Medcerts Comptia A+ Practice Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Jackie wants to follow best practices regarding backing up her data. After completing a backup, what's her next step?

Verify the backup Correct Answer: Verify the backup. Verify the backup to make certain you have backed up properly. Incorrect Answers: Delete the source materials. Eventually delete earlier backups but not the source files. Run the backup two more times. There's no reason to run it more than once. Update the backup log. This is a red herring.

Marcus outlines the steps involved in the backup process. One he particularly stressed is the need to verify the backup. Why is this step important?

Verifying ensures good data in the backup Verifying ensures good data in the backup. Verifying is about data integrity. Incorrect Answers: Verifying produces the backup log files. Verifying is about data integrity, not logging. Verifying saves the backup to the cloud. Verifying is about data integrity, not location. Verifying speeds up the backup process. Verifying is about data integrity, not speed.

John is in London, and Ricardo is in Madrid. Both have Internet connections. Which of the following technologies would enable them to communicate with the least cost?

VoIP Correct Answer: VoIP. Voice over IP enables two computing devices with access to the Internet to communicate all over the world with near-real-time voice. Incorrect Answers: Kinetics. Kinetics refer to devices that track movement, like Microsoft Kinect. RTV. RTV doesn't exist. Virtualization. Virtualization enables you to run an operating system/computer within another operating system.

Which code example correctly references the Name property for the third element in an array named Cities?

$Cities[2].Name Correct Answer: $Cities[2].Name. The specific programming language syntax will vary from one language to another, but this syntax is the best answer; this syntax works in Microsoft PowerShell. Incorrect Answers: Cities2.Name, Cities3.Name. These won't work because it looks like the variable names, respectively, are Cities2 and Cities3 when the variable is named just Cities. $Cities[4]. Name references the fourth item in the array, if starting at 1, or the first, if starting at 0.

Which of the following addresses is expressed in decimal format?

200.1.1.1 Correct Answer:200.1.1.1. This is an IPv4 address expressed in decimal (base 10) notation.Incorrect Answers:2E-15-79-68-0C-6B. Hexadecimal (base 16) notation uses characters 0-9 and A-F where A=10 and F=15.11110001. This is a binary representation of the decimal number 241.2E-15-79-68-0C-6J. This is not a valid hexadecimal representation because of the letter J.

What is happening in the following code snippet? Set-Variable -Name hourly_wage -Value 17.99 -Option ReadOnly

A constant is being declared Correct Answer: A constant is being declared. In Microsoft PowerShell, the -Option ReadOnly parameter creates a constant. Incorrect Answers: A Boolean variable is being declared. Booleans are the true/false type of variables. An integer variable is being declared. Integers are whole numbers. An access-controlled variable is being declared. We aren't limited who can or cannot use this constant.

Joey has read about all the scary malware on the Internet and wants to make sure his new computer is protected by applying patches and such to the operating system. What should he configure?

Automatic updates Correct Answer: Automatic updates. Most operating systems have this feature turned on by default; if not, this is what you need to keep the OS up-to-date and patched against vulnerabilities. Incorrect Answers: Anti-malware software. Anti-malware software protects against viruses and other malicious programming. Software firewall. A software firewall stops unwanted traffic in and out of a networked computer. System Configuration. Run the System Configuration utility to adjust startup options. It doesn't apply to OS updates.

You are creating a custom application that will process orders from a web site. Your code needs a variable that will store whether the customer is eligible for a discount. What data type should you use for this variable?

Boolean Correct Answer: Boolean: This data type is used for true/false indicators, such as determining whether a customer is eligible for a discount. Incorrect Answers: String. This data type is used to store text such as last name or contract ID. Float: This data type is used to store numbers with decimal points. Integer. This data type is used to store whole numbers (no fractions). The upper and lower numeric limit will depend on the specific database solution.

Margot set up a new computer, going through all the personalization steps. When she tries to activate the operating system, however, she discovers that the computer isn't connected to the Internet. What should she do next?

Check the Ethernet cable Correct Answer: Check the Ethernet cable. Always check the silly things first. Incorrect Answers: Call technical support. Although she could call tech support, she should do some simple troubleshooting first. Reboot the computer. This might fix the problem, but it isn't the first thing she should try. Wait. It usually takes five minutes after personalization for the Internet to come up. This is an incorrect statement.

Aria has a new SOHO router. What management configuration should she do first?

Change the administrator password Correct Answer: Change the administrator password. It's too easy to get the default passwords for SOHO routers. Incorrect Answers: Change the SSID. Although this is something desirable to do, she doesn't need to do it right away. Disable the SSID. There's rarely any benefit to disabling the SSID. Disable Wi-Fi. There's no point to a SOHO router without Wi-Fi.

Angelo needs to configure his new wireless router. Which of the following should Angelo do to ensure that no one can make unauthorized changes?

