Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following storage types presents the most likely security risk?

A.

Flash

B.

NAS

C.

SSD

D.

Cloud

Full Access
Question # 5

Which of the following connection types is typically used for a display monitor?

A.

USB

B.

DVI

C.

Bluetooth

D.

RJ45

Full Access
Question # 6

Which of the following should be done first when working on a potential issue?

A.

Implement a solution.

B.

Escalate the issue.

C.

Research the issue.

D.

Gather information.

Full Access
Question # 7

A company has installed an application that only requires a workstation to function. Which of the following

architecture types is this application using?

A.

One-tier

B.

Two-tier

C.

Three-tier

D.

n-tier

Full Access
Question # 8

Which of the following is something that would likely need a copyright?

A.

A new commercial software program

B.

A company's brand name

C.

A copy of a business contract

D.

An idea for computer communication

Full Access
Question # 9

Which of the following BEST describes the purpose of a vector in programming?

A.

Storing a collection of data

B.

Repeating a similar operation

C.

Capturing user input

D.

Performing mathematical calculations

Full Access
Question # 10

Which of the following BEST describes the physical location of the data in the database?

A.

Table

B.

Column

C.

RAM

D.

HDD

Full Access
Question # 11

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Full Access
Question # 12

Which of the following methods of cooling is most commonly used for desktops?

A.

Active

B.

External

C.

Cryogenics

D.

Water

Full Access
Question # 13

A user is trying to set up a new wireless access point. Which of the following should the user do first?

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Full Access
Question # 14

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

Full Access
Question # 15

A function is BEST used for enabling programs to:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Full Access
Question # 16

A technician is troubleshooting an error message and tests the same program on a separate, identical

machine. Which of the following troubleshooting methodology steps is this an example of?

A.

Duplicate the problem

B.

Gather information

C.

QUESTION NO: users

D.

Divide and conquer

Full Access
Question # 17

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Full Access
Question # 18

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

A.

Boolean

B.

Integer

C.

Float

D.

Char

Full Access
Question # 19

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

Full Access
Question # 20

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

A.

SSD

B.

CPU

C.

RAM

D.

GPU

Full Access
Question # 21

Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?

A.

NFC

B.

Infrared

C.

Wi-Fi

D.

Bluetooth

Full Access
Question # 22

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

A.

Integer

B.

Float

C.

Double

D.

String

Full Access
Question # 23

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

A.

Turn on private browsing

B.

Delete browsing history on program close.

C.

Notify when downloads are complete.

D.

Configure prompting before downloading content.

Full Access
Question # 24

A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?

A.

Branching

B.

Looping

C.

Pseudocode

D.

Syntax errors

Full Access
Question # 25

Which of the following best explains the reason for password expiration?

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Full Access
Question # 26

Which of the following are the basic computing operations?

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Full Access
Question # 27

Which of the following is an example of an interpreted language?

A.

C++

B.

Java

C.

Python

D.

Go

Full Access
Question # 28

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Full Access
Question # 29

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

A.

Password reuse

B.

Snooping

C.

Social engineering

D.

Phishing

Full Access
Question # 30

Which of the following is a reason for using a UPS?

A.

To help with posture

B.

To clean power

C.

To prevent viruses

D.

To lessen eye strain

Full Access
Question # 31

Which of the following software types is best suited for storing large amounts of data in a way that allows for concurrent, indexed access?

A.

Spreadsheet software

B.

Visual diagramming software

C.

Database software

D.

Presentation software

Full Access
Question # 32

Which of the following is an advantage of a fiat file?

A.

Variety of data

B.

Scalability

C.

Portability

D.

Multiple concurrent users

Full Access
Question # 33

A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?

A.

Private browsing

B.

Pop-up blockers

C.

Bookmarks

D.

Accessibility

Full Access
Question # 34

Which of the following language types would a web developer MOST likely use to create a website?

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Full Access
Question # 35

Which of the following explains the concept of database scalability?

A.

The ability to move from one vendor database to another

B.

The ability to increase resources easily as demand grows

C.

The ability to move from a flat file database to a relational database

D.

The ability to document the database schema automatically

Full Access
Question # 36

Which of the following can a company use to protect its logo?

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Full Access
Question # 37

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Full Access
Question # 38

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Full Access
Question # 39

Which of the following would be the most cost-effective method to increase availability?

