IT study set

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: A. a storage area network. B. an embedded OS. C. network attached storage. D. a Type 1 hypervisor.

type 1 hypervisor

Which of the following is MOST likely used to represent international text data? A. ASCII B. Octal C. Hexadecimal D. Unicode

unicode

1. Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.) A. RAID storage B. Uninterruptible power supplies C. Off-site backups D. Private cloud servers E. Virtual-hosted desktops F. Warm sites

uninterruptible power supplies off-site backups

1. A user is having issues connecting to the Internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue? A. Validate the certificate. B. Verify the proxy settings. C. Disable the pop-up blocker. D. Clear the browser cache.

verify the proxy settings

A programmer uses DML to modify: A. files B. permissions C. data D. backups

data

Which of the following is the number of bytes that is in 2KB? A. 1024 B. 2048 C. 20000 D. 1048576

2048

Which of the following would indicate the FASTEST processor speed? A. 3.6GHz B. 3.6MHz C. 3.6Mbps D. 3.6Gbps

3.6GHz

An IP address is 32 bits long. If converted to bytes, it would be: A. 4 bytes B. 8 bytes C. 16 bytes D. 64 bytes

4 bytes

When transferring a file across the network, which of the following would be the FASTEST transfer rate? A. 1001Kbps B. 110Mbps C. 1.22Gbps D. 123Mbps

1.22Gbps

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign? A. 127.0.0.1 B. 172.16.2.189 C. 192.168.257.1 D. 255.255.255.0

172.16.2.189

Which of the following is a logical structure for storing files? A. Folder B. Extension C. Permissions D. Shortcut

folder

A developer needs to add a table to a database. Which of the following database activities should the user perform? A. UPDATE B. ALTER C. CREATE D. REPORT

CREATE

A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data? A. UPDATE B. DELETE C. ALTER D. DROP

DROP

1. Which of the following services is used to translate a URL to an IP address? A. ARP B. IMAP C. DNS D. MAC

DNS

Which of the following storage types is MOST vulnerable to magnetic damage? A. Flash B. SSD C. Optical D. HDD

HDD

A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated? A. EXPORT B. IMPORT C. SELECT D. ALTER

IMPORT

A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this? A. POP3 B. IMAP C. ICMP D. SMTP

POP3

Which of the following is an example of an interpreted language? A. C++ B. Java C. Python D. Go

Python

Which of the following contains exactly four copper wires? A. RJ45 B. VGA C. RJ11 D. USB

RJ11

A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use? A. SELECT B. INSERT C. DELETE D. UPDATE

SELECT

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task? A. Text editing software B. Visual diagramming software C. Spreadsheet software D. Web browsing software

Spreadsheet software

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk? A. DLP B. ACL C. TLS D. IPS

TLS

1. In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity? A. RF B. IR C. VPN D. NFC

VPN

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen? A. Host-based firewall B. Strong administrator password C. Anti-malware software D. Full disk encryption

full disk encryption

Which of the following allows wireless devices to communicate to a wired network? A. Modem B. Switch C. Firewall D. Access point

access point

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems.Which of the following is being developed? A. Algorithm B. Software C. Pseudocode D. Flowchart

algorithm

1. Which of the following should be used to store a list of strings? A. Array B. Constant C. Variable D. Branch

array

Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration? A. Array B. Vector C. List D. String

array

The computer language that is closest to machine code is: A. query language B. scripting language C. markup language D. assembly language

assembly language

Which of the following is the closest to machine language? A. Scripted languages B. Compiled languages C. Query languages D. Assembly languages

assembly languages

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent? A. Method B. Object C. Property D. Attribute

attribute

Which of the following describes something in a database that refers to the unique identifier in the parent table? A. Attribute B. Constraint C. Foreign key D. Schema

attribute

Which of the following does a NoSQL database use to organize data? A. Primary keys B. Schemas C. Keys/values D. Tables

keys/values

Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses? A. Behavior security B. Information Identity Management C. Unauthorized hacking D. Authorized hacking

behavior security

1. A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router? A. Enabling encryption B. Setting a new SSID C. Changing the default password D. Using 802.11ac

changing the default password

1. A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST? A. Check Knowledge Base B. Search local logs C. Research possible theories D. Question users

check knowledge base

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use? A. Standalone application B. Client-server application C. Web application D. Cloud application

client-server application

1. A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts? A. Text editor B. Word processor C. Command line D. Spreadsheet

command line

Which of the following relational database constructs is used to ensure valid values are entered for a column? A. Schema B. Permissions C. Constraint D. Column

constraint

1. A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document? A. Patent B. Trademark C. Watermark D. Copyright

copyright

A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network? A. Change the SSID. B. Change the default password. C. Change to WEP security. D. Create a guest network.