Change the administrator password Correct Answer: Change the administrator password. The default admin password for every commercial wireless router is two seconds of a Google search away. Change it! Incorrect Answers: Change the encryption key. Encryption is good, but passwords can get by it. Change the router's address. Changing the router's address might slow someone down for a few seconds, but it won't stop even a casual hacker from changing settings. Change the SSID. Changing the SSID helps differentiate the Wi-Fi network from other networks nearby. It does nothing to stop further changes.

Simon decided to install Windows 10 on a fresh new SSD. Installation went like a dream, but once he finished the initial installation steps and logged in, Windows looked terrible. All the icons were huge, and the desktop was crowded. What should he do to fix the display issue?

Change the resolution Correct Answer: Change the resolution. Always set the resolution on a modern LCD monitor to the native resolution for the best picture. Incorrect Answers: Change the DPI settings. This is a tough one because changing the overall DPI settings can create this effect. The key here is that it's a fresh install. Change the screen orientation. This option is for pivoting monitors, so you can change from default landscape mode to portrait mode. Reboot the computer. Although rebooting often is the fix in Windows, it's not the best option here.

What does pressing the reset button on a SOHO router accomplish?

Changes the admin password to factory default Correct Answer: Changes the admin password to factory default. The reset button enables you to deal with a misconfigured SOHO router by changing configurations to the default. Incorrect Answers: Turns off Wi-Fi. Wi-Fi is usually enabled by default; resetting the router returns it to default settings. Resets to last known good configuration. Last known good is a Windows feature rather than a SOHO router feature. Re-enables the WAN port. Although this could happen with a reset, it's not the best answer here.

Aaron wants a light portable computer that is quick and does not require him to purchase office applications or additional software for browsing the internet. He spends most of his time connected to the internet. Which OS should he choose?

Chrome OS Correct Answer: Chrome OS. Google's lightweight OS relies on cloud (internet) applications for productivity, such as Google Docs, and comes with a built-in web browser. Incorrect Answers: Windows. Microsoft Windows is the opposite of a lightweight OS. Linux. Although some Linux distros are a lot lighter than Windows or macOS, they're not specifically designed to rely on Internet applications. BlackBerry OS. Before its relatively recent demise, the BlackBerry offered a decent suite of OS-specific apps. These did not rely on internet applications.

Ciara sets up a project group with five other employees. All need to work together, share information, and create a final product. What sort of software should the project group use?

Collaborative Correct Answer: Collaborative. Collaborative software, by name and definition, enables multiple users to contribute (usually) at the same time. Incorrect Answers: Operating system. OS software enables interaction between a person and a machine. Specialized. Many types of software, including collaborative software, could be considered "specialized." In this case, though, it most likely means "designed for some unique purpose," such as video or audio editing. Utility. Utility software accomplishes specific tasks, such as cleaning up unnecessary files.

Which of the following software types can combine multiple files into a single file that's smaller than the size of all the files added together?

Compression Correct Answer: Compression. Various compression types, such as .zip and .rar, enable you to create a single archive of multiple files. Incorrect Answers: Database. A database file is composed of multiple records or entries, not multiple files. Document sharing. Document-sharing services, such as Dropbox, enable you to share folders that contain multiple files but not create a file composed of multiple subfiles. Presentation. Although you can add image files to presentation files (that's generally how they're built), the more you add, the larger the final file.

Edward has a set of short films that he wants to distribute to several people in different cities. Which of the following options would best increase accessibility?

Copy the film files to cloud-based storage and send invitations to all recipients Correct Answer: Copy the film files to cloud-based storage and send invitations to all recipients. As long as you're connected to the Internet, you can access files from anywhere and almost any device. Incorrect Answers: Copy the film files onto thumb drives and mail them to each recipient. This could work but is not the best answer here. Have the tech department set up an FTP server and create accounts for all recipients. This could work but is not the most efficient solution. E-mail each film file to each recipient. Use e-mail for smaller messages and files.

While vacationing on a Caribbean cruise, you connect to the ship's Wi-Fi network to check e-mail. What type of connectivity allows ship passengers to connect to the Internet?

Correct Answer:GPS. Global Positioning System uses Earth-orbiting satellites to allow communication from anywhere on the planet's surface, including while at sea.Incorrect Answers:Fiber optic. This is a network connectivity solution that transmits light through tiny fibers over long distance. You wouldn't want this dragged behind a ship as it cruises.Twisted-pair copper. This is a common LAN connectivity solution that transmits electrical signals through copper wires. You wouldn't want this dragged behind a ship as it cruises.DSL. This Internet connectivity solution uses existing phone copper wires to allow Internet connectivity. Again, it's not something you want for ship at sea Internet connectivity!

Ivan is preparing to teach a group of new users about file copying and moving. What steps should he recommend for moving a file from one drive to another most efficiently?

