Practice Final Test

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Given the following pseudocode: For each apple in the basket, eat two oranges unless it is the last apple, then eat three oranges. If there are seven apples in the basket, which of the following would be the number of oranges a person eats? A. 10 B. 14 C. 15 D. 17

15

Which of the following is an IP address? A. 0X64F32 B. 00:0F:AC:17:2F:32 C. 10010110 D. 172.0.0.1

172.0.0.1

Which of the following is the number of bytes that is in 2KB? A. 1024 B. 2048 C. 20000 D. 1048576

2048

Which of the following would indicate the FASTEST processor speed? A. 3.6GHz B. 3.6MHz C. 3.6Mbps D. 3.6Gbps

3.6GHz

An IP address is 32 bits long. If converted to bytes, it would be: A. 4 bytes B. 8 bytes C. 16 bytes D. 64 bytes

4 bytes

Which of the following requires the MOST frequent updating to remain effective? A. Antivirus B. Host firewall C. Web browser D. Device drivers

Antivirus

Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration? A. Array B. Vector C. List D. String

Array

Which of the following should be used to store a list of strings? A. Array B. Constant C. Variable D. Branch

Array

The computer language that is closest to machine code is: A. query language B. scripting language C. markup language D. assembly language

Assembly language

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent? A. Method B. Object C. Property D. Attribute

Attribute

Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses? A. Behavior security B. Information Identity Management C. Unauthorized hacking D. Authorized hacking

Behavior security

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this? A. Cable modem B. Wireless router C. Access point D. Network switch

Cable modem

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue? A. Checking the proxy settings B. Checking that caching is enabled C. Checking browser add-ons D. Checking certificate validity

Checking certificate validity

The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem? A. Private browsing is being used by some clients visiting the site. B. Client-side scripting has been deactivated on some clients visiting the site. C. Legacy browsers that do not support scripting are being used by some clients. D. Server-side scripting has been deactivated by the server administrator.

Client-side scripting has been deactivated on some clients visiting the site.

A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts? A. Text editor B. Word processor C. Command line D. Spreadsheet

Command line

Which of the following concerns does installing cross-platform software address? A. Subscription B. Licensing C. Product key D. Compatibility

Compatibility

A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation? A. Manually install the driver software B. Connect the mouse C. Configure the USB port D. Download the driver software.

Connect the mouse

A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network? A. Change the SSID. B. Change the default password. C. Change to WEP security. D. Create a guest network.

Create a guest network

Which of the following is the BEST example of structured data? A. Employee beverage preferences organized in a single text field B. Manager home addresses stored in a flat file without fields C. Vendor order information stored in unnamed fields D. Customer information that can be sorted or grouped by any field

Customer information that can be sorted or grouped by any field

Which of the following services is used to translate a URL to an IP address? A. ARP B. IMAP C. DNS D. MAC

DNS

Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports? A. Data capture and collections B. Asset inventory inputs C. Sales statistics D. Average loss output

Data capture and collections

A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information? A. Word processing document B. Flat file C. Database D. Spreadsheet

Database

An organization exports an inventory database nightly. This is an example of: A. database query. B. database report. C. database backup. D. database import.

Database backup

A developer embeds a query in a high-level program to extract information from a database. This is an example of: A. database direct access B. database utility access C. database programmatic access D. database manual access.

Database direct access

Which of the following types of encryption would BEST protect a laptop computer in the event of theft? A. Disk B. Email C. VPN D. HTTPS.

Disk

A technician overhears a systems administrator mention the term "IOPS". To which of the following operating system functions would the term BEST apply? A. Disk management B. Process management C. Application management D. Service management

Disk management

A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do? A. Determine if anything has changed. B. Document lessons learned. C. Establish a theory of probable cause. D. Duplicate the problem, if possible.

Document lessons learned

A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of? A. Duplicate the problem B. Gather information C. Question users D. Divide and conquer

Duplicate the problem

A security administrator is adding accounting features to a web application. Which of the following would be the BEST action? A. Enhance the granularity of user permissions B. Enable an audit log C. Implement smart card login D. Adopt a procedure for adding accounts.

