cyber security 5-9
Which of the following would be the BEST answer to the question, "What is your greatest weakness"?
"I lack patience but this is something I'm working on."
Which of the following should be done to protect your identity when creating aa social media profile?
Always review and set privacy settings.
Which of the following features of an integrated development environment (IDE) BEST allow a programmer to code faster and with less effort? (Select two.)
An IDE can autocomplete key words. An IDE has a library of built-in functions.
An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email?
Cipher text
A major capability of Alexa is its ability to do what?
Control smart devices
Clickable text or images that take you to different sites on the World Wide Web are called __________.
Hyperlinks
Which of the following can recognize different voices that it records and tailor its responses accordingly?
Google Assistant
Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?
IMAP
Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?
Internet
Which of the following describes the declarative programming paradigm?
It uses a domain-specific language (DSL) to instruct the program what needs to be done.
What does JavaScript do?
Makes web pages interactive
Which of the following DBMS programs is open source?
MySQL
When working with an application such as Microsoft Excel to generate graphical reports, which of the following chart types would work BEST for data that has relative percentages of a whole?
Pie chart
Which of the following is NOT a good response to cyberbullying?
Post the bully's physical address on social media
Your company wants to use multifactor authentication. Which of the following would you most likely suggest?
PIN and smart card
Which of the following provides security for wireless networks?
WPA2
Which application makes sure your computer has the most recent versions of its system software?
Windows Update
Files that you send along with an email message called
attachments
Which of the following are considered asynchronous technologies?
message boards email
Which command is used to add, change, or remove fields on an existing table?
ALTER TABLE
You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in
Accidental
Which of the following is the most common type of resume?
Chronological
Social media marketers need the ability to do what?
Collaborate across teams
Which of the following is a disadvantage of the VolP system
Relies fully on a stable internet connection
Which of the following should you do before going to an interview?
Research the company history and culture
Small files that a website saves on your computer to remember your preferences are called ______________.
Cookies
What is the general term for software that creates and manages databases?
DBMS
What is asking specific questions to interpret Big Data called?
Data analytics
Which of the following are advantages of cloud computing? (Select two.)
Data security Easier collaboration
Which installation method is most likely to put your computer at risk of downloading a
Internet installation
Which type of data have elements in common but do not fit into rigid rows and columns in a table?
Semi-structured
Which of the following would be the BEST thing to do following an interview?
Send a thank you note
Which of the following describes the strategy that defines a business social media goals and objectives
Social media optimization (SMO)
Speaking in front of a mirror can help to improve which of the following traits?
Social skills
Which Information Systems career would MOST LIKELY provide user training for new or modified systems?
Systems analyst
Wikipedia is considered which of the following sources
Tertiary
All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not?
Wikis
A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?
Zombie/botnet
Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?
import random
Which of the following typically does NOT save a conversation after it has taken place?
online chats
Which type of analytical data can help you make investment decisions?
Market
Which of the following allows for access to the internet without either a Wi-Fi or a wired connection? 2G
Mobile Data
Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?
Modem
Which of the following is found in one or more columns of data and contains a unique identifier for the row?
Primary key
Which of the following rights is NOT guaranteed by copyright?
Right to avoid criticism
Which of the following is NOT a drawback of social media
Social media makes it difficult to keep in touch with friends and family
Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations?
Statistical tools and formulas
You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?
Use data wiping software to clear the hard drives
A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. Which of the following should the technician configure?
VPN
A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?
data and information
Which cellular network type was the first kind of network to use encryption?
2G
How many heading tags are available for heading and subheading when using HTML?
6
Which of the following statements is true regarding a VPN?
A VPN masks a user's IP address in order to make their actions untraceable.
A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?
Access point
Which programming language type is the most basic human-readable and closest to actual machine language?
Assembly
What is a disadvantage of using the cloud for data storage?
Cloud storage backups require a reliable internet connection.
Which of the following are features of using an Excel table to store data? (Select two.)
Column sorting Total row
Which of the following is a common form of social engineering attack?
Hoax virus information emails.
A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?
Improved performance
Which of the following can be used by a programmer to debug code?