Cut the file from one drive and paste to the other drive Correct Answer: Cut the file from one drive and paste to the other drive. These actions move, rather than copy, the file. Incorrect Answers: Make a duplicate copy of the file on the first drive and move the copy to the other drive. These actions copy, rather than move, the file.Delete the file on the first drive and use the Recycle Bin on the other drive to retrieve the file. This is not how the Recycle Bin works. Copy the file on the first drive and paste it to the other drive. These actions copy, rather than move, the file.

While perusing a network file server, you come across files that have an .iso file extension. What type of file is this?

DVD image Correct Answer: DVD image. This is a file that contains an image of the contents of a CD or DVD optical disk. Larger software applications are made available for download using the format that might also be compressed. Incorrect Answers: Compressed archive. Depending on the tool used, this could have a .zip or .tar file extension among many more. An ISO file can be compressed to a ZIP to reduce the size, which means it downloads quicker. Application installer. Not all ISOs are used to install software. PowerShell script. PowerShell scripts normally have a .ps1 file extension.

Shirley buys a new printer/scanner/copier that connects to her computer via USB. What else does Shirley need to install to unlock all the features of the multifunction device?

Drivers for each device Correct Answer: Drivers for each device. Each device will require drivers and possibly support software to unlock the full functionality of the MFD. Incorrect Answers: OEM license software. Although this sounds plausible, it's not the correct answer here. Print server software. Most modern operating systems contain print server software, enabling multiple computers to share a single print device. Windows Update. Windows Update is part of the OS and runs automatically by default.

Bill, the receptionist at Bayland Widgets Corporation, has an older Windows computer tucked under his desk. It ran fine for more than three years but now has started spontaneous shutdowns. What is the most likely cause of the problem?

Dust accumulation Correct Answer: Dust accumulation. Dust accumulation can block the components from air circulation and cause overheating. Incorrect Answers: Increased ventilation. It's more likely the opposite. Power supply corruption. Power supplies can die but not get corrupted. Power supply failure. Although a dying power supply could cause these symptoms, it's not the best answer here

Which computer programming concept best allows code reuse?

Function Correct Answer: Function. This programming construct is given a name and contains one or more lines of code. The function can then be invoked by name many times over. Incorrect Answers: Loop. Software developers use loops to iterate through lines of code, such as to process a list of files stored in a variable. Object. This is a complex programming construct (compared to a simple string variable, for example) that consists of properties and methods. An object could contain details about a file, a network connection, a database record, or, really, anything. Variable. This is used by programmers to store values in memory that is usable by referring to the variable name.

Marsha has a new roommate, Emma, who has asked to use Marsha's computer to access the internet and check Buzzfeed. What type of account should Marsha allow Emma to use so that Emma can't really do anything except use the internet?

Guest Correct Answer: Guest. Martha should enable the Guest account and allow Emma access through it. That keeps Emma from accessing anything she should not on the computer. Incorrect Answers: Administrator. The administrator account has nearly full control of everything on a computer, which is the opposite of what she wants for her roommate. Power user. Power users can do almost as much as administrators, so this is not an account to use for her roommate. Standard. A standard user account has access to applications, printers, and more. Although this is not a bad choice, it's not the best choice here.

You are configuring a second disk in your macOS computer. What should you choose?

HFS Correct Answer: HFS. This is an Apple file system type that is commonly used with macOS. Incorrect Answers: NTFS. NTFS is a Windows file system that supports advanced attributes including encryption and compression. EXT4. This is a Unix and Linux file system type that is not commonly used with Windows machines. FAT32. This is an older file system type for Windows machines that does not support encryption and compression without third-party utility software.

Patricia accesses the web site of a notable financial services company to download information needed for her taxes. Which protocol should she use?

HTTPS Correct Answer: HTTPS. Using the secure version of the Hypertext Transfer Protocol ensures the safety of the data. Incorrect Answers: FTP. File Transfer Protocol offers zero security. HTTP. HTTP by itself does not offer much security. SFTP. SSH File Transfer Protocol is good but not the most common protocol over the Web.

Vlad sits down at his new workstation. Which of the following ergonomic issues should he consider first?

Height of the keyboard and mouse Correct Answer: Height of the keyboard and mouse. Placement of hands makes a big difference with long-term use of a workstation. Incorrect Answers: Type of mouse pad. Today's optical mice handle all sorts of surfaces. Ventilation. Although important, ventilation isn't a big issue with ergonomics. Color of the monitor. This matters to some people but doesn't have much to do with ergonomics.

Which of the following terms is most closely related to measuring database disk performance?

IOPS Correct Answer: IOPS. Input/output operations per second is a measurement for disk throughput. Incorrect Answers: Kbps. This means kilobits per second where kilo is equivalent to 1,000. This measurement is much too slow for today's storage technologies. Caching. While caching database content in memory can improved read performance, it is not directly related to disk performance. Scale horizontally. This is a technique that adds computers to accommodate an increased workload.

Which type of address can be configured via DHCP?

