Correct: 0
Incorrect: 0
Question 1: Which of the following is primarily a confidentiality concern?
Question 2: A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?
Question 3: Which of the following database concepts would MOST likely use a CSV file?
Question 4: A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
Question 5: Which of the following BEST describes the practice of providing user credentials when logging onto the network?
Question 6: Which of the following allows wireless devices to communicate to a wired network?
Question 7: Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
Question 8: Which of the following describes something in a database that refers to the unique identifier in the parent table?
Question 9: For which of the following is a relational database management system MOST commonly used?
Question 10: Which of the following BEST describes an application running on a typical operating system?
Question 11: The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
Question 12: A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
Question 13: A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
Question 14: Which of the following relational database constructs is used to ensure valid values are entered for a column?
Question 15: A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
Question 16: A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
Question 17: Which of the following is a compiled language?
Question 18: Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Question 19: Which of the following is a value that uniquely identifies a database record?
Question 20: A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
Question 21: Which of the following statements BEST describes binary?
Question 22: Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe
Question 23: MOST likely use to accomplish this?
Question 24: An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step?
Question 25: A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
Question 26: Which of the following is an advantage of installing an application to the cloud?
Question 27: A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
Question 28: A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
Question 29: A UPS provides protection against:
Question 30: A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
Question 31: A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?
Question 32: A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
Question 33: Which of the following BEST describes a kilobyte?
Question 34: Which of the following security concerns is a threat to confidentiality?
Question 35: Which of the following software license models allows a developer to modify the original code and release its own version of the application?
Question 36: Which of the following are the basic computing operations?
Question 37: Which of the following would work BEST stored as a flat file rather than stored in a database?
Question 38: An administrator grants permission for a user to access data in a database. Which of the following actions was performed?
Question 39: An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?
Question 40: Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
Question 41: A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
Question 42: Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
Question 43: Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
Question 44: The IT department has established a new password policy for employees. Specifically, the policy reads:
Question 45: ✑ Passwords must not contain common dictionary words
Question 46: ✑ Passwords must contain at least one special character.
Question 47: ✑ Passwords must be different from the las six passwords used.
Question 48: ✑ Passwords must use at least one capital letter or number.
Question 49: Which of the following practices are being employed? (Choose two.)
Question 50: Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer?
Question 51: A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?
Question 52: Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
Question 53: A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?
Question 54: Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Choose two.)
Question 55: A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
Question 56: A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
Question 57: Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
Question 58: Which of the following is MOST likely used to represent international text data?
Question 59: For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Question 60: Which of the following operating systems do not require extensions on files to execute a program? (Choose two.)
Question 61: A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
Question 62: Which of the following is an example of multifactor authentication?
Question 63: Which of the following language types would a web developer MOST likely use to create a website?
Question 64: A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems.
Question 65: Which of the following is being developed?
Question 66: A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two.)
Question 67: Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Question 68: In which of the following situations should there be come expectation of privacy?
Question 69: Which of the following data types should a developer use when creating a variable to hold a postal code?
Question 70: Which of the following is the closest to machine language?
Question 71: A function is BEST used for enabling programs to:
Question 72: When transferring a file across the network, which of the following would be the FASTEST transfer rate?
Question 73: A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
Question 74: A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
Question 75: A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
Question 76: A computer user is downloading software from the Internet and notices the following at the end of the install file: ``¦x86.exe`. Which of the following statements
Question 77: BEST represents what the ``¦x86.exe` means in the installation file?
Question 78: Which of the following would be used to send messages using the SMTP protocol?
Question 79: Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
Question 80: Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Question 81: The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
Question 82: Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
Question 83: Which of the following would be considered the BEST method of securely distributing medical records?
Question 84: Which of the following should have the HIGHEST expectation of privacy?
Question 85: hich of the following storage devices have a spinning disk? (Choose two.)
Question 86: Which of the following computer components allows for communication over a computer network?
Question 87: A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?
Question 88: Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Question 89: A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
Question 90: A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?
Question 91: A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Question 92: Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter?
Question 93: A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?
Question 94: Which of the following would a company consider an asset?
Question 95: A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Question 96: A company's team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)
Question 97: A programmer uses DML to modify:
Question 98: A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
Question 99: A developer needs to add a table to a database. Which of the following database activities should the user perform?
Question 100: Which of the following does a NoSQL database use to organize data?
Question 101: A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
Question 102: A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
Question 103: Which of the following BEST describes the physical location of the data in the database?
Question 104: A user logs into a laptop using a username and complex password. This is an example of:
Question 105: To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user's workstation. Which of the following troubleshooting methodologies is being performed?