Enable an audit log

A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router? A. Enabling encryption B. Setting a new SSID C. Changing the default password D. Using 802.11ac

Enabling encryption

A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability? A. Backups B. Prioritization C. Indexes D. Failover

Failover

Which of the following encryption typos would BEST be used to protect data on a shared computer? A. File B. VPN C. Email D. Mobile

File

Which of the following is a logical structure for storing files? A. Folder B. Extension C. Permissions D. Shortcut

Folder

Which of the following internal computing components has the primary function of producing visual output to a monitor or other display device? A. CPU B. VGA C. GPU D. GUI

GPU

Which of the following storage types is MOST vulnerable to magnetic damage? A. Flash B. SSD C. Optical D. HDD

HDD

Which of the following numbering systems is used to represent MAC addresses? A. Binary B. Decimal C. Octal D. Hexadecimal

Hexadecimal

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open? A. Antivirus B. Anti-malware C. Device Manager D. Host firewall

Host firewall

Which of the following is the BEST method for ensuring there is no Telnet access? A. Network sniffer B. Intrusion detection system C. Antivirus software D. Host-based firewall

Host-based firewall

Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter? A. Web applications B. Hypervisor C. Load balancer D. Dynamic routing

Hypervisor

A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use? A. IF THEN B. WHILE C. FOR D. BEGIN

IF THEN

Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the t'oubleshooting methodology is the technician executing? A. Implement the solution B. Identify the problem C. Verify system functionality D. Establish a theory of the cause.

Identify the problem

A developer is troubleshooting code in an application. The code is supposed to return the word "vegetables" if the category id is only 2. However the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue? A. If category id = 1 then 'Fruit' Else 'Vegetables' B. If category id = 1 then 'Fruit' Else 'Vegetables' C. If category id <> 1 then 'Vegetables' Else 'Fruit' D. If category id = 1 then 'Fruit' Else if category id >= 2 then 'Vegetables 'Else 'Candy'

If category id = 1 then 'Fruit' Else if category id >= 2 then 'Vegetables 'Else 'Candy'

A database administrator has placed data from another source into a database. Which of the following did the database administrator perform?A. Import B. Export C. Create D. Query

Import

A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?A. Install and configure a firewall. B. Install and run an antivirus program. C. Install and use another browser. D. Install and configure an IDS.

Install and run an antivirus program.

A technician replaces the video card in a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem? A. Replace the user's display. B. Update the PC's operating system. C. Replace the video cable. D. Install new video drivers.

Install new video drivers

A global variable called "age" will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable? A. Integer B. Float C. Double D. String

Integer

Which of the following data types BEST performs calculations? A. Integer B. Char C. String D. Vector

Integer

A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of: A. confidentiality concerns. B. accounting concerns. C. integrity concerns. D. availability concerns.

Integrity concerns

A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe? A. Local application B. Intranet application C. Extranet application D. Internet application

Intranet application

Which of the following BEST explains the use of float over integer to store monetary values? A. It accepts negative values. B. It stores symbols C. It accommodates larger values. D. It supports decimals.

It supports decimals

A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST describes the fact that the operation is only performed if the input is correct? A. Looping B. Branching C. Reuse D. Modeling

Looping

A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?A. Loss of revenue in case of a breach B. Difficulty of integration C. Training involved for IT staff and users D. Amount of equipment that will be replaced

Loss of revenue in case of a breach

The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns isthe CEO experiencing? A. Eavesdropping B. Email service outage C. Man-in-the-middle D. Denial-of-service

Man-in-the-middle

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time? A. Text file on a shared drive B. Managed relational database C. Informational intranet page D. Locally installed productivity software

Managed relational database

Which of the following is MOST likely to be considered protected personal information? A. Property tax records B. Court records C. Medical records D. Genealogy records

Medical records

A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on: A. a mobile OS B. a workstation OS C. a server OS D. an embedded OS.

Mobile OS

Which of the following computing devices is MOST likely to have an internal wireless antenna? A. Mobile phone B. Workstation C. Server D. NAS

Mobile phone

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.) A. Printer B. Mouse C. Webcam D. External hard drive E. Speakers F. Display

Mouse Display

A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using? A. One-tier B. Two-tier C. Three-tier D. n-tier

One-tier

Which of the following WiFi security options would create the MOST need for a VPN connection on the client device? A. Open B. WEP C. WPA D. WPA2

Open

A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this? A. POP3 B. IMAP C. ICMP D. SMTP

POOP3

A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.) A. Logs B. Password C. Receipt D. Encryption E. Database F. Software token

Password Software token

A user has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password? A. The password might be easier for an attacker to guess. B. Password compromise would allow access to all of the systems. C. Single sign-on would be unable to function correctly. D. Systems might reject the password based or different requirements.

Password compromise would allow access to all of the systems

A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk? A. Password history B. Password reuse C. Password expiration D. Password age

Password expiration

A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal? A. Input validation B. System updates C. Password lockout D. Login auditing

Password lockout

Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the fol owing best practices should she implement? A. Password history B. Password length C. Password reuse D. Password complexity

Password reuse

Which of the following is the WEAKEST link in the security posture of an organization? A. Technology B. Infrastructure C. People D. Regulations

People

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this? A. Perform process management. B. Perform task scheduling. C. Set the system date and time. D. Set a reminder to run the script.