IP Correct Answer: IP address. This software address uniquely identifies a host on a TCP/IP network and allows network packet transmissions addressed to the IP address to be received. The Dynamic Host Configuration Protocol (DHCP) contains a pool of configured IP addresses that can be provisioned to DHCP client systems automatically without administrative intervention. Incorrect Answers: ASCII. This industry standard is used to represent English language text characters across different types of hardware and software platforms. Unicode. An industry standard that extends ASCII, Unicode is used to represent characters from most spoken languages in the world on any computer platform. MAC address. This is a 48-bit hexadecimal address that uniquely identifies a network interface at the hardware level.

Pranks R Us is a retail chain that sells prank items. You are planning a relational database design that will store retail inventory. Which data type should you choose for the Items In Stock column?

Integer Correct Answer: Integer. This data type is used to store whole numbers (no fractions). The upper and lower numeric limit will depend on the specific database solution. Incorrect Answers: String. This data type is used to store text such as last name or contract ID. Float: This data type is used to store numbers with decimal points. Boolean: This data type is used for true/false indicators, such as a column named Insured.

You are adding metadata to product documentation files on a file server for your company's soon to be released product. The metadata will be used for long-term data classification and archiving purposes. Which of the following is the best category for this type of file?

Intellectual property Correct Answer:Intellectual property. Also called IP, this is digital data that has unique artistic properties such as books.Incorrect Answers:Financial: This is not the best description of these types of files compared to IP.Private: Over the long term, these files will be made available to purchasers of the product.Internet of Things: Also called IoT, this refers to any device that connects to and communicates over the Internet such as security cameras, baby monitors, home environmental controls, smart cars, home appliances such as refrigerators, and so on.

Which term best describes wireless security cameras that connect to the Internet?

Internet of Things Correct Answer:Internet of Things: Also called IoT, this refers to any device that connects to and communicates over the Internet such as security cameras, baby monitors, home environmental controls, smart cars, home appliances such as refrigerators, and so on.Incorrect Answers:WAP. Wireless access points are central wireless network connectivity devices.WPA. Wi-Fi Protected Access is a security standard designed to protect Wi-Fi networks through authentication and encryption.Big data. This is a term describing vast amounts of data that accumulate daily that require specialized software clusters for processing.

John purchased a new Apple iPad mobile device. Of the following, which should he do first when configuring Wi-Fi settings?

John should first configure the SSID Correct Answer: Configuring SSID (network name) settings. One of the first things you should do when setting up a new mobile device is to select an SSID from the available Wi-Fi sources; alternatively, you will need to configure the wireless client to access a nonbroadcasting SSID. Incorrect Answers: Configure e-mail. Definitely configure e-mail settings, but John needs to connect to the WLAN. Configure Bluetooth. Bluetooth offers great communication options for mobile devices but is not essential for Wi-Fi setup. Configuring screen lock. Screen lock is important but is not essential for setting up Wi-Fi.

When initially setting up an operating system, Jill will need to configure at least the computer name and what other setting?

Localization Correct Answer: Localization. Specifically, she'll need to set the time zone. Incorrect Answers: Accessibility options. This is an optional step, usually done after the initial setup. Backup. This should be set up but not during the initial setup. Guest account. She really needs only one account during the initial setup.

During which SDLC phase are software security fixes created and made available to consumers?

Maintenance Correct Answer: Maintenance. This includes product enhancement requests from users, as well as internally identified, fix requirements are implemented by developers. Incorrect Answers: Deployment. This SDLC phase makes the software solutions available to users such as being downloaded from a web site or pushed automatically to managed stations within an organization. Testing. In this SDLC phase, various types of tests can be conducted against software changes such as unit testing and regression testing. Design: This SDLC phase uses software solution requirements to begin planning the solution; flowcharting is common here.

You are traveling for work with a work-issued laptop. You need to install an application that is available only on the work network. What should you do?

Make a VPN connection to the office and install the software Correct Answer: Make a VPN connection to the office and install the software. Most companies use virtual private networks (VPNs) to allow encrypted connections over the Internet to a private corporate network. Incorrect Answers: Return to the office to install the software. A VPN allows software installation without having to return to the office. Use a web browser to download the software from the OEM web site, Use a web browser to download functionally equivalent. Most organizations prohibit user software installation unless configured by the company's IT team.

Margie tries to open a folder shared on the network but fails. What could be the problem?

Margie needs proper permissions Correct Answer: Margie needs proper permissions set by the system administrator at their discretion (often referred to discretionary access control [DAC] or rule-based access). The question implies that she could at least try to open the folder (thus the network being up). Incorrect Answers: The folder is on an NTFS drive that supports both shared folder network permissions as well as local file system permissions. This wouldn't matter on a network share, as long as permissions were in place. FAT32 file systems can apply only shared network folder permissions. Margie needs to switch folder attributes. Changing attributes requires proper permissions. The network is down. This could certainly be a problem but isn't the most likely problem here.

