Certification Practice questions

Question 1: Which of the following is primarily a confidentiality concern?

Eavesdropping
Destructing
Altering
Impersonating

Question 2: A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?

Copyright
Watermark
Trademark
Patent

Question 3: Which of the following database concepts would MOST likely use a CSV file?

Data querying
Data reports
Data persistence
Data importing

Question 4: A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

Research possible theories.
Search local logs.
Check Knowledge Base.
Question users.

Question 5: Which of the following BEST describes the practice of providing user credentials when logging onto the network?

Output
Storage
Input
Processing

Question 6: Which of the following allows wireless devices to communicate to a wired network?

Firewall
Modem
Access point
Switch

Question 7: Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

Server
Laptop
Mobile phone
Workstation

Question 8: Which of the following describes something in a database that refers to the unique identifier in the parent table?

Foreign key
Constraint
Schema
Attribute

Question 9: For which of the following is a relational database management system MOST commonly used?

Storing information
Creating diagrams
Generating reports
Building flowcharts

Question 10: Which of the following BEST describes an application running on a typical operating system?

Function
Process
Thread
Task

Question 11: The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

Enable WPA2-Enterprise.
Ensure sources of EMI are removed.
Use WiFi Protected Setup.
Update from 802.11b to 802.11g.

Question 12: A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

Duplicate the problem.
Establish a plan of action.
Find the root cause.
Gather information

Question 13: A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

Review the fault tolerance configurations.
Reset the proxy settings to their default values.
Enable task scheduling.
Ensure both devices are connected to the LAN.

Question 14: Which of the following relational database constructs is used to ensure valid values are entered for a column?

Permissions
Column
Schema
Constraint

Question 15: A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

Auditing
Compression
Encryption
Permissions

Question 16: A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

a Type 1 hypervisor.
an embedded OS.
network attached storage.
a storage area network.

Question 17: Which of the following is a compiled language?

Perl
Java
PowerShell
JScript

Question 18: Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Create a new theory of cause.
Research the problem online.
Implement preventive measures.
Document the solution and cause.

Question 19: Which of the following is a value that uniquely identifies a database record?

Public key
Private key
Foreign key
Primary key

Question 20: A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?

INSERT
DELETE
UPDATE
SELECT

Question 21: Which of the following statements BEST describes binary?

A notational system used to represent media access control
A notational system used to represent Internet protocol addressing
A notational system used to represent an on or off state
A notational system used to represent a storage unit of measurement

Question 22: Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe

Question 23: MOST likely use to accomplish this?

Constant
Loop
Function
Variable

Question 24: An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step?

Contact other users.
Disconnect the peripherals.
Document the findings.
Restart the computer.

Question 25: A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

Accounting
Non-repudiation
Authentication
Integrity

Question 26: Which of the following is an advantage of installing an application to the cloud?

Service is not required.
Data is not stored locally.
Internet access is not required.
Support is not required.

Question 27: A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?

The employees' home ISP speeds
A security method of allowing connections
The quality of the computer used to connect
The geographical location of the employees

Question 28: A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?

Variable
Comment
Datatype
If

Question 29: A UPS provides protection against:

wiretapping.
power outages.
denial of service
replay attack.

Question 30: A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Flash drive
Hard disk drive
Optical drive
Solid state drive

Question 31: A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?

Document lessons learned.
Implement the solution.
Establish a plan of action.
Verify full system functionality.

Question 32: A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

Permission
USB cable
Ink cartridge
Driver

Question 33: Which of the following BEST describes a kilobyte?

A kilobyte is a measurement of power (e.g., 100KW).
A kilobyte is a measurement of storage (e.g., 100KB).
A kilobyte is a measurement of throughput (e.g.,100Kbps).
A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Question 34: Which of the following security concerns is a threat to confidentiality?

Replay attack
Denial of service
Dumpster diving
Service outage

Question 35: Which of the following software license models allows a developer to modify the original code and release its own version of the application?

Commercial software
Cross-platform software
Open source software
Proprietary software

Question 36: Which of the following are the basic computing operations?

Input, process, output, and storage
Input, output, storage, and feedback
Input, process, output, and feedback
Input, process, and output

Question 37: Which of the following would work BEST stored as a flat file rather than stored in a database?

Store inventory
Directions to doctor's office
Movie theater locations
Contact list

Question 38: An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Data correlation
Data gathering
Data manipulation
Data definition

Question 39: An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?

Web application
Cloud application
Standalone application
Client-server application

Question 40: Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

The power interruption caused the camera to malfunction.
A firmware update needs to be applied to the camera.
Ann has a compatibility problem with the camera.
Ann's Internet connection and wireless router are still down.

Question 41: A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

Solid state drive
Memory
Flat file
Relational database

Question 42: Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?

Trademark
Copyright
Patent
Contract

Question 43: Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

NFC
Bluetooth
Infrared
WiFi

Question 44: The IT department has established a new password policy for employees. Specifically, the policy reads:

Question 45: ✑ Passwords must not contain common dictionary words

Question 46: ✑ Passwords must contain at least one special