Integrated development environment (IDE)
What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?
Proprietary Software
After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem?
Proxy settings
Which of the following terms is used to describe a lightweight development process with very little overhead?
Scrum
Which of the following provides services to hosts on its network?
Server
Which of the following is considered part of a smart home?
Thermostat
Which of the following components is NOT required to create a network?
Wireless adapter
Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?
802.11n
Select the tags you MUST use to have a proper HTML document. (Select three.)
<head> <body> <html>
Which network type uses a coaxial cable to receive its signal?
Cable
On a flowchart, which of the following represents a decision?
Diamond
What does the following JavaScript code snippet do when the code is loaded in a browser?
Displays the text "My JavaScript Button" and a button labeled "Click me!"
Which of the following is a good general rule to go by when deciding what to wear to an interview?
Dress one step above what the position requires.
A value that's used to identify a record from a linked table is called a ________________.
Foreign key
Which option should you choose to send an email you've received to a new person
forward
Which digital assistant was one of the earliest?
siri
Which of the following is a valid email address
Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer?
Device Manager
A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values?
Float
Which of the following BEST describes a front-end developer?
He or she is concerned with the aesthetics of a website.
You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer which states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take?
Ignore the paper and tell no one of its contents.
What are non-relational databases that deal with Big Data often referred to as?
NoSQL
Which of the following Application Architecture Model tiers describes office productivity software?
One Tier
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Power outage
Which medium does Wi-Fi use to send data between networks and devices?
Radio waves
Which of the following database objects provides a summary of data?
Reports
Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device?
Smart door locks
Web services that help people meet, interact, and share content with other people online are called
Social media
What is a web designer responsible for?
The look and feel of a website
What is the main purpose of agile methodologies?
To divide large IT projects into smaller, more manageable projects as part of an iterative process
Which software is Microsoft's anti-malware product that is preinstalled on most new computers?
Windows Defender
Which service would be most useful when looking for information about your favorite TV show
search engine
You want to have a hyperlink to testout.com on your web page. What is the correct HTML syntax to accomplish this?
<a href="www.testout.com">Link to the TestOut homepage</a>
Which of the following tags contains all the elements that will be presented on the visual portion of a website?
<body></body>
To be a proper HTML document, there are a few tags that every web page needs. Put these tags in the proper order.
<html> <head> </head> <body> </body> </html>
Which of the following are the proper HTML tags used to create a numbered list?
<ol> <li>Item 1</li> <li>Item 2</li> <li>Item 3</li> </ol>
A person that can use HTML, CSS, and JavaScript to create websites (as well as service the website and manage user accounts) is known as which of the following?
A full-stack web developer
Which of the following is the best definition for a LAN?
A network in a small geographic area, like in an office.
When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?
Bar graph
You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next BEST step to perform?
Contain the problem.
Which digital assistant was named after an artificial intelligence in an Xbox video game?
Cortana
If your network does not have a DHCP server, what must you do to access the internet?
Manually change the TCP/IP properties to match your network's settings.
Multiple computers configured to be able to communicate and share information with each other form a ____________.
Network
Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?
Network Architect
Which of the following IT jobs includes installing and configuring network media?
Network administrator
Which of the following IT jobs typically do not require as much education or on-the-job experience?
Network technician
Making real and authentic connections with people is known as which of the following?
Networking
Which Creative Commons license type states that a work can be distributed as long as it is not changed?
No Derivative Works
Diana is using an image she found online in a poster that she is selling, even though the license states she is not allowed to make money off of it. Which license type would Diana MOST LIKELY be violating?
Non-Commercial
Your company has surveillance cameras in your office, uses strong authentication protocols, and requires biometric factors for access control. These are all examples of what principle?
Non-repudiation
Which of the following programming models are built from class templates that have properties, attributes, and methods?
Objects
Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called _____________.
OneDrive
One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model?
Open Source
What is the term for software that anyone can use or modify for free?
Open-source Software
A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?
POP3
A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon. Which of the following steps have you forgotten in your troubleshooting process?
Perform a backup.