A fax machine requires a specific component to use POTS to send a fax. Select the best choice from this list.

Modem Correct Answer: Modem. A fax machine can send faxes over the traditional telephone network using a built-in modem. Incorrect Answers: NIC. A modem or fax machine doesn't require a network interface connection. Power supply. Although electricity is necessary, this isn't the best answer. Wireless adapter. POTS requires wires by definition.

Of the following types of personally identifiable information (PII), which should you protect the most?

Mother's maiden name Correct Answer: Mother's maiden name. In the 20th century in the United States, it was common for a wife to adopt her husband's last name. This obscured the maiden name and made for a nice PII for any of her children. Incorrect Answers: E-mail address. E-mail addresses are readily available and easy to spoof. Last name. A last name or surname is readily available. Phone number. Phone numbers are readily available.

Steve and his team need to work together on a project. One clear need is a device that will provide shared storage with high availability. Which of these devices would work best?

Network-attached storage appliance Correct Answer: Network-attached storage appliance. A NAS enables multiple users on a network to access data. Incorrect Answers: 64 GB USB flash drive plugged into one of the team member's computers. Although you can share and access a shared flash drive over a network, it's not the best answer here. 2 TB HDD installed in one of the team member's computers. Although you can share and access a shared hard drive folder over a network, it's not the best answer here. Blu-ray Disc Recordable installed in all of the team members' computers. Although sharing BD-R discs among the users could work, it wouldn't be very efficient.

Your news web site allows user comments, links, and embedded files of various types. Developers in your company are creating a solution that will process and store these vast amounts of data. Which data solution should you use to store these vast amounts of data? Your Answer

NoSQL database Correct Answer: NoSQL database. This is a type of database that does not use a rigid schema to define data that will be stored. Incorrect Answers: Data correlation. This is a statistics term describing how related variables change together. Relational database. This is a type of database that uses a rigid schema to define how data will be stored. Meaningful reporting. This is a phrase referring to extracting only relevant data from large data sets to support informed decision-making.

You have configured an in-memory database cache to improve database query performance. What type of storage is this?

Nonpersistent storage Correct Answer: Nonpersistent storage. Database cached content is stored in RAM, and RAM is nonpersistent storage; when the caching server is shut down, cache contents are normally lost unless configured otherwise. Incorrect Answers: Persistent storage. This is data that survives even when machines a powered off, such as data stored on disk as opposed to in RAM. IOPS. Input/output operations per second is a measurement for disk throughput. Network storage. This is when disk space is made available to consumers over a network such as through NAS, iSCSI, or SAN solutions.

Cloud-based backups provide which of the following safety features?

Off-site storage of data Correct Answer: Off-site storage of data. Cloud backups provide off-site storage of data for high availability. Incorrect Answers: Full backup of PC data. No one said anything about PCs here, although a full operating system backup or individual file backup to the cloud is possible. Incremental copy of data. Incremental is an old backup term where only changed data gets backed up. This has nothing to do with the cloud. Local copy of data. The cloud is the opposite of local.

Which type of legal mechanism protects creative digital works?

Patent Correct Answer: Patent. Intellectual property is a digital creative work that can be protected from copycats through patents. Incorrect Answers: Trademark. A sign, symbol, or phrase that uniquely identifies a product, such as the Coca-Cola phrase, logo, and colors. Copyright. A legal right to publish artistic, musical, or literary works. PII. Personally identifiable information such as street address, birthdate, or credit card number.

What does the CPU do in a modern computing device?

Performs data computation Correct Answer: Performs data computation. The CPU is the main processor for everything that happens in the computer. Incorrect Answers: Enables users to encrypt. This function is part of the network stack. Enables users to store data. Mass storage, such as hard drives and solid-state drives, provides data storage. Provides electricity. The power supply unit (PSU) handles electricity needs for the computer.

Ariel receives an e-mail message from an illegitimate source, asking for her username and password. What kind of security threat just happened?

Phishing Correct Answer: Phishing. A classic phishing attack comes from a seemingly legit source but asks for information that the source would never request. Incorrect Answers: Cracking. Cracking is the malicious use of software for unintended purposes. Hacking. Hacking is the act of accessing or using software in some fashion that the original writers never intended. Spam. Spam is unsolicited e-mail.

Pablo receives an e-mail message formatted to appear as if his bank sent it. The e-mail message explains that Pablo must confirm the name, address, and Social Security number listed on the bank account. Which of the following best describes the security threat?

Phishing Correct Answer: Phishing. Unsolicited e-mail from a seemingly trusted source asking for sensitive information is a classic phishing attack. Incorrect Answers: Shoulder surfing. Looking over a user's shoulder to catch a password is classic shoulder surfing. Social engineering. Using employees to gain access to sensitive information is classic social engineering. Spam. Spam is simply unsolicited e-mail.

Eve purchased a software program on eBay. The package was shrink-wrapped when it arrived and installed just fine. When she clicked the option to activate the program, however, activation failed. What could cause activation to fail?