Question 106: A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of Internet service connections would BEST meet the user's needs?
Question 107: Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
Question 108: Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
Question 109: A technician overhears a systems administrator mention the term `IOPS`. To which of the following operating system functions would the term BEST apply?
Question 110: Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
Question 111: A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
Question 112: Which of the following would MOST likely use an ARM processor?
Question 113: A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this?
Question 114: Which of the following would indicate the FASTEST processor speed?
Question 115: A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
Question 116: The computer language that is closest to machine code is:
Question 117: Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?
Question 118: Which of the following is an example of an interpreted language?
Question 119: An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
Question 120: Which of the following filesystems would a Linux computer MOST likely use?
Question 121: Which of the following concerns does installing cross-platform software address?
Question 122: Which of the following requires the MOST frequent updating to remain effective?
Question 123: Which of the following BEST explains the use of float over integer to store monetary values?
Question 124: An IP address is 32 bits long. If converted to bytes, it would be:
Question 125: Which of the following BEST describes the purpose of a vector in programming?
Question 126: Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
Question 127: Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
Question 128: A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?
Question 129: A global variable called `age` will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
Question 130: Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Question 131: A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
Question 132: A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
Question 133: A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
Question 134: Which of the following is a reason why complex passwords are required?
Question 135: A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
Question 136: Which of the following storage types is MOST vulnerable to magnetic damage?
Question 137: When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
Question 138: Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
Question 139: Which of the following are the primary functions of an operating system? (Choose two.)
Question 140: SQL databases use primary and foreign keys to enable which of the following?
Question 141: Which of the following is a logical structure for storing files?
Question 142: Which of the following is both an input and output device?
Question 143: A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?
Question 144: A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
Question 145: A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
Question 146: A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
Question 147: A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Question 148: Which of the following contains exactly four copper wires?
Question 149: A technician replaces the video card in a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
Question 150: All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Question 151: Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?
Question 152: A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?
Question 153: Which of the following is the number of bytes that is in 2KB?
Question 154: A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?
Question 155: Which of the following is the BEST overall storage option for a laptop?
Question 156: A technician has worked through all steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do NEXT?
Question 157: A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)
Question 158: The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem?
Question 159: Which of the following is MOST likely to be considered protected personal information?
Question 160: A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:
Question 161: A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?
Question 162: The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
Question 163: Which of the following is an IP address?
Question 164: A developer is troubleshooting code in an application. The code is supposed to return the word `vegetables` if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?
Question 165: Which of the following would allow an application to run automatically when a computer is started?
Question 166: An organization exports an inventory database nightly. This is an example of:
Question 167: A user is having issues connecting to the Internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue?
Question 168: Which of the following data types BEST performs calculations?
Question 169: A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?
Question 170: Which of the following internal computing components has the primary function of producing visual output to a monitor or other display device?
Question 171: A schema is a critical part of which of the following?
Question 172: In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?
Question 173: Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the following best practices should she implement?
Question 174: Which of the following encryption types would BEST be used to protect data on a shared computer?
Question 175: A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use?
Question 176: Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter?
Question 177: Which of the following is the BEST example of structured data?
Question 178: Which of the following numbering systems is used to represent MAC addresses?
Question 179: A database administrator has placed data from another source into a database. Which of the following did the database administrator perform?
Question 180: A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?
Question 181: Which of the following programming language types is generally the FASTEST way to write a program ad hoc tasks quickly?
Question 182: A user has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?
Question 183: Which of the following should be used to store a list of strings?
Question 184: Which of the following services is used to translate a URL to an IP address?
Question 185: Which of the following is the BEST method for ensuring there is no Telnet access?
Question 186: Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member?
Question 187: A user needs to connect a laptop to an Ethernet port in the room. Which of the following types of connections does the user need?
Question 188: Which of the following computing devices is MOST likely to have an internal wireless antenna?
Question 189: Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?
Question 190: A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?
Question 191: A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
Question 192: A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST describes the fact that the operation is only performed if the input is correct?
Question 193: A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on:
Question 194: Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.)
Question 195: A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?
Question 196: Which of the following has the longest range?
Question 197: Which of the following programming constructs would be used to repeat a statement 100 times in a loop?
Question 198: A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation?
Question 199: Which of the following is the WEAKEST link in the security posture of an organization?
Question 200: A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:
Question 201: A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
Question 202: A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?
Question 203: Which of the following will a company do to update a customer's address while using a flat file database?
Question 204: A developer embeds a query in a high-level program to extract information from a database. This is an example of:
Question 205: Which of the following is the LOWEST unit for measuring bandwidth?