Rita is a network administrator at a small office supplies company. She has been asked to design and implement a major upgrade of the company's network infrastructure. Which of the following activities will best help Rita to successfully manage this project? (Choose TWO.)
Perform a thorough needs assessment for the company Make sure the project requirements are clear and comprehensive
In which of the following should you expect some privacy?
Personally identifiable information entered into a human resource database
Which of the following tools would you use to check connectivity between two computers?
Ping
A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?
Plain text
Which of the following future IT trends will require many data analysts who can collect data, decide which data is relevant, and make good decisions based on that data?
Predictive healthcare
Which of the following would you do as a computer forensics expert?
Recover digital evidence, some of which may have been damaged or deleted from storage devices.
Which of the following disaster recovery concepts applies when a server needs to be online and accessible at all times?
Redundancy
Even if you perform regular backups, what must be done to ensure that you are protected against data loss?
Regularly test restoration procedures.
Which of the following database features would provide a formatted, easy-to-read listing of the results of a query?
Report
Which of the following Artificial Intelligence (AI) concepts includes self-driving cars?
Robotics
Which of the following access controls gives only backup administrators access to all servers on the network?
Role-based
A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
Satilite
You submitted the same paper from high school for a college class. Which form of plagiarism is this?
Self
Which of the following flow chart concepts is depicted below?
Sequence
Once you've identified a specific IT career you'd like to pursue, which of the following can BEST help you create a career plan? (Select two.)
Set clearly defined goals Compare your current experience with job qualifications
There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue?
Targeted ads, Selling user-generated data to other companies
Which of the following schools allows students to receive dedicated training for a specific career?
Technical college
An information system is made up of which of the following general components?
Technology, people, and procedures
An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice?
Text-based flat file
Which of the following are primary resources
The United States Constitution and Jane Austen's Pride and Prejudice
Which of the following is the MOST important skill an internet service technician can possess?
The ability to quickly troubleshoot and fix any issues that may arise from customers
Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?
World Wide Web
What is the first step of the data analytics process?
collecting raw data
A NOT NULL __________ is a rule that prevents certain fields in a database from being left blank.
constraint
Which of the following is NOT one of the essential components of an information system?
hyperlinks
Which of the following lines will initiate an Internet search from the address bar of a web browser?
microsoft gov
You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use?
network and internet
The password policy below incorporates the following: Passwords must include at least one capital letter Passwords must include a mix of letters and numbers Passwords must be different from the past eight passwords Passwords must contain at least one non-alphanumeric character Which of the following password best practices are being used? (Select TWO).
password history Password complexity
A pop-up blocker is a web browser feature that _________________.
prevents unwanted advertisements
What is the person called on an Agile team who gets to decide what goes on the sprint backlog and whether a task is done or not?
product owner
What is the collective name for creations that are not the intellectual property of anybody?
public domain
Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report?
query builder
Which option should you use to respond to the sender of an email but not all the recipients
reply
Which option should you use to respond to every single person included on an email
reply all
Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis?
reports
You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet?
satillite
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?
MAC address filtering
Which of the following does NOT rely on cloud technologies?
Microsoft Paint
Owners of internet-enabled cars can use their phones to do which of the following?
Monitor fuel usage
John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in
Mosaic
You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones?
NFC chips
Which of the following is a category of SaaS applications?
Office tools
Which of the following is NOT an element of effective cost control in IT project management?
Waterfall methods
The ______________ is an information system that connects documents to each other by hypertext links.
World Wide Web
Which of the following is most likely to have peer-reviewed material written by an expert in the field?
Academic journal
Which of the following is the best device to deploy to protect your private network from an untrusted public network?
Firewall
Which of the following would best prevent an unauthorized person from remotely accessing your computer?
Firewall
Which of the following should not be used as a primary key in a table?
First Name
Which digital communication medium consists of top-level posts with threads of response posts?
Discussing Board
Which of the following utilities would you use to find the path between two computers?
tracert
Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select two.)
-Your company is exposed to litigation by violating the software license agreement. -You risk losing your job.
How many pages should a resume be for someone looking for their first job?