Previously installed program Correct Answer: Previously installed program. Although it's easy to make digital copies of software, activation requires a genuine, not previously activated copy. This is an example of license theft. Incorrect Answers: Counterfeit program. A counterfeit program could cause problems, but it's not a likely answer here. Invalid operating system. This would prevent installation, not activation. Virus attack. A virus attack on her computer could cause problems but is not the best answer here.

Tera installs a copy of a new productivity app on each of the ten workstations in her team. How can she make sure all copies are legal?

Purchase a multi-user license Correct Answer: Purchase a multi-user license. The key here is the word compliance in the question. Only with a license that covers all the installations will the company be able to install the software legally. Incorrect Answers: Purchase a multicomputer license. This is not the standard license name for legally installing on multiple machines. Purchase a single-user license. The user wants to install it on more than one user's computer.The copies are automatically legal because they installed correctly. Installation does not cover legal issues.

Which database item is used to extract specific stored data?

Query Correct Answer: Query. There are many different types of queries used to filter out rows, including standard queries such as "How many customers have spent more than $500 in the last quarter?" or delete queries such as "Remove all rows where the last sign in date is before the year 2000." Incorrect Answers: Report. Reports are formatted displays of database data. Reports can be based on queries that show only a subset of rows according to what is filtered by the query. Row. Also called a record, this is a collection of related fields for an item, such a row containing a customer last name, first name, phone number, credit card number, and so on. Relationship. Relational database management systems allow multiple tables to be linked together (related) based on a common value. For example, a customerID field in the Customers table can be linked to the customerID field in the Transactions table.

Katherine looked at Jill's new computer and commented in passing that it contained both permanent and temporary data storage components. Jill knows that the hard drive stores data long term. What's the short-term component?

RAM Correct Answer: RAM. Computers use random access memory for temporary data storage. Incorrect Answers: CPU. Computers use the central processing unit for primary computation. HDD. A hard disk drive stores data long term. SSD. A solid state drive stores data long term.

Doug was working on a term paper in Microsoft Word when the power went out briefly. When he restarted the computer and started Word, his term paper was gone. What happened?

RAM flushed the data when the power went out Correct Answer: RAM flushed the data when the power went out. System memory is temporary storage and volatile, meaning it won't hold data without electricity. Incorrect Answers: The CPU flushed the data when the power went out. The CPU doesn't really store much.The hard drive flushed the data when the power went out. Hard drives store data even without power. Word flushed the data when the power went out. Word got flushed at the same time.

Which type of testing ensures that software code changes hasn't broken unrelated code that worked previously?

Regression testing Correct Answer: Regression testing. This type of test makes sure unrelated functionality has not been adversely affected by new code changes. Incorrect Answers: Unit testing. This type of test is run against a code module as opposed to the entire software solution. Sandbox testing. This refers to a simulated test environment, often done using virtualization on-premises or in the cloud. Performance testing. This refers to the controlled application of stress workloads against an IT solution to observe performance metrics.

Which SDLC phase involves legal and regulatory compliance considerations?

Requirements Analysis & Planning Correct Answer: Requirements Analysis & Planning. Many factors including compliance are considered during this first SDLC phase. Incorrect Answers: Coding. This SDLC phase involves programmers actually writing code using a specific language. Maintenance. This SDLC phase involves providing support for a software solution as well as creating bug fixes and adding enhanced functionality. Testing. This SDLC phase tests new or modified code and can also involve end users.

Roman is enjoying hot coffee at the local café. After successfully connecting his smartphone to the guest Wi-Fi, he is unable to browse Internet web sites he normally connects to while other patrons have no Internet browsing problems. What is the most likely cause of the problem?

Roman did not interact with the captive portal Correct Answer: Roman did not interact with the captive portal. Captive portals are used at many Wi-Fi hotspots. They are a web page that the user must interact with, such as agreeing to usage terms, before being granted Internet access. Incorrect Answers: Roman's web browser is blocking all scripts. This is unlikely since he had no previous problems connecting to the same web sites. Proxy settings are incorrect. This is not as likely as forgetting to interact with the captive portal. Proxy settings funnel traffic through an intermediary server that has Internet connectivity; this is also used to examine and control outbound Internet traffic. DNS is not working. This is unlikely; it's working for everybody else at the café.

You have been tasked with coming up with a solution to efficiently run the highest density of virtual machine on a single host on-premises. What should you do?

Run a type 1 hypervisor Correct Answer: Run a type 1 hypervisor. This type of hypervisor does not require an existing operating system; it is the operating system. Incorrect Answers: Run a type 2 hypervisor. This type of hypervisor runs as an application within an existing operating system. Dedicated software such as type 1 hypervisors are a better match for this scenario. Host the virtual machines in the cloud. The solution must exist on-premises. Configure an on-premises virtualization cluster. A cluster uses multiple hosts and does not increase the virtual machine density on a single host.