create a guest network

Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports? A. Data capture and collections B. Asset inventory inputs C. Sales statistics D. Average loss output

data capture and collections

An administrator grants permission for a user to access data in a database. Which of the following actions was performed? A. Data correlation B. Data manipulation C. Data gathering D. Data definition

data definition

1. Which of the following database concepts would MOST likely use a CSV file? A. Data querying B. Data reports C. Data importing D. Data persistence

data importing

A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data? A. Flat file B. Word processor C. Database D. Network share

database

An organization exports an inventory database nightly. This is an example of: A. database query. B. database report. C. database backup. D. database import.

database backup

1. A developer embeds a query in a high-level program to extract information from a database. This is an example of: A. database direct access B. database utility access C. database programmatic access D. database manual access.

database direct access

The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list? A. Database software B. Word processing software C. Conferencing software D. Presentation software

database software

A function is BEST used for enabling programs to: A. hold a list of numbers. B. be divided into reusable components. C. define needed constant values. D. define variables to hold different values.

define variables to hold different values

Which of the following types of encryption would BEST protect a laptop computer in the event of theft? A. Disk B. Email C. VPN D. HTTPS

disk

A technician overhears a systems administrator mention the term `IOPS`. To which of the following operating system functions would the term BEST apply? A. Disk management B. Process management C. Application management D. Service management

disk management

1. Which of the following is a primary confidentiality concern? A. Eavesdropping B. Impersonating C. Destructing D. Altering

eavesdropping

Which of the following would be considered the BEST method of securely distributing medical records? A. Encrypted flash drive B. Social networking sites C. Fax D. FTP file sharing

encrypted flash drive

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength? A. Update from 802.11b to 802.11g. B. Ensure sources of EMI are removed. C. Enable WPA2-Enterprise. D. Use WiFi Protected Setup.

ensure sources of EMI are removed

A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability? A. Backups B. Prioritization C. Indexes D. Failover

failover

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain? A. File backup B. Data restoration C. Fault tolerance D. Restoring access

fault tolerance

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data? A. Flat file B. Memory C. Relational database D. Solid state drive

flat file

1. Which of the following numbering systems is used to represent MAC addresses? A. Binary B. Decimal C. Octal D. Hexadecimal

hexadecimal

1. Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter? A. Web applications B. Hypervisor C. Load balancer D. Dynamic routing

hypervisor

1. A database administrator has placed data from another source into a database. Which of the following did the database administrator perform? A. Import B. Export C. Create D. Query

import

Which of the following would a company consider an asset? A. An external company used to destroy defective hard drives B. Information residing on backup tapes C. A company-sponsored technology conference D. A certified third-party vendor that provides critical components

information residing on backup tapes

Which of the following BEST describes the practice of providing user credentials when logging onto the network? A. Output B. Storage C. Input D. Processing

input

1. A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information? A. Install and configure a firewall. B. Install and run an antivirus program. C. Install and use another browser. D. Install and configure an IDS.

install and run an antivirus program

A technician replaces the video card in a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem? A. Replace the user's display. B. Update the PC's operating system. C. Replace the video cable. D. Install new video drivers.

install new video drivers

A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of: A. confidentiality concerns. B. accounting concerns. C. integrity concerns. D. availability concerns.

integrity concerns

A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe? A. Local application B. Intranet application C. Extranet application D. Internet application

intranet application

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.) A. Printer B. Mouse C. Webcam D. External hard drive E. Speakers F. Display

mouse display

A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using? A. One-tier B. Two-tier C. Three-tier D. n-tier

one-tier

1. A user has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password? A. The password might be easier for an attacker to guess. B. Password compromise would allow access to all of the systems. C. Single sign-on would be unable to function correctly. D. Systems might reject the password-based or different requirements.

