B.2
Which of the following transfer rates is the FASTEST? 1. 181 Mbps 2. 1,480 Mbps 3. 1.24 Gbps 4. 1,282 Kbps
1,480 Mbps
Which of the following is the correct binary representation of the number 2? 101 10 110 11
10
Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.) IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%.
8% Branching
Which installation method often requires you to immediately install updates from the Internet after installation is complete?
CD or DVD installation
Which of the following SQL commands would you use to delete an entire table and all of its data?
DROP
Which of the following terms describes the set of SQL commands that change the structure or schema of a database, such as the DROP command?
Data Definition Language (DDL)
What group of database commands is used to define and modify metadata?
Data definition
A database administrator wants to export all the data in a database to a comma separated value file (.CSV) where it can be opened by spreadsheet software. Which of the following would be the EASIEST way to create the exported file?
Database dump
On a flowchart, which of the following represents a decision?
Diamond
Maintaining confidentiality in the workplace is important for building and maintaining trust and for ensuring an open and honest communication between customers, clients, and employees. Which of the following threatens data confidentiality?
Dumpster diving
The troubleshooting methodology starts by identifying the problem. The first step in identifying the problem is to gather information. Which of the following is the NEXT step?
Duplicate the problem, if possible
Anna, a technician, is helping a customer troubleshoot an issue where a server will intermittently become inaccessible to employees. Anna has completed researching the knowledge bases available. What should Anna do NEXT as part of standard troubleshooting methodology?
Establish a theory of probable cause
In a relational database table, columns are better known as ________________.
Fields
Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?
Firmware
Which of the following should not be used as a primary key in a table?
First name
Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________.
Frontend
Julien, a programmer, was fixing a bug in the programming code written by another developer. He discovered that the code with the bug was repeated several times. Instead of fixing the bug in multiple places, which of the following programming features should he use so the code is only located in one place?
Functions
Dave, a videographer, wants to purchase a network switch that will improve the performance of transferring video from his video editing workstation to a backup server. Which of the following transfer rates is the FASTEST for network switches available to consumers? Kbps Mbps Gbps Tbps
Gbps
You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs?
Hard disk
Which of the following notational systems is MOST LIKELY used to represent a MAC address? Hexadecimal Octal Decimal Binary
Hexadecimal
What are the two main types of firewall? (select two)
Host-based Firewall Network Firewall
Which of the following BEST describes a flowchart?
It is a visual representation of the logic in a program.
A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?
JavaScript
Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?
Looping
Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?
Modify
The accounting department needs to be able to share files, such as spreadsheets, that can be accessed by everyone in the department. Which of the following would work BEST to provide a collaborative workspace?
Network share
Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?
Non-repudiation
The idea of programming by modeling real-world things into computer code is called _____________.
Object-oriented programming
When protecting your online identity, which of the following is an internet security threat you need to be aware of?
Phishing attempts
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Power outage
While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.)
Processes Details
A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?
Programmatic access
Which of the following describes this code snippet? If COUNTER is less than ten: *Increase the value of COUNTER by 1 *Change the displayed number to new COUNTER value
Pseudocode
Which of the following access controls gives only backup administrators access to all servers on the network?
Role-based
What is malware that monitors a user's behavior without their knowledge?
Spyware
Which of the following BEST describes what a kilobyte is a measurement of? Data throughput Storage space CPU speed Power level
Storage Speed
As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use?
String
What is the name of the protocol suite used on the Internet?
TCP/IP
An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice?
Text-based flat file
Anna, a user, downloaded a free pdf editing application from the internet. Now the laptop constantly displays desktop popups and several applications won't start. Anna was the victim of which of the following?
Trojan horse
What is the type of malware that is often disguised as legitimate software?
Trojan horse
You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?
Windows updates
Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users.
Your company is exposed to litigation by violating the software license agreement. You risk losing your job.
Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?
import random
What is a type of malware that exploits vulnerabilities in the operating system and often spreads to other computers by replicating itself?
worm