Cindy needs to run a native Windows 8 app. She has a Windows 7 Pro computer. How can she most easily accomplish this task? (She has a valid copy of Windows 8 on DVD.)

Run virtualization software on her computer, install Windows 8 into a virtual machine, and run the app Correct Answer: Virtualization. You run each virtual machine in a discrete folder with no need for additional partitions or volumes. Incorrect Answers: Build a second computer, install Windows 8, and run the app., Create a new partition on her hard drive, install Windows 8 on that second partition, and run the app., Repartition her computer, install Windows 8, and run the app., All three incorrect answers would enable her to run the Windows 8 app, but all require more work or expense than virtualization.

Which document outlines expected uptime and performance details for cloud services?

SLA Correct Answer: SLA. Service level agreements are contracts between cloud customers and providers that specify expected uptime and performance when using a specific cloud service. Incorrect Answers: DRP. Disaster recovery plans provide steps for recovering a failed system or process in the event of a problem. GPS. The Global Positioning System uses Earth-orbiting satellites to allow communication from anywhere on the planet's surface, including while at sea. DSL. This Internet connectivity solution uses existing phone copper wires to allow Internet connectivity.

Marguerite wants to use the Wi-Fi network at the local café with her smartphone. What does she need to know?

SSID information Correct Answer: SSID information. Use the SSID or network name to connect to a wireless network. Incorrect Answers: SMTP IP address. Configure the Simple Message Transfer Protocol as part of e-mail setup. POP3 information. Configure Post Office Protocol as part of e-mail setup. Client IP address. She most likely doesn't need this information to connect to a Wi-Fi network.

Which protocol enables two computers to communicate securely?

SSL Correct Answer: SSL. SSL enables secure communication between two computers. Incorrect Answers: HTTP offers no security. FTP can require a username and password, but the information is transmitted in clear text. FTP offers very little security. SNMP offers no security.

Which term best describes cloud software that does not need to be installed but instead runs within a web browser?

SaaS Correct Answer: SaaS. Software as a Service refers to cloud-based end-user application software. Incorrect Answers: IaaS. Infrastructure as a Service provides IT infrastructure such as networks, storage, and virtual machines all hosted on cloud provider equipment, accessible over a network. PaaS. Platform as a Service refers to cloud services offering database or developer functionality without having to worry about configuring underlying virtual machines. SECaaS. Security as a Service provides security functionality such as denial-of-service attack protection, malware scanning, and so on, as a cloud service.

Your company uses cloud-based virtual machines to host a cluster of database servers. You have modified each virtual machine definition in the cloud to use an additional virtual CPU core. Which term best describes your action?

Scale up Correct Answer: Scale up. Increase the underlying horsepower for a computer through faster CPUs, more CPU cores, more RAM, and so on. Incorrect Answers: Scale out, Scale horizontally. A technique used to accommodate an increased database load by adding machines, this can be manual or automated. Scale in. This reduces the number of virtual machines working together to support an IT workload.

Trinity is creating a definition for how data will be stored within a table. Which term best describes what Trinity is creating?

Schema Correct Answer: Schema. Relation databases use a schema, or blueprint, to define how data will be stored. Incorrect Answers: Index. Databases use indexes to speed up sorting and searching on one of more fields. Primary key. This is a unique row identifier within a table such as CustomerID. Foreign key. This is a unique identifier between multiple relational tables such as CustomerID in the Customer table linking to CustomerID in the Purchases table.

You are creating a database management script. The script contains the "use east_region; select * from employees;" command. What does this do? Choose the best answer.

Select all fields from the employees table in the east_region database Correct Answer: Select all fields from the employees table in the east_region database. Incorrect Answers: Select all rows from the employees table in the east_region database, Select all rows from the east_region table in the employees database, Select all fields from the east_region table in the employees database. "Select *" means select all fields.

You are using a new company-issued macOS computer. You need to check that a specific application is installed. Which search tool should you use?

Spotlight Correct Answer: Spotlight. This MacOS tool allows users to search for applications. Incorrect Answers: Safari. This is an Apple-based web browser.Dock. The macOS Dock resides at the bottom of the screen and is used to invoke frequently used apps. Unity. This is the default GUI used with Ubuntu Linux.

What could cause a browser to fail to display a web page, displaying only plug-ins and search bars?

The computer has too many toolbars downloaded and installed Correct Answer: The computer has too many toolbars downloaded and installed. This answer wins by default because the others are wrong. In reality, if Maria had that many toolbars, her browser wouldn't do much at all. Incorrect Answers: The computer has too many apps downloaded and installed. This would cause overall sluggishness, not browser issues specifically. Malware has infected the computer. A malware infection could cause a problem with pop-ups and other irritants, but not so much on plug-ins and search bars. Shareware has infected the computer. Shareware doesn't infect (unless it also contains malware).

