ITE EXAM 2
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
A modem can also function as what other piece of hardware?
A router
How can an attacker execute malware through a script?
A script can run a series of instructions to download and run malware.
What is a MAC address?
A unique hardware address for your device
What special technology allows computers to perform the intense processing needed to perform machine learning?
ANN
A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?
Agile development
Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?
An uninstaller removes the program files and any associated entries in the system files.
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
Bluetooth
Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home?
Bluetooth connection
Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?
Broad network access
Which of the following is true about broadband connections?
Broadband connections are "always-on" connections.
What can you do to make sure you are not contributing to software piracy?
Buy software only from legitimate resellers or directly from the manufacturer.
Which of the following programming languages adds interactivity to websites?
C++
Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers' sales transactions from his laptop as he travels.
CRM
File transfer programs belong in what software category?
Communications
What does a DSL modem use to send and receive digital data?
Copper telephone wiring
What would a password manager allow you to do?
Create and store multiple strong passwords.
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud?
Data analytics
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
Encrypt the data in the report.
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement?
Interpreters
Which of the following statements is NOT true about a local firewall?
It is a physical device that acts as a protective barrier.
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line.
Which of the following is an example of an object-oriented programming language?
Java
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Which of the following network standards applies to cellular networks?
LTE
When describing a client/server network, which of the following would be considered a client?
Laptop
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply.
Which of the following statements is true about public networks?
Many public networks are not secure.
What defines the behavior of an object in object-oriented programming ?
Method
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?
My Verizon VPN
What technology allows Siri to understand you when you request a route to a location in a nearby city?
Natural language processing (NLP)
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?
Omnichannel strategy
Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware?
Online storefront
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?
Piracy
Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?
Project manager
What kind of software products can you download from the Internet without being subjected to copyright restrictions?
Public domain software
Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role?
Receiving clerk
Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using?
Reinforcement learning
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?
Require users to identify themselves using biometrics or passwords.
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?
Restorers
Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?
Saas
Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space?
Save a copy of the file on her local hard drive.
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?
Shareware
During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?
Support and security phase
What is a digital certificate?
Technology used to verify a user's identity
The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for?
Tester
Which of the following is a disadvantage of using cloud computing to share files?
The inability to access your files if you lose your Internet connection.
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
The network connection is probably not secure.
How does a wireless network key work with an encrypted wireless network?
The sending and receiving devices must know the wireless network key to communicate.
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
They disguise the network as an evil twin.
In a connected network, how are hubs and switches similar to one another?
They provide a central point for cables in a network.
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
_____ are new releases of an app and may require an additional fee before you can install them.
Upgrades
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?
Video conferencing application
Which of the following would be considered a strong password?
Wbcm2!4!820!
Is it advisable to enable automatic updates on security software?
Yes; this helps to catch and quarantine new malware before it harms the computer.
When using encryption from your home computer, how would you configure the router?
You can use the wireless router to set the encryption key and type of encryption.
Which of the following statements about browser security settings is false?
You must keep your accumulated web history as long as you use the browser.
Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?
a crash
During which phase of the SDLC is software tested to make sure each function works as intended?
all phases
Which of the following tools translates the source code of a procedural program into binary code?
compiler
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
firewall
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?
firewall
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?
freeware
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?
incomplete documentation
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
mobile hotspot
Which of the following does a software license usually specify?
number of people authorized to use the software
Devices on a _____ area network are connected via Bluetooth.
personal
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
Which of the following is an example of a personal area network?
smartwatch and phone connected via Bluetooth
Which of the following types of websites typically provides the least security?
social media sites
What do you call the rules each programming language has for writing instructions?
syntax
What is the goal of a DevOps methodology?
to produce programs quickly and then offer continuous updates
Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.
wireframes
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?
Analysis phase
What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?
Antispyware
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?
App Store for iOS
As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time?
Artificial intelligence (AI)
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this?
B2B
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
Biometrics
Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?
Customer service representative
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?
Digital Rights Management
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
With more and more people using technology, what physical health diagnosis is on the rise?
Do not provide personal information over the phone or through email.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Extranet
Which of the following is an authentication method to keep your data safe?
Fingerprint scanner
Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?
Fourth generation language
Which of the following is the strongest password?
H@veAGr3atDaY!
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote tracking to retrace the thief's steps.
Lately, Marcus has noticed a lot of customer complaints that items purchased from his web store don't meet expectations. What improvement to the website will best help to solve this problem so customers know better what to expect when they buy items from his website?
High-quality product photos
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections.
Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?
IaaS
_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.
Installation
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?
It contained typos and other grammatical errors.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?
Patch finders
_____ are tools that track the memory usage, status, and errors of currently running software.
Process managers
In which category of software do Microsoft Office Word and Excel belong?
Productivity
What hardware is essential to creating a home Wi-Fi network?
Router
Which commonly used programming language is used to manage, access, and search for database content?
SQL
Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems?
Service pack
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
She has a home network with smart home devices.
An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?
Site license
Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling?
Smart plug
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
_____ is the process of creating programs and apps from the idea stage to distribution to users.
Software development
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Star
Which of the following is not a general guideline for developers?
Start programming before creating a proposal.
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Storing financial information in an unsent email message.
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
What area of software development focuses on the user's reaction to and interaction with the software product?
User experience
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
Virtual private network
While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?
Visit the manufacturer's website and install the latest updates for the app.
Which of the following is NOT a leading provider of PaaS and IaaS services?
Walmart
What type of network sends signals through airwaves and usually does not require cables?
Wireless network
In which of the following situations is a digital certificate useful?
You are signing a rental lease.
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps.
digital rights management
Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?
integrated development environment (IDE)
To access the Internet, a router must be connected to a _____.
modem
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address
What type of program would have a class named Student with objects called fullTime and partTime?
object-oriented program
The set of activities performed to build a program is called the _____.
software development life cycle (SDLC)
Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?
waterfall method
At what point are you responsible for following the terms in a software license agreement?
when you click or take another action to accept the terms