1
Drag the correct HTML tag on the left to its description on the right. 1.Contains the title of the web page, links to stylesheets, and metadata to help search engines find the page. 2.Lets the browser know that it should interpret the document as HTML. 3.Contains all the elements that will be presented on the screen.
1.<head> 2.<html> 3.<body>
Match each language to its general purpose in a website. 1.Makes website elements interactive 2.Adds colors, fonts, and other design elements to website 3.Creates website structure and content
1.JavaScript 2.CSS 3.HTML
Match each database object on the left to its description on the right. 1.Formatted summary of information from a database. 2.User-friendly interface for adding to or retrieving information from a database. 3.Stores raw data in a relational database. 4.Retrieves specific information from a database. Can also be used to update, edit, and delete information.
1.Report 2.Form 3.Table 4Query
1.Verifies that each packet has been transmitted and received correctly 2.Encrypts and transfers hypertext pages on the World Wide Web 3.Matches unique IP addresses with easy-to-read URLs 4.Transfers hypertext pages on the World Wide Web 5.Divides files into packets and routes them through the Internet to their destination 6.Transmits packets in a continuous stream but doesn't verify packets
1.TCP 2.HTTPS 3.DNS 4.HTTP 5.Internet Protocol 6.UDP
After running the following pseudocode, what will the value of VARIABLE be? Set value of VARIABLE to 5 Increase the value of VARIABLE by 3 If the value of VARIABLE is odd, increase its value by 1 If the value of VARIABLE is even, increase its value by 1 If the value of VARIABLE is odd, increase its value by 1
10
How long should a good elevator pitch be?
30 seconds
Which cellular network type was the first to have gigabit-per-second speeds?
4G
Which of the following acronyms describes the traditional way to make sure data stays consistent across the entire database?
ACID
You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts. Which of the following policies are BEST to configure? (Select TWO).
Account lockout threshold Minimum password length
If a malicious user gains access to the system, which component of the framework lets administrators know how they gained access and what exactly they did?
Accounting
Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?
Algorithm
You are working on a program that needs to keep track of many values at the same time. Which of the following would you use?
An array
Which of the following describes a Man-in-the-Middle attack?
An attacker intercepts communications between two network hosts by impersonating each host.
Which areas of Information System (IS) technology can lead to better communication with customers? (Select two.)
Automation Order management
Databases, authentication, and user accounts are all part of a website's ______________.
Backend
Which data type uses historical data to make decisions in the present?
Analytical
In which of the following careers does one usually work together in teams to create software programs?
Application developer
A software developer wants to add a custom Google Map to a customer's website. Which of the following would the developer use to accomplish this?
Application programming interface (API)
In object-oriented programming, which of the following concepts is used to describe properties?
Attributes
Bill wants to use an image he found online. The license says he can use it but must credit the original creator. Which Creative Commons license was used?
Attribution
The process of proving to the computer that you are who you say you are is called ____________.
Authentication
The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________.
Big Data
Vast amounts of data are collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. What is this known as?
Big Data
What do biometrics use to perform authentication of identity?
Biological attributes
Which of the following is cryptocurrency?
Bitcoin
Dana has performed a transaction online. The transaction is recorded in a public database. Which future IT trend was MOST LIKELY used?
Blockchain technology
A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?
Boolean
A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used?
Branching
Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.) IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%.
Branching 8%
A software developer wants to provide a compiled executable program to a customer. Which of the following computer languages would provide this capability?
C++
Mary is interested in moving into a career as a penetration manager. Which of the following IT certifications should she pursue?
CEH
Which of the following would be the BEST option to help you narrow down choices when identifying a career in IT?
Career Assessment Tests
A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?
Change the router's default password
Which of the following certifications would you pursue to help you land a job as a network administrator?
Cisco CCNA
You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?
Client error
Which data model focuses on high-level concepts?
Conceptual
What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?
Configure your device to remotely backup important data to the Cloud.
Which of the following is a programming identifier that would be used to define values that don't change?
Constants
Which of the following careers often requires that one works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes?