Question 206: A user connects a company computer to free WiFi at a local coffee shop. Which of the following BEST describes this situation?
Question 207: A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?
Question 208: Which of the following is used for assigning IP addresses to networking devices?
Question 209: A help desk has initiated a new policy requiring that technicians manually categorize the reason for a customer call. After several months, they are unable to perform any analysis on the information. Which of the following concepts is MOST closely tied to the root cause of this issue?
Question 210: During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?
Question 211: An end user reports seeing the old company intranet site and not the recently released updated version. Which of the following would MOST likely solve the problem?
Question 212: Which of the following BEST describes a LAN-hosted application? (Choose two.)
Question 213: A technician is given a document with step-by-step instructions to perform a task. Which of the following BEST describes that document?
Question 214: A technician installs a webcam to a computer and wants to install an updated driver. In which of the following would the technician find the MOST current driver?
Question 215: Which of the following is a benefit of a locally hosted network solution?
Question 216: Which of the following is an example of a compiled computer language?
Question 217: When following the troubleshooting methodology, which of the following should be performed when establishing a theory of probable cause?
Question 218: Which of the following would be considered confidential information?
Question 219: Which of the following information types is MOST likely a violation of an email security policy?
Question 220: Which of the following programming languages is considered a low-level language with commands specific to the processor type used?
Question 221: Joe, a tech-savvy teenager, has received one of the best new home Wi-Fi routers on the market. Joe’s parents have entrusted Joe to set up the router. To leverage the best throughput options available for Joe’s devices, the router is located in Joe’s bedroom. Joe’s parents’ devices are set to slower standards. Which of the following is being used for Joe’s devices?
Question 222: Which of the following data is MOST likely to be stored as a string?
Question 223: Which of the following is MOST likely used to measure SSD capacity?
Question 224: Which of the following information types would cause the GREATEST loss of value to an organization if encrypted by a ransomware attack?
Question 225: Which of the following database design requirements is MOST likely a reason to implement a flat file?
Question 226: A user received an account compromise notice from an online retailer. Two weeks later, the user received another notice stating the new compromise used the credentials from the first compromise. Which of the following password best practices MOST likely would have prevented the second compromise?
Question 227: A programmer is constructing an algorithm that predicts personality traits based on users’ selection of their favorite ice cream flavors. Which of the following programming concepts should be used to represent the flavor of ice cream?
Question 228: Which of the following data types can be used to store a whole number?
Question 229: Which of the following architectures is notepad.exe an example of?
Question 230: Which of the following would be used to expand the number of wired devices on a network?
Question 231: Several wireless security cameras need to be installed in a small office. Which of the following should be used to configure the wireless encryption?
Question 232: A large percentage of computers within an organization are suddenly reporting that their operating systems may be illegally obtained. Which of the following is the MOST likely cause?
Question 233: Which of the following are database constraints? (Choose two.)
Question 234: Which of the following is a biometric authentication method?
Question 235: Given the following WMIC BIOS GET SERIALNUMBER
Question 236: Which of the following describes the above sequence?
Question 237: An administrator has found that a server has become corrupted. Which of the following will allow the administrator to recover the data?
Question 238: A company wants to provide encrypted, remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would BEST fulfill these requirements?
Question 239: A technician is selecting a processor for a custom PC. Which of the following units would be used to compare the speed of the various processors?
Question 240: A database administrator is writing code to ask the database a question. Which of the following is the administrator doing?
Question 241: Which of the following is the correct jack for an Ethernet cable?
Question 242: An organization needs to send customer PII to an outside entity. Which of the following mediums is BEST?
Question 243: A user is installing software that legally allows anyone to modify it. Which of the following license types does this software use?
Question 244: A home user just purchased a new computer from a large retailer. After setting up the computer, the user notices many games and applications are pre-installed. To reduce security concerns, which of the following should the user complete?
Question 245: A company is looking into ways to ensure only approved users are able to access the company website on devices. Which of the following would work BEST to achieve this goal?
Question 246: Which of the following would be the BEST design construct to allow developers to group functions and properties for reuse when designing an application?
Question 247: A replay attack would be the primary concern of:
Question 248: A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years. Which of the following would the administrator MOST likely choose for the project?
Question 249: Which of the following graphic interfaces is capable of the HIGHEST possible resolution?
Question 250: A technician is configuring computers for a mass deployment. As part of a web-based application, several new windows need to open once a user logs in. Which of the following should the technician configure to ensure the browsers open properly?
Question 251: Which of the following software types is MOST likely to use stencil files?
