library C. External HDD D. Workstation
server
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN? A. Laptop B. Workstation C. Mobile phone D. Server
server
A user logs into a laptop using a username and complex password. This is an example of: A. biometrics B. multifactor authentication C. least privilege D. single-factor authentication
single-factor authentication
Which of the following is an example of multifactor authentication? A. Password and passphrase B. Fingerprint and retina scan C. Hardware token and smartphone D. Smart card and PIN
smart card and PIN
Which of the following is the BEST overall storage option for a laptop?A. Flash drive B. Hard drive C. SD card D. Solid-state drive
solid-state drive
Which of the following BEST describes the purpose of a vector in programming? A. Storing a collection of data B. Repeating a similar operation C. Capturing user input D. Performing mathematical calculations
storing a collection of data
For which of the following is a relational database management system MOST commonly used? A. Building flowcharts B. Storing information C. Generating reports D. Creating diagrams
storing information
Which of the following data types should a developer use when creating a variable to hold a postal code? A. Integer B. String C. Float D. Boolean
string
Which of the following BEST describes the physical location of the data in the database? A. Table B. Column C. RAM D. HDD
table
Which of the following would MOST likely use an ARM processor? A. Laptop B. Tablet C. Workstation D. Server
tablet
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause? A. The light switches do not support WPA2. B. The router is operating on a different channel. C. The key does not meet password complexity requirements. D. The SSID is not being broadcast.
the router is operating on a different channel
Which of the following is a reason why complex passwords are required? A. To encourage password variety B. To prevent someone from guessing them C. To make them harder to remember D. To reduce social engineering attacks
to prevent someone from guessing them
1. A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use? A. Spreadsheet software B. Word processing software C. Presentation software D. Visual diagramming software
visual diagramming software