Data analyst
Which of the following are the four general tasks a user needs to perform for a database to function properly?
Create, Read, Update, Delete
Why is it better to use a credit card than a debit card for online purchases?
Credit cards have better fraud protection
Which of the following utilities would you use to automatically assign IP addresses on a network?
DHCP
Which of the following is not an example of wireless networking communications?
DSL
Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns in data?
Data analyst
Which of the following describes the process of turning data points into useful information?
Data analytics
Forensics experts need to be thoroughly familiar with which of the following?
Data encryption methods, operating systems, and programming languages
The concern that Big Data is often obtained without the knowledge or consent of users falls under which Big Data concept?
Data ethics
Which of the following needs to be done before Big Data can be analyzed and interpreted?
Data extraction
Which of the following is a way for programmers and others to make sense of complex business flows?
Data modeling
Which of the following careers requires advanced programming and analytical skills related to data mining and big data analytics?
Data scientist
What is the technology that aggregates structured data from one or more sources called?
Data warehousing
Which of the following describes using data analytics to inform business operations?
Data-driven business decisions
Which of the following careers is responsible for backing up and securing an organization's databases?
Database administrator
Which process exports a database into a format that can be read by another program like a spreadsheet?
Database dump
Which of the following BEST describes a system administrator?
He or she is typically responsible for securing networks and responding to intrusions in smaller organizations.
Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
Delete the email without opening the attachment.
Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can't save the file. Which of the following digital security methods is MOST likely preventing this?
Directory permission
Which of the following is NOT an example of an information system?
Electrical system
Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?
Email filtering
Which type of Information System (IS) is used to help doctors diagnose diseases?
Expert systems
A short piece of copyrighted music is used in a news story covering the musical artist. Which DMCA provision would MOST LIKELY allow this?
Fair Use
Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?
Fair Use
In a relational database table, columns are better known as ________________.
Feilds
Which of the following Internet technologies provides the FASTEST speeds?
Fiber optic
In which of the following situations should you expect total privacy?
Financial transactions
Which of the following security measures is a form of biometrics?
Fingerprint scanner
Marty, a database administrator, has added a foreign key to a table in a database. Which of the following describes the purpose of a foreign key?
For one table to reference records in another table.
Which of the following makes it easier for users to enter data into their tables?
Forms
How many ping packets are sent by default in a successful ping request?
Four
Using HTML and CSS to provide visual elements to the end user would be considered part of a website's _____________.
Frontend
The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen?
Full disk encryption
Which SQL command is used to give a user permission to a specific database object?
Grant
Which Internet protocol is used to transmit encrypted data?
HTTPS
Which of the following BEST describes a back-end developer?
He or she accesses information from databases and prevents unauthorized access.
Which of the following future trends in Information Technology (IT) refers to an organization automating as many tasks as possible?
Hyper-automation
The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select three.)
IMAP SMTP POP3
Which Information Systems (IS) career oversees integrating different technologies and systems within an organization?
IS manager
You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?
In a locked fireproof safe.
A security analyst does which of the following?
Inspects the company's network for security breaches and recommends measures to prevent future attacks.
Which of the following personality traits means that you possess high moral character regardless of whether you're being watched by others?
Integrity
Which of the following terms describes an organization that connects users to the Internet?
Internet Service Provider
Steve has just installed a new thermostat in his home that allows him to monitor and adjust the temperature from his phone even while he's away. Which future IT trend is this part of?
Internet of Things (IoT)
Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels?
Internet service technician
Alan, a programmer, needs to create an interactive web page. Which of the following programming languages types would he MOST likely use?
Interpreted
A _________ is a private network that utilizes the same technologies as the Internet.
Intranet
Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?
Looping
Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do? color = input('What is your favorite color?\n')print('Your favorite color is %s.' % color)
It gets input and produces output.
Which of the following BEST describes the ipconfig utility?
It is a utility that displays all current TCP/IP network configuration values.
Which of the following BEST describes a flowchart?
It is a visual representation of the logic in a program.
Which of the following BEST describes a customer relationship management (CRM) system?
It organizes notes, activities, and metrics into one system that works altogether.
