Which of the following storage types presents the most likely security risk?
Which of the following connection types is typically used for a display monitor?
Which of the following should be done first when working on a potential issue?
A company has installed an application that only requires a workstation to function. Which of the following
architecture types is this application using?
Which of the following BEST describes the purpose of a vector in programming?
Which of the following BEST describes the physical location of the data in the database?
Which of the following scripting languages is most likely to be used in a Linux command-line environment?
Which of the following methods of cooling is most commonly used for desktops?
A user is trying to set up a new wireless access point. Which of the following should the user do first?
A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?
A technician is troubleshooting an error message and tests the same program on a separate, identical
machine. Which of the following troubleshooting methodology steps is this an example of?
A systems administrator wants to return results for a time range within a database. Which of the following
commands should the administrator use?
A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?
Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?
A global variable called “age” will be created in a program and incremented through the use of a function.
Which of the following data types should be defined with the age variable?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the
same time?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
Which of the following software types is best suited for storing large amounts of data in a way that allows for concurrent, indexed access?
A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?
Which of the following language types would a web developer MOST likely use to create a website?
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the
following would be the BEST choice to accomplish this task?
Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?
Which of the following would be the most cost-effective method to increase availability?
Which of the following categories describes commands used to extract information from a database?
A technician is troubleshooting an important application that is crashing every hour. The technician suspects that the installation is corrupt and needs to be reinstalled. Which of the following steps should be performed next?
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
Which of the following BEST describes an application running on a typical operating system?
Which of the following storage types is MOST vulnerable to magnetic damage?
A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?
Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?
Which of the following programming concepts uses properties and attributes?
A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?
A user needs an interface that supports both video and data. Which of the following will meet this requirement?
A company wants its employee to use an email client that downloads and removes messages from the email
server. Which of the following protocols must be configured in the email client to facilitate this?
Which of the following filesystems is compatible with the greatest number of operating systems?
For which of the following is a relational database management system MOST commonly used?
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
Which of the following units of storage would be used to measure the amount of RAM on a desktop computer?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click
a link to continue to the site. Which of the following would MOST likely identify the issue?
A user is trying to set up a new wireless access point. Which of the following should the user do first?
Which of the following storage devices have a spinning disk? (Choose two.)
After a user connects a laptop to a newly purchased printer, the user is unable to print. Which of the following is most likely causing the issue?
Which of the following would be used to send messages using the SMTP protocol?
The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the las six passwords used.
Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Select TWO).
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
Which of the following describes something in a database that refers to the unique identifier in the parent
table?
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
Within a database, which of the following would be the best access method to use to display a subset of a table?
A technician has verified full system functionality. Which of the following actions should the technician take next?
A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
Which of the following types of encryptions would BEST protect a laptop computer in the event of theft?
A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?
A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Which of the following internet service types is most susceptible to weather disruptions?
A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST
way to achieve this?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?
Which of the following data types would be best for storing data representing a phone number?
A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).
Which of the following allows wireless devices to communicate to a wired network?
Which of the following would be the best reason to implement a host firewall?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently
released new device. After configuring the new device utilizing the old SSID and key, some light switches are
no longer communicating. Which of the following is the MOST likely cause?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a
business?
A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?
Which of the following terms best describes the outcome of a text message that is encrypted from its original form?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating
system functions would the term BEST apply?
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
Which of the following is best used to store many integers in one container?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
A technician has been asked to install a video interface that can support both high bandwidth digital video and audio on a single cable. Which of the following should the technician use?
Which of the following is most appropriate to list on a social media site about an employer?
A developer is writing a program to process a long list of employees and apply a cost-of-living increase of 3.2% to all employees making less than $15 per hour. Which of the following pseudocode snippets provides the best solution?
A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?