Which description best fits the following programming code example? $Object1.Delete()

The delete method is being run against the object Correct Answer: The delete method is being run against the object. Methods run actions against an item, such as deleting an object. Incorrect Answers: The delete property is being run against the object. Delete would be a method (action) and not a property (descriptive characteristic). Object1.Delete is the name of an array variable, Object1.Delete is the name of a string variable. The variable name is Object1; Delete is the reference to invoking a method.

When Rob returns from a conference in Las Vegas, his anti-malware software detects a virus on the thumb drive he used at the conference. He knows for certain that he used the thumb drive in one of the public kiosks to transfer files. What is the most likely cause of the infection?

The public kiosk transferred malware to Rob's thumb drive Correct Answer: The public kiosk transferred malware to Rob's thumb drive. Public kiosks are notorious for spreading viruses. Incorrect Answers: The public kiosk had a keylogger installed and tracked Rob's keystrokes. Rob's thumb drive transferred malware to the public kiosk. Although Rob's thumb drive could have already been infected, this is not the most likely answer. Rob's computer transferred malware to his thumb drive. Although Rob's computer could have already been infected, this is not the most likely answer.

Art browses to a secure web site (with HTTPS and a little lock on display), and his browser, Microsoft Edge, reports a "mixed content" warning. What does this mean?

The web page displays both secure and nonsecure content Correct Answer: Accessing a web page that shows both secure and nonsecure content will trigger a mixed content warning. Incorrect Answers. The certificate is corrupt. A corrupt or expired certificate will generate a certificate warning. The webpage has a nonsecure add-on. Browsers use add-ons, not web pages. The cache is corrupt. A corrupt cache might create odd behavior, but it won't generate a mixed content warning.

Judy browsed to a most-trusted news site and unexpectedly got a bunch of pop-up ads. Worse, the site was really slow. What is the most likely problem?

The workstation has been infected with malware Correct Answer: The workstation has been infected with malware. I'm blaming this one on someone who used Judy's workstation; she's entirely too smart to have done it by accident. Incorrect Answers: The web site has been infected with malware. Although this could be true, it's far less likely than a problem with the workstation.The web site certificate has expired. An expired certificate will display an error message, not a pop-up. The workstation DNS cache is corrupted. A corrupted cache would stop access to previously accessed sites.

Erica recently purchased a new SOHO wireless router for her café. Her friend Stephanie is a CompTIA Network+ technician and tells her she should immediately change the administrator password. Why do you think she should?

To stop unauthorized access and configuration changes Correct Answer: Because you can readily find any default administrator password with a simple web search, you should always change the default password to stop any unauthorized access or configuration changes. Incorrect Answers: To stop unauthorized encryption methods. Stopping unauthorized encryption methods doesn't make a lot of sense. To resist malware infections. While SOHO routers can suffer from malware infections, this is not as immediate an issue as changing default credentials. To prevent data theft. SOHO routers don't have store data.

Developers in your organization plan to use virtualization to test code changes. Windows 10 is already installed on their machines. What should you configure to enable code change testing locally?

Type 2 hypervisor Correct Answer:Type 2 hypervisor. This type of hypervisor is an application that runs on top of an existing operating system such as Windows 10.Incorrect Answers:Type 1 hypervisor. This type of hypervisor is the operating system and does not need an existing operating system.Cloud connectivity. This is not required for local virtualization.Virtual machine cluster. This is a group of hypervisors working together to provide optimal performance and fault tolerance for a group of virtual machines.

Stephon has just installed a SOHO wireless router. What should he do next to enhance security?

Use a complex administrator password Correct Answer: Use a complex administrator password. All the commercial wireless routers use admin as the administrator username. Stephon's best option for securing this account is to use a complex password. Incorrect Answers: Change the router administrator username. The administrator name is usually set as admin. Change the router's broadcasting channel. Changing the channel helps in high-interference areas. This is not a security option. Update the unit's firmware. Definitely do this, but it's not specifically a security option.

A technician is configuring a wireless router for a small office, and the business owner would like the wireless network to be secured using the strongest encryption possible. Which of the following should the technician choose?

WPA2 Correct Answers: WPA2. Although not perfect, WPA2 is the best commercial wireless security protocol available. Incorrect Answers: WAP. WAP stands for "wireless access point." It can have a variety of security options available. WPA. WPA was good for its time, but it's not the best you can get now. WEP. WEP is easily crackable, so it's not good for modern security.

Of the following technologies, which provides the highest throughput and the lowest latency?

Wired Correct Answer: A wired connection provides higher throughput and lower latency than the other technologies listed. Incorrect Answers: Cellular connections have higher latency than wired connections. Wireless connections have higher latency than wired connections. Radio signals, whether cellular or Wi-Fi, have higher latency than wired connections.


Ensembles d'études connexes

Chapter 14: Massachusetts Licensing Law

View Set

OB Chapter 8: Power and Politics

View Set

Ch. 5 - Cost-Volume-Profit Relationships

View Set