Perform task scheduling

Which of the following would allow an application to run automatically when a computer is started? A. Processes B. Journaling C. Services D. Drivers

Processes

Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member? A. Spreadsheet B. Collaborative workspace C. Project management D. Personal information management

Project management

Which of the following are the primary functions of an operating system? (Choose two.) A. Provide structure for file and data management. B. Provide protection against malware and viruses. C. Provide peer-to-peer networking capability. D. Provide user data encryption. E. Provide virtual desktop capability. F. Provide system resources.

Provide structure for file and data management Provide system resources

An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause? A. Script blocker B. Proxy settings C. Private browsing D. Full browser cache

Proxy settings

Which of the following is an example of an interpreted language? A. C++ B. Java C. Python D. Go

Python

Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology? A. Question users. B. Verify functionality. C. Divide and conquer. D. Implement the solution

Question user

Which of the following contains exactly four copper wires? A. RJ45 B. VGA C. RJ11 D. USB

RJ11

A user needs to connect a laptop to an Etherne: port in the room. Which of the following types of connections does the user need? A. RG6 B. DB9 C. RJ11 D. RJ45

RJ45

Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored? A. Record B. Report C. Column D. Procedure

Record

A schema is a critical part of which of the following? A. Relational database B. Key/value database C. Document database D. NoSQL database

Relational database

SQL databases use primary and foreign keys to enable which of the following? A. Rows B. Fields C. Schemas D. Relationships

Relationships

A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create? A. Record B. Constraint C. Field D. Schema

Schema

Which of the following programming language types is generally the FASTEST way to write a program ad hoc tasks quickly? A. Compiled programming language B. Assembly language C. Scripting language D. Pseudocode

Scripting language

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data? A. Server B. Tape library C. External HDD D. Workstation

Server

Which of the following is the BEST overall storage option for a laptop? A. Flash drive B. Hard drive C. SD card D. Solid-state drive

Solid-state drive

Which of the following BEST describes the purpose of a vector in programming? A. Storing a collection of data B. Repeating a similar operation C. Capturing user input D. Performing mathematical calculations

Storing a collection of data

Which of the following would MOST likely use an ARM processor? A. Laptop B. Tablet C. Workstation D. Server

Tablet

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause? A. The light switches do not support WPA2. B. The router is operating on a different channel. C. The key does not meet password complexity requirements. D. The SSID is not being broadcast.

The router is operating on a different channel

Which of the following is a reason why complex passwords are required? A. To encourage password variety B. To prevent someone from guessing them C. To make them harder to remember D. To reduce social engineering attacks

To prevent someone from guessing them

Which of the following is both an input and output device? A. Microphone B. Speaker C. Touch-screen monitor D. Keyboard

Touch-screen monitor

Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.) A. RAID storage B. Uninterruptible power supplies C. Off-site backups D. Private cloud servers E. Virtual-hosted desktops F. Warm sites

Uninterruptible power supplies Off-site backups

Which of the following will a company do to update a customer's address while using a flat file database? A. Update the address for each order the customer placed. B. Update the address in the customer address table C. Update the address field in the customer order table D. Update the primary key to reflect the customer's address.

Update the address field in the customer order table

A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)A. Update the IPS signatures.B. Update the network firewall.C. Update the malware definitions.D. Quarantine the network.E. Reset the network router.F. Contact the ISP.

Update the malware definitions Quarantine the network

In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity? A. RF B. IR C. VPN D. NFC

VPN

A user is having issues connecting to the Internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue? A. Validate the certificate. B. Verify the proxy settings. C. Disable the pop-up blocker. D. Clear the browser cache.

Verify the proxy settings

A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use? A. Spreadsheet software B. Word processing software C. Presentation software D. Visual diagramming software

Visual diagramming software

Which of the following programming constructs would be used to repeat a statement 100 times in a loop? A. IF B. ELSE C. RETURN D. WHILE

WHILE

Which of the following has the longest range? A. NFC B. Bluetooth C. WiFi D. Infrared

WIFI

A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of: A. drawing a value stream map B. developing pseudocode C. identifying functions D. compiling the language.

developing pseudocode

Which of the following filesystems would a Linux computer MOST likely use? A. HFS B. NTFS C. FAT32 D. ext4

ext4

Consider the following statements: if userin = "commander" then clearance - "topsecret" else if userin = "analyst" then clearance = "restricted" else clearance = "normal" Given the input (userin) of "analyst", to which of the following would the clearance variable be set? A. topsecret B. normal C. analyst D. restricted

restricted


संबंधित स्टडी सेट्स

FINAL exam - RNSG 1343 ENDOCRINE

View Set

BUS 204 Ch. 21 Consumer Protection

View Set

AMI Types (EBI vs. Instance Store)

View Set

NSE 4 Security - Firewall Policies

View Set

Principles of Accounting T/F and Multiple choice

View Set