Question 252: Which of the following availability concerns is mitigated by having a business continuity site?
Question 253: The manager of human resources is unable to connect to the wireless network while in the conference room. The network administrator decides to check the logs of the network. While in the log files, the administrator finds that several access points are down. Which of the following troubleshooting steps should be performed NEXT?
Question 254: Which of the following is the number of bits in 8KB?
Question 255: Which of the following is considered a traditional input and output device?
Question 256: Which of the following is the MOST likely benefit of a structured database?
Question 257: Which of the following is a benefit of partitioning a drive?
Question 258: Which of the following describes the unit of containment that an application is constrained to on an operating system?
Question 259: Which of the following would be the MOST efficient device for a traveling salesperson to use while working with a customer?
Question 260: Which of the following security concepts reduces the chance of an on-path attack?
Question 261: A project team wants to graphically illustrate the logic of a subprogram. Which of the following would be the BEST choice?
Question 262: A technician is trying to determine what a particular error code means on a printer. The technician is using an online forum for the printer's vendor to look for documentation on the error code. Which of the following steps in the troubleshooting methodology is the technician currently performing?
Question 263: Which of the following are ways in which an IT administrator can protect mobile devices? (Choose two.)
Question 264: Which of the following application models runs the interface separately on a client machine?
Question 265: A bystander takes note while a customer is sharing credit card information over the phone. Which of the following is being performed?
Question 266: A network technician is installing a new mouse for an employee. Which of the following types of cables should the technician use for the mouse?
Question 267: Which of the following is an example of structured data?
Question 268: A user wants to ensure that a banking site is secure before logging in. Which of the following should the user look for in the URL?
Question 269: Which of the following methods of access is MOST likely to be used during a database recovery?
Question 270: Which of the following passwords is the MOST secure?
Question 271: Which of the following language categories is MOST commonly used in databases?
Question 272: An employee uses a password to log in to a company computer. Which of the following authentication methods did the employee use to gane access to the network?
Question 273: Which of the following OS types is MOST likely to be used by a public cloud service provider?
Question 274: Which of the following internet service types would MOST likely be utilized by a large data center?
Question 275: When users access a company’s website from home, they are prompted to log in with a username and password. However, when in the office they are not prompted to log in and instead are able to access the website directly. Which of the following is this the BEST example of?
Question 276: A user has incorrectly typed in a password four times and has been warned the account will be locked after two more attempts. Which of the following will MOST likely resolve the current situation?
Question 277: A faulty WAP was replaced recently. Users are now able to connect to the new WAP, but their connections are very slow and are dropping. Which of the following is the BEST action for a technician to perform?
Question 278: Which of following numbering systems is base-10?
Question 279: A technician is deploying a new application that runs on thin clients with no local storage on the user's device. The thin client cannot make a VPN connection to the company data center. Which of the following application types would MOST likely fulfill this requirement?
Question 280: Which of the following Windows 10 components allows a user to view and manage files stored on a computer’s storage system?
Question 281: Which of the following is the BEST reason to use password complexity requirements?
Question 282: Which of the following should a developer use to ensure a block of code executes a defined number of times?
Question 283: A technician recently fixed a printer issue by replacing the cable. The technician is now updating the ticket to record the action that was taken. Which of the following steps in the troubleshooting methodology is the technician currently performing?
Question 284: A user replaced the external speakers for a workstation, but the new speakers are not producing sound. Which of the following is MOST likely the issue?
Question 285: After an issue has been identified, which of the following should be performed NEXT?
Question 286: Which of the following describes a unique entry to a data set?
Question 287: A technician wants to reset the boot order on a computer. Which of the following would the technician MOST likely use?
Question 288: Which of the following would MOST likely be used to create a one-time script on a Windows server?
Question 289: Which of the following would be used to protect distinguishing features of a person, business, or organization?
Question 290: Which of the following works BEST if code needs to be reused or called by other pieces of code?
Question 291: A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?
Question 292: A user calls to report that the cable internet is slow and inconsistent, specifically in the evenings. Which of the following is the MOST likely issue?
Question 293: A design studio wants to utilize a tool that can be installed on multiple operating systems with a group-use license. Which of the following concepts meets the studio's requirements?
Question 294: A network administrator needs to ensure the software that manages a computer is fully backed up. Which of the following backups does this describe?
Question 295: Which of the following are the main functions of an operating system? (Choose two.)
Question 296: Which of the following is a benefit of embedded operating systems?
Question 297: Which of the following represents a series of numbers interpreted as characters?
Question 298: A computer with a single purpose receives input from a controller. Which of the following types of devices is this computer?