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Full Access
Question # 40

Which of the following is a compiled language?

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Full Access
Question # 41

Which of the following categories describes commands used to extract information from a database?

A.

DDL

B.

DDR

C.

DLL

D.

DML

Full Access
Question # 42

A technician is troubleshooting an important application that is crashing every hour. The technician suspects that the installation is corrupt and needs to be reinstalled. Which of the following steps should be performed next?

A.

Verify full system functionality.

B.

Research the knowledge base.

C.

Identify the problem.

D.

Test the theory.

Full Access
Question # 43

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Full Access
Question # 44

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

A.

Web-based

B.

Plug-and-play

C.

Driver-based

D.

Server-based

Full Access
Question # 45

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

A.

Loop

B.

Variable

C.

Constant

D.

Function

Full Access
Question # 46

Which of the following BEST describes an application running on a typical operating system?

A.

Process

B.

Thread

C.

Function

D.

Task

Full Access
Question # 47

Which of the following storage types is MOST vulnerable to magnetic damage?

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Full Access
Question # 48

Which of the following is a logical structure for storing files?

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Full Access
Question # 49

A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?

A.

Mobile phone

B.

Mouse

C.

Scanner

D.

External hard drive

Full Access
Question # 50

Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?

A.

RAM

B.

NIC

C.

GPU

D.

CPU

Full Access
Question # 51

Which of the following programming concepts uses properties and attributes?

A.

Objects

B.

Functions

C.

Containers

D.

Identifiers

Full Access
Question # 52

A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?

A.

Update the device software.

B.

Enable passwords.

C.

Enable host IDS.

D.

Remove browser cookies.

Full Access
Question # 53

A user needs an interface that supports both video and data. Which of the following will meet this requirement?

A.

Thunderbolt

B.

VGA

C.

DVI

D.

FireWire

Full Access
Question # 54

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Full Access
Question # 55

Which of the following filesystems is compatible with the greatest number of operating systems?

A.

ext4

B.

FAT32

C.

NTFS

D.

HFS

Full Access
Question # 56

For which of the following is a relational database management system MOST commonly used?

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Full Access
Question # 57

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

A.

Update from 802.11b to 802.11g.

B.

Ensure sources of EMI are removed.

C.

Enable WPA2-Enterprise.

D.

Use WiFi Protected Setup.

Full Access
Question # 58

Which of the following units of storage would be used to measure the amount of RAM on a desktop computer?

A.

TB

B.

GB

C.

MB

D.

KB

Full Access
Question # 59

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Full Access
Question # 60

A user is trying to set up a new wireless access point. Which of the following should the user do first?

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Full Access
Question # 61

Which of the following storage devices have a spinning disk? (Choose two.)

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Full Access
Question # 62

After a user connects a laptop to a newly purchased printer, the user is unable to print. Which of the following is most likely causing the issue?

A.

The OS updates have not been applied on the laptop.

B.

The security software is out of date.

C.

The printer drivers are not installed.

D.

The firewall has not been configured.

Full Access
Question # 63

Which of the following would be used to send messages using the SMTP protocol?

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Full Access
Question # 64

The IT department has established a new password policy for employees. Specifically, the policy reads:

    Passwords must not contain common dictionary words

    Passwords must contain at least one special character.

    Passwords must be different from the las six passwords used.

    Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

A.

Password lockout

B.

Password complexity

C.

Password expiration

D.

Passwords history

E.

Password length

F.

Password age

Full Access
Question # 65

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

A.

a storage area network.

B.

an embedded OS.

C.

network attached storage.

D.

a Type 1 hypervisor.

Full Access
Question # 66

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Full Access
Question # 67

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

A.

Data correlation

B.

Data manipulation

C.

Data gathering

D.

Data definition

Full Access
Question # 68

Within a database, which of the following would be the best access method to use to display a subset of a table?

A.

UPDATE

B.

DROP

C.

SELECT

D.

INSERT

Full Access
Question # 69

Which of the following are most likely to have a GUI? (Select two).

A.

PowerShell

B.

Windows

C.

Command Prompt

D.

macOS

E.

Z shell

F.

Bash

Full Access
Question # 70

A technician has verified full system functionality. Which of the following actions should the technician take next?

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Full Access
Question # 71

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Full Access
Question # 72

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Full Access
Question # 73

Which of the following types of encryptions would BEST protect a laptop computer in the event of theft?