password compromise would allow access to all of the systems

A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk? A. Password history B. Password reuse C. Password expiration D. Password age

password expiration

1. Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the fol owing best practices should she implement? A. Password history B. Password length C. Password reuse D. Password complexity

password reuse

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer? A. Email previewing B. Patching C. Clear browsing cache D. Kill process

patching

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this? A. Perform process management. B. Perform task scheduling. C. Set the system date and time. D. Set a reminder to run the script.

perform task scheduling

Which of the following is a value that uniquely identifies a database record? A. Foreign key B. Public key C. Primary key D. Private key

primary key

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of: A. redundancy. B. replication. C. prioritization. D. fault tolerance.

prioritization

Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter? A. Private B. Traditional C. Public D. Cloud

private

Which of the following BEST describes an application running on a typical operating system? A. Process B. Thread C. Function D. Task

process

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card? A. Input B. Output C. Storage D. Processing

processing

Which of the following are the primary functions of an operating system? (Choose two.) A. Provide structure for file and data management. B. Provide protection against malware and viruses. C. Provide peer-to-peer networking capability. D. Provide user data encryption. E. Provide virtual desktop capability. F. Provide system resources.

provide structure for file and data management. provide system resources

An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause? A. Script blocker B. Proxy settings C. Private browsing D. Full browser cache

proxy settings

Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored? A. Record B. Report C. Column D. Procedure

record

1. A schema is a critical part of which of the following? A. Relational database B. Key/value database C. Document database D. NoSQL database

relational database

1. SQL databases use primary and foreign keys to enable which of the following? A. Rows B. Fields C. Schemas D. Relationships

relationships

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function? A. Rule-based access control B. Mandatory access control C. Role-based access control D. Discretionary access control

role-based access control

A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create? A. Record B. Constraint C. Field D. Schema

schema

1. Which of the following programming language types is generally the FASTEST way to write a program ad hoc tasks quickly? A. Compiled programming language B. Assembly language C. Scripting language D. Pseudocode

scripting language

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data? A. Server B. Tape library C. External HDD D. Workstation

server

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN? A. Laptop B. Workstation C. Mobile phone D. Server

server

A user logs into a laptop using a username and complex password. This is an example of: A. biometrics B. multifactor authentication C. least privilege D. single-factor authentication

single-factor authentication

Which of the following is an example of multifactor authentication? A. Password and passphrase B. Fingerprint and retina scan C. Hardware token and smartphone D. Smart card and PIN

smart card and PIN

Which of the following is the BEST overall storage option for a laptop?A. Flash drive B. Hard drive C. SD card D. Solid-state drive

solid-state drive

Which of the following BEST describes the purpose of a vector in programming? A. Storing a collection of data B. Repeating a similar operation C. Capturing user input D. Performing mathematical calculations

storing a collection of data

For which of the following is a relational database management system MOST commonly used? A. Building flowcharts B. Storing information C. Generating reports D. Creating diagrams

storing information

Which of the following data types should a developer use when creating a variable to hold a postal code? A. Integer B. String C. Float D. Boolean

string

Which of the following BEST describes the physical location of the data in the database? A. Table B. Column C. RAM D. HDD

table

Which of the following would MOST likely use an ARM processor? A. Laptop B. Tablet C. Workstation D. Server

tablet

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause? A. The light switches do not support WPA2. B. The router is operating on a different channel. C. The key does not meet password complexity requirements. D. The SSID is not being broadcast.

the router is operating on a different channel

Which of the following is a reason why complex passwords are required? A. To encourage password variety B. To prevent someone from guessing them C. To make them harder to remember D. To reduce social engineering attacks

to prevent someone from guessing them

1. A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use? A. Spreadsheet software B. Word processing software C. Presentation software D. Visual diagramming software

visual diagramming software


Set pelajaran terkait

Unit 5 Lesson 5 : Irrigation Methods

View Set

anatomy chapter 11 homework (cardiovascular system)

View Set

Ch. 10 Lesson 4: A Constitutional Democracy

View Set

Organizational Behavior- Chpt 7- Cosby

View Set

Microbiology 20 - Ch 3 Lecture Notes

View Set

PRO TOOLS 101: CERTIFICATION TEST STUDY GUIDE

View Set

12 - Project Procurement Management - 3

View Set