Question 299: Which of the following file management features allows access to resources on a network?
Question 300: A technician needs to reconfigure the existing wireless network for a small company. Employees at the company report internet connectivity and calls drop when using wireless headsets to communicate. Which of the following configuration changes should the technician make to MOST likely resolve the issue?
Question 301: Which of the following describes the type of OS used in an electric vehicle?
Question 302: A group of interns will be on the network over the next seven days. They will need access to the file server. Which of the following should be implemented?
Question 303: Which of the following is the BEST method to protect data in transit?
Question 304: Which of the following would provide the MOST secure means of protecting a laptop? (Choose two.)
Question 305: Which of the following features will render a file unreadable without the proper cipher?
Question 306: Which of the following is MOST likely to be used to store or transfer data?
Question 307: An administrator must select a data storage program to support an application. The program should include a management system to maintain structured data. Which of the following will the administrator MOST likely use?
Question 308: Which of the following internet service types requires filters to be installed on telephone lines at the location?
Question 309: An employee uses a password to log in to a company computer. Which of the following authentication methods did the employee use to gain access to the network?
Question 310: A user sends a message to a family member via a public instant messaging application. Which of the following BEST describes how long the message will remain on the application's servers?
Question 311: Which of the following components MOST likely will provide performance improvement by using an add-on card compared to the on-board component?
Question 312: Which of the following would MOST likely facilitate a shared credential with another user?
Question 313: A script is designed to save the results of user input from a survey to a database table. Which of the following database access methods is used to add the survey data to the table?
Question 314: An end user clicks on a link from an email that redirects to a web page. Which of the following browser settings should be enabled to reduce the threat of malicious code being executed from the web page?
Question 315: An administrator wants to block application traffic on specific ports from entering into the local area network. Which of the following devices would be the BEST choice to perform this task?
Question 316: A customer recently purchased an item at a store using a mobile phone to make the payment. Which of the following technologies was MOST likely used to complete the purchase?
Question 317: Which of the following is the MOST likely reason to use an array?
Question 318: A technician is tasked with installing a network device that allows for internet connection from the ISP but blocks all sites on the company's deny list. Which of the following devices is MOST likely used to complete this task?
Question 319: Which of the following is known to be the WEAKEST encryption standard?
Question 320: A company wants a solution with an easily searchable method of storing information and files associated with a customer. Which of the following should be used to implement this business case?
Question 321: Ann, a home user, purchases a wireless keyboard to use with a computer connected to a television. After installing batteries, plugging the USB receiver into a USB port on the computer, and successfully logging on, Ann notices some of the new keyboard's multimedia keys do not function. Which of the following steps is MOST likely needed to enable the missing keyboard functionality?
Question 322: Which of the following types of software would be the MOST appropriate for scheduling personnel and viewing activity progress?
Question 323: Which of the following would provide the BEST means of preventing data loss in the event of a disaster?
Question 324: A home user has recently purchased a new desktop computer. After following the prompts during setup and accepting all defaults, the user has noticed outbound network traffic. Which of the following is the MOST likely cause?
Question 325: A development team is brainstorming how a new program should operate. Which of the following techniques can be used to depict the program visually during brainstorming?
Question 326: Data contained on which of the following would have the HIGHEST expectation of privacy?
Question 327: A user clicks a link to a web page to view a document, but nothing happens. Which of the following is MOST likely the issue?
Question 328: A user wants to use a workstation to view data ad hoc from a company database. Which of the following access methods would be BEST?
Question 329: Which of the following is typically used to lay out documents with images and text for the web?
Question 330: A non-profit organization obtains images from the internet to use on a website. Which of the following is the organization possibly infringing on?
Question 331: Which of the following is the number of bits contained in a byte?
Question 332: Which of the following should a software developer use to BEST prevent unauthorized reproduction of software?
Question 333: Which of the following types of software is MOST likely to display a certificate error during normal usage?
Question 334: A programmer is designing an expert system that uses a series of closed-ended questions to arrive at specific output. Which of the following characteristics will MOST likely be used in the code for the expert system to achieve this?
Question 335: When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?
Question 336: Which of the following CIA triad concerns is violated when known-good computer hard drives and printed documents are placed in the trash?
Question 337: S. Accounting
Question 338: Which of the following is part of identifying the solution when troubleshooting an issue?
Question 339: After implementing a solution, which of the following should a technician do NEXT?
Question 340: The data set that is supporting an application utilizes commas to separate records. Which of the following describes the data set?
Question 341: A user's mouse appears to be jumping around the screen. Which of the following will MOST likely to fix the issue?