A.

Disk

B.

Email

C.

VPN

D.

HTTPS

Full Access
Question # 74

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Full Access
Question # 75

A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?

A.

Restart the computer when done.

B.

Log off the computer.

C.

Use private browsing.

D.

Enable pop-up blocker.

Full Access
Question # 76

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?

A.

Group license

B.

Concurrent license

C.

Subscription license

D.

Open-source license

Full Access
Question # 77

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Full Access
Question # 78

Which of the following internet service types is most susceptible to weather disruptions?

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Full Access
Question # 79

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

A.

2.4GHz

B.

5GHz

C.

802.11b

D.

802.11g

Full Access
Question # 80

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Full Access
Question # 81

Which of the following notational systems does the value 10AF01 indicate?

A.

Unicode

B.

Binary

C.

Hexadecimal

D.

Octal

Full Access
Question # 82

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

A.

Host-based firewall

B.

Strong administrator password

C.

Anti-malware software

D.

Full disk encryption

Full Access
Question # 83

A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?

A.

2.5MHz

B.

2.5Tbps

C.

2.5GB

D.

2.5GHz

Full Access
Question # 84

Which of the following data types would be best for storing data representing a phone number?

A.

String

B.

Integer

C.

Float

D.

Char

Full Access
Question # 85

A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).

A.

Private browsing is enabled.

B.

Extensions are out-of-date.

C.

Proxy settings are incorrect.

D.

An incompatible browser is being used.

E.

A pop-up blocker is enabled.

F.

An invalid certificate has been issued.

Full Access
Question # 86

Which of the following allows wireless devices to communicate to a wired network?

A.

Modem

B.

Switch

C.

Firewall

D.

Access point

Full Access
Question # 87

Which of the following would be the best reason to implement a host firewall?

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Full Access
Question # 88

Which of the following would a company consider an asset?

A.

An external company used to destroy defective hard drives

B.

Information residing on backup tapes

C.

A company-sponsored technology conference

D.

A certified third-party vendor that provides critical components

Full Access
Question # 89

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

A.

USB

B.

NFC

C.

DSL

D.

DVI

Full Access
Question # 90

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

A.

Input

B.

Output

C.

Storage

D.

Processing

Full Access
Question # 91

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently

released new device. After configuring the new device utilizing the old SSID and key, some light switches are

no longer communicating. Which of the following is the MOST likely cause?

A.

The light switches do not support WPA2.

B.

The router is operating on a different channel.

C.

The key does not meet password complexity requirements.

D.

The SSID is not being broadcast.

Full Access
Question # 92

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Full Access
Question # 93

A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?

A.

Variable

B.

Attribute

C.

Method

D.

Looping

Full Access
Question # 94

Which of the following terms best describes the outcome of a text message that is encrypted from its original form?

A.

Cipher

B.

Vector

C.

Plain

D.

Algorithm

Full Access
Question # 95

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Full Access
Question # 96

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Full Access
Question # 97

Which of the following is best used to store many integers in one container?

A.

Array

B.

Function

C.

Variable

D.

Constant

Full Access
Question # 98

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

A.

redundancy.

B.

replication.

C.

prioritization.

D.

fault tolerance.

Full Access
Question # 99

A technician has been asked to install a video interface that can support both high bandwidth digital video and audio on a single cable. Which of the following should the technician use?

A.

DVI

B.

VGA

C.

DisplayPort

D.

S-video

E.

HDMI

Full Access
Question # 100

Which of the following is most appropriate to list on a social media site about an employer?

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Full Access
Question # 101

A developer is writing a program to process a long list of employees and apply a cost-of-living increase of 3.2% to all employees making less than $15 per hour. Which of the following pseudocode snippets provides the best solution?

A.

If employeesalary is greater than $15 per hour employeesalary = employeesalary * 1.032

B.

For all employees in the list making less than $15 per hour employeesalary = employeesalary * 1.032

C.

If employeesalary is less than $15 per hour employeesalary = employeesalary * 3.2

D.

For all employees in the list making greater than $15 per hour employeesalary = employeesalary * 3.2

Full Access
Question # 102

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

A.

Web page

B.

List

C.

Flat file

D.

Database

Full Access
Question # 103

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

A.

127.0.0.1

B.

172.16.2.189

C.

192.168.257.1

D.

255.255.255.0

Full Access