Which of the following BEST describes the ping utility?
It sends a single packet to a specified network address and then waits for a reply.
A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Which of the following describes the procedural, or imperative, programming paradigm?
It uses a linear, top-down approach to solving problems.
Which Information Systems career analyzes and assesses the performance of existing systems in order to suggest how a business can operate more efficiently?
Systems analyst
Which of the following terms is used to describe a cycle or version that is repeated over and over?
Iterative
A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?
JavaScript
When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?
Line graph
You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?
Local installation
Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).
Lock the screen with some form of authentication Keep the operating system up to date
You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again. Which of the following policies are BEST to configure? (Select TWO).
Minimum password age Enforce password history
Which of the following job tasks would be something a quality assurance engineer specialist would do?
Monitor software development in order to maintain a high-quality product.
Which of the following is the system administrator's MOST important task?
Monitoring and maintaining system security
After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?
Multifactor authentication
A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field?
Primary key
A technician assists Joe, an employee in the Sales department, who needs access to the client database by granting Joe administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?
Principle of least privilege
Your company has a disaster recovery plan that says the order to restore data is customer data, financial system, then email. This is an example of what?
Prioritization
Which of the following Scrum artifacts is a central list of work that needs to be done?
Product backlog
A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?
Programmatic access
Andy is a very detail-oriented person. Which of the following Information Systems careers would likely be the BEST option for him?
Project manager
Which Information Systems (IS) career can work in other fields such as construction management and engineering?
Project manager
Which method should be used to search for an exact phrase
Put the search terms in "quotes"
Which database object is essentially questions that we can ask the database?
Queries
Which of the following can be used to ask a database questions and receive the data we're looking for?
Queries
Edward, a database user, would like to gather some specific information from a database and then manipulate the data in a spreadsheet. Edward then wants to save that information in a file format that will be used by another application. Which of the following database features would work BEST to accomplish this?
Query
You've just received an email message that indicates a new, serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. Based on the email message, which of the following are the next BEST actions to complete? (Select TWO).
Run a full anti-malware scan. Verify the information on well-known malicious code threat management Web sites.
A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened.Which of the following email protocols is being used?
S/MIME
Mary needs to view all records from the Clients table. Which command should she use?
SELECT * FROM Clients
Mary needs to view the records from the Clients table that pertain to Travis. Which command should she use?
SELECT * FROM Clients WHERE name = Travis
What protocol is used to send email messages from a mail client to a mail server?
SMTP
What is the computer language that makes relational databases work?
SQL
Which of the following protocols can be enabled so email is encrypted on a mobile device?
SSL
Which of the following is a Digital Millennium Copyright Act (DMCA) provision that protects ISPs from being held liable for the copyright infringement others who use their systems commit?
Safe Harbor
What is the name of the protocol suite used on the Internet?
TCP/IP
Which of the following is not a form of biometrics?
Smart card
Software that requires a monthly subscription fee is often called _______________.
Software as a service
Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _________.
Spam
Kickstarter and indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing
Startup
The flow of goods and services from the producer to the consumer is known as which of the following?
Supply chain
Which of the following is a methodology used by systems analysts?
System Development Life Cycle (SDLC)
A business wants to set up a database to store customer and order information. They have decided to use a relational database. Which of the following is the main benefit of using a relational database?
The data can be organized into separate tables that are related to each other.
BEST reason to search for articles in an online academic database
The sources are more likely to be peer reviewed
Which of the following is both an advantage and disadvantage of using cryptocurrencies?
They allow for complete privacy.
Which of the following BEST describes expert systems?
They are programs designed to solve complex problems in specific domains.
What is the biggest benefit to using a DHCP server in a large network?
They save time for the network administrator.
Which of the following statements is true regarding a network technician?
They troubleshoot reported problems and assist users in resolving network-connection issues.
Which of the following statements is true regarding a network architect?
They typically require an industry certification in network design and implementation.
Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use?
Tracert
A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?
Trademark
Which of the following exist to help consumers know what products they're buying?