Question 342: Which of the following characteristics describes MOST versions of RAM?
Question 343: A programmer has been tasked to write the logic of a program without knowledge of the language to be used. Which of the following BEST describes how the programmer can accomplish this task?
Question 344: Which of the following is the BEST example of one-tier service architecture?
Question 345: Which of the following language types would MOST likely be used to display information in a web browser?
Question 346: Ann, a user, wants to remove unnecessary software and services from her personal computer to make it more secure. This is an example of:
Question 347: A technician is installing a new application on laptops that will be installed in work trucks. The laptops do not have a network connection. Which of the following application delivery models would BEST fulfill this need?
Question 348: A company has multiple users that need to modify the same document concurrently. Which of the following types of collaboration software would be BEST suited for this situation?
Question 349: Which of the following is MOST commonly used by Linux operating systems?
Question 350: An employee needs a visual aid to help demonstrate slides to a group. Which of the following would the employee MOTS likely select to help?
Question 351: Which of the following explains the key difference between an EULA and terms and conditions?
Question 352: Which of the following is used to connect to a wireless access point?
Question 353: Which of the following notational systems represents physical electrical impulses going into electronic and computing devices?
Question 354: A hotel guest is using the public computer to check travel plans. Which of the following is the BEST approach to prevent others from seeing what the guest was doing on the computer?
Question 355: Which of the following is an example of encrypted data in transit?
Question 356: A user’s personal wireless network name includes the user’s last name. To make the wireless network less identifiable, which of the following would the user access to change the wireless network name to exclude?
Question 357: A company has a reoccurring issue that involves users having antivirus browser extensions installed after updating to the latest version of the company’s antivirus software. Which of the following would prevent this issue?
Question 358: A computer technician needs to keep track of the last three passwords any employee has used. Which of the following best practices would the technician MOST likely use?
Question 359: Which of the following needs to be done for a line of code to call on a specific object that does not exist?
Question 360: Which of the following would be the MOST secure method to communicate information to a supervisor regarding a project’s status?
Question 361: Protection of a computer manufacturer’s laptop design would be considered an example of a:
Question 362: A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is BEST suited to meet this need?
Question 363: Which of the following is the purpose of a GURU?
Question 364: Which of the following is the BEST approach when troubleshooting an issue and questioning a user?
Question 365: A user wants to create a link between two tables in a database. Which of the following is the user MOST likely to use?
Question 366: Which of the following explains why the default administrator password for a home wireless router should be changed?
Question 367: Which of the following filesystems is MOST commonly found on a computer running macOS?
Question 368: Which of the following BEST describes the technology utilized in digital wallets?
Question 369: A company expects to gather increasingly large amounts of information, which need to be accessed quickly by employees. Which of the following is the MOST appropriate method to store the information?
Question 370: A database administrator needs to add a record to an existing table. Which of the following statements would the administrator MOST likely use?
Question 371: Which of the following data types would BEST be used for conditional operators?
Question 372: Which of the following contains reusable code?
Question 373: Which of the following is a programming language data type that contains a list of related values, such as colors?
Question 374: Which of the following is the LARGEST storage capacity?
Question 375: A solution engineer has designed a new website for a company. The design calls for a separate web server and application server, which communicate with a back-end database. Which of the following is this an example of?
Question 376: A systems administrator wants to ensure users cannot change their passwords to ones they have used before. Which of the following password best practices should the administrator implement?
Question 377: Which of the following is BEST to do immediately after installing an OS on a new machine in order to mitigate OS vulnerabilities?
Question 378: A consultant is designing a flowchart for a presentation. The flowchart uses red arrows to guide viewers to the next object. Which of the following represents the function being used?
Question 379: Which of the following actions would a technician MOST likely perform FIRST when troubleshooting an issue?
Question 380: Which of the following is MOST often used to retrieve data from a relational database?
Question 381: Which of the following is a characteristic of volatile storage?
Question 382: In which of the following categories do smart devices belong?
Question 383: A programmer wants to use a programming language in which high performance is a requirement. Which of the following language types is the BEST option?
Question 384: A log entry indicating the deletion of a file by a user during a previous session is an example of data:
Question 385: Which of the following operating system components would MOST likely be involved when an application needs to save data?
Question 386: A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is BEST for this requirement?
Question 387: A user is having issues trying to reach a website. The technician asks questions of the user and then tries to open the same website on another device. Which of the following troubleshooting steps is the technician performing?
Question 388: A technician is installing a printer on a Windows 10 workstation. The technician has connected the printer using a serial cable, and the printer is powered on. However, the printer does not appear in Devices and Printers. Which of the following actions will MOST likely resolve the issue and enable the printer to function?
Question 389: A user needs all of the data from a database, including the structure of the objects, the users, and the statistics. Which of the following is the BEST method to obtain this information?
Question 390: Which of the following is the exact number of bytes in a gigabyte?
Question 391: Which of the following is an element of a NoSQL database?
Question 392: Which of the following wireless technologies has the shortest transmission distance?
Question 393: A technician has been asked to install a video interface than can support both high bandwidth digital video and audio on a single cable. Which of the following should the technician use?
Question 394: Which of the following shows how many results are possible when evaluating Boolean data types?
Question 395: Which of the following is used to define what employees can do on company IT resources?
Question 396: A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following BEST describes the device the salesperson should suggest?
Question 397: Which of the following may be prevented by adding locks and video cameras to the refuse collection location?
Question 398: Which of the following language types is MOST likely used to retrieve data from a database?
Question 399: Which of the following would be BEST to use to form an internal network?
Question 400: Which of the following would be BEST to use to protect a network?
Question 401: Which of the following protocols is used to download messages from an email server?
Question 402: A company wants to set up an application without needing to buy hardware. Which of the following would be the BEST solution?
Question 403: A Chief Executive Officer (CEO) is concerned about protecting the company’s intellectual property from competitors. Which of the following will address the CEO’s concerns?
Question 404: A user from the accounting department received a call asking for hardware and software information. To which of the following is this user being exposed?
Question 405: Which of the following internet connection types is MOST affected by adverse weather, such as rain or snow?
Question 406: Which of the following is MOST likely managed directly by the operating system?
Question 407: An administrator is creating accounts based on departments within the company. Which of the following access models does this BEST represent?
Question 408: Which of the following filesystems is compatible with the greatest number of operating systems?
Question 409: Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
Question 410: A user is trying to set up a new wireless access point. Which of the following should the user do first?
Question 411: Which of the following are benefits of a security awareness training program? (Choose two.)
Question 412: A help desk technician loads a browser-based ticketing system, but when navigating to the queue, the technician realizes that another employee's queue is being accessed. Which of the following explains the issue?
Question 413: Which of the following would be the best reason to implement a host firewall?
Question 414: Which of the following types of memory can retain its content after a system reboot?
Question 415: Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?
Question 416: Which of the following scripting languages is most likely to be used in a Linux command-line environment?
Question 417: Employees must use a badge to enter and exit the building. Each time the badge is used, a log entry is created and stored to record who has entered and exited the building. Which of the following best describes what the log entries provide?
Question 418: Given this example: FEB8077911AB12TB
Question 419: Which of the following is being represented?
Question 420: Which of the following data types should a database administrator use to store customer postal codes?
Question 421: Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?
Question 422: A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?
Question 423: The output of a query in a relational database is most likely used to generate:
Question 424: The process of determining the source of an issue during troubleshooting is called:
Question 425: Which of the following is an example of a compiled language?
Question 426: Which of the following describes the concept of a database record?
Question 427: Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?
Question 428: Which of the following is the most secure filesystem?
Question 429: Which of the following creates multifactor authentication when used with something you have?
Question 430: Which of the following database structures is the most granular?
Question 431: Which of the following internet service types is most susceptible to weather disruptions?
Question 432: Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?
Question 433: A business provides access to the internet for customers through a lobby kiosk. After customers check their personal webmail, which of the following actions should customers immediately take to prevent others front accessing their email accounts on the kiosk?
Question 434: A corporate network just implemented a 60-day password-warning banner. Which of the following is most likely going to happen in 60 days?
Question 435: A small company lacks the resources to properly verify a user's identity when the user calls in for technical support. To which of the following is the company susceptible?
Question 436: Which of the following can a company use to protect its logo?
Question 437: A company developed a new logo and wants to ensure no one else uses it, in order to prevent brand confusion. Which of the following will the company most likely seek?
Question 438: A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?
Question 439: Which of the following actions is most likely associated with database use?
Question 440: Within a database, which of the following would be the best access method to use to display a subset of a table?
Question 441: A technician has verified full system functionality. Which of the following actions should the technician take next?
Question 442: Which of the following programming concepts uses properties and attributes?
Question 443: Which of the following connection types is typically used for a display monitor?
Question 444: A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?
Question 445: A programming construct that is most beneficial for organizing a program's data and behavior is:
Question 446: Which of the following protocols is used to relay email from a user's mail server?
Question 447: An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?