Trademarks
Which of the following is used to identify specific hypertext resources on the World Wide Web?
Uniform Resource Locator
Which type of college would you attend to earn a bachelor's degree?
University
A software developer wants to create an application that will work on Windows and Apple iOS operating systems. What can the developer do to make this task easier?
Use the APIs for each operating system.
What is the best countermeasure against social engineering?
User awareness training
Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?
VPN
A developer is creating a program that will store a customer's latest order number. The value will change each time a customer creates a new order. Which of the following would MOST likely be used to store the value?
Variable
Which of the following are considered private technologies?
Video conferencing, instant messaging
A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used?
WPA2
While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?
WPA2 and AES
Which of the following terms is most often used to describe a sequential or linear process of systems analysis and design?
Waterfall
What is the term for code that keeps running as long as a certain condition is met?
While loop
You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?
Windows updates
1. Largest social media platform in the world 2.Most popular microblogging platform 3.Messaging platform that incudes built-in photo editing tools 4.Social network focused on images 5.Provides live video streaming
1. FaceBook 2.Twitter 3.Instagram 4.Instagram 5.Facebook
Match each term on the left to its definition on the right. 1. A service or software application that relies on shared resources over the Internet 2.A software application that accesses web applications and websites 3.A company that provides access to the Internet 4.An interconnected global public computer network 5.An information system that connects documents to each other by hypertext links
1.Cloud computing 2.Browser 3.Internet Service Provider 4.Internet 5.World Wide Web
Match each security policy on the left with the appropriate description on the right. 1.Provides a high-level overview of the organization's security program. 2.Specifies that user accounts should be locked after a certain number of failed login attempts. 3.Sets expectations for user privacy when using company resources. 4.Identifies a set of rules or standards that define personal behaviors.
1.Organizational Security Policy 2.Password Policy 3.Acceptable Use Policy 4.Code of Ethics
1.A catalog of all the mayor's speeches and news articles about them 2.The transcript of a speech by the mayor 3.A news article about the mayor's speech
1.Tertiary Source 2.Primary Source 3.Secondary source
Which of the following are characteristics of Bluetooth? (Select two.)
2.4 GHz radio wireless Ad hoc connections
A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?
5 GHz
Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)
802.11a 802.11g
Web browsers save website information in their _________, which helps the site load faster on future visits.
Cache
Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer?
Change browser settings to notify before downloading.
_____________ computing refers to services and applications that run remotely over the Internet.
Cloud
A service that lets you store data in a remote location over the Internet is called _____________.
Cloud Storage
You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem?
A proxy server is filtering access to websites.
Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series?
Alexa
Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem?
Configure the browser proxy settings.
Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses
Crowdsourcing platform
Which of the following careers typically requires programming expertise in languages such as Java and Python, in addition to skills in optimizing database systems?
Database developer
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. They use an 802.11n wireless network. The wireless network is broadcasting an SSID of Linksys. The wireless network uses WPA2 with AES security. Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.)
Disable SSID broadcast. Change the SSID to something other than the default.
What is one of the things that has set Siri apart from other digital assistants?
Easter eggs
What do cloud services provide to help with privacy and security concerns?
Encryption
Which of the following features is supplied by WPA2 on a wireless network? (Select two.)
Encryption Authentication
Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?
Ethernet
Which network type uses light pulses to transmit data?
Fiber optic
In addition to good design sense, what else do web designers need to be proficient in?
Front-end coding languages
Which of the following charges resources used, such as bandwidth and processing power, by the second?
Google Cloud
Which of the following is used to change traffic lights for emergency vehicles?
ITCS
When protecting your online identity, which of the following is an internet security threat you need to be aware of
Phishing attempts
Which of the following is used on a wireless network to identify the network name?
SSID
What is the term for delivering an application over the internet called?
Saas
When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause
The video may become glitchy
Which of the following technologies can be used to make a phone call over an Internet connection?
VoIP
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
WPA2
Which of the following is a disadvantage of web applications?
Web applications can carry a monthly or yearly fee.
When might it be most helpful to clear your browser's cache of temporary Internet files?
When a website is not functioning as it should