Question 448: Which of the following terms best describes the outcome of a text message that is encrypted from its original form?
Question 449: A systems administrator is setting up an output device that supports both USB and network capability. Which of the following devices is the administrator most likely installing?
Question 450: A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?
Question 451: A technician travels to a data center to review specifications on a new project. Which of the following is the technician most likely to see pertaining to types of operating systems?
Question 452: A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?
Question 453: Which of the following categories describes commands used to extract information from a database?
Question 454: Which of the following would be best to use to store a project task list that will be updated by multiple team members?
Question 455: A user needs an interface that supports both video and data. Which of the following will meet this requirement?
Question 456: An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
Question 457: A technician has received multiple reports about a media player, which is located in a waiting room, turning on and off at various times of the day. The technician replaces the power adapter and turns the player back on. Which of the following should the technician do next?
Question 458: Which of the following business continuity concepts is the best example of fault tolerance?
Question 459: Which of the following is an advantage of a flat file?
Question 460: An application is hosted on a local network. Which of the following descriptions is correct?
Question 461: Which of the following storage types uses platters to store data?
Question 462: A user inserts a USB flash drive into a computer for the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?
Question 463: Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?
Question 464: Which of the following best explains the reason for password expiration?
Question 465: Which of the following interfaces would provide the best visual performance?
Question 466: A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?
Question 467: Which of the following is the slowest processing speed?
Question 468: A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely. Which of the following is the most likely cause?
Question 469: An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?
Question 470: A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?
Question 471: Which of the following file types has an RTF extension?
Question 472: A user wants to minimize the risk of identity theft when making a purchase from the internet on a non-private computer. Which of the following browser options will most likely address this need?
Question 473: Which of the following file extensions is used for a consolidated group of files?
Question 474: Which of the following is required to view videos stored on a DVD?
Question 475: A database administrator needs to add a column to an existing table? Which of the following statements should the administrator use?
Question 476: An employee is on an elevator, and a stranger asks where the employee works and who the network administrator is. This is an example of:
Question 477: A network technician is installing an RJ11 connector inside a home for new internet service. Which of the following network connection types is the technician most likely using?
Question 478: An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?
Question 479: Which of the following best describes when to use an array?
Question 480: A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?
Question 481: A technician is running two Wi-Fi networks. Both of the networks have the same network name, but they have different channels and different frequencies. During testing, the connection becomes intermittent. Which of the following should the technician do to obtain a stable connection?
Question 482: Which of the following is a query language?
Question 483: A small videography business is requesting an internet connection that provides flexibility and is immune to electromagnetic interference over long distances. Which of the following is best suited for this situation?
Question 484: Which of the following notational systems uses the most characters to represent the decimal number 10?
Question 485: A company wants a group of networking professionals to have access to the server but must ensure that access is granted only to authorized users. Which of the following is best suited to ensure authorization and accounting? (Choose two.)
Question 486: Privacy expectations on a company intranet should be limited to:
Question 487: Which of the following would be the most effective use of a database?
Question 488: A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?
Question 489: A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?
Question 490: A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?
Question 491: Which of the following programming languages would most likely include tables and the SELECT command?
Question 492: A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?
Question 493: Which of the following is the smallest unit of measurement?
Question 494: Which of the following is something found on a laptop but not on a tablet?
Question 495: Which of the following is most appropriate to list on a social media site about an employer?
Question 496: A user is having trouble accessing an application. Which of the following should a help desk analyst do first?
Question 497: A flatbed scanner that is connected a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?
Question 498: Which of the following actions takes place during the problem identification phase?
Question 499: Which of the following software types is best suited to create a table and graph using an existing data set?
Question 500: Which of the following best protects data in transit?
Question 501: A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?
Question 502: A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?
Question 503: When working with storage, 1,000,000MB can also be notated as:
Question 504: Which of the following database types would be best in which to place financial data?
Question 505: Which of the following is the greatest benefit of using a cloud-hosted solution?
Question 506: Which of the following is a procedure to uninstall unwanted or suspicious software?
Question 507: Which of the following interfaces is best for viewing database performance information?
Question 508: Which of the following defines a reusable value that can be reassigned?
Question 509: Which of the following will best ensure a workstation is protected against attacks over unused ports?
Question 510: Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?
Question 511: Which of the following is secure?
Question 512: Which of the following best describes the differences between data and information?
Question 513: Which of the following components is most likely to have a dedicated, active cooling method to prevent it from overheating during operation?
Question 514: Which of the following would be the most cost-effective method to increase availability?
Question 515: A hacker was able to obtain a user’s password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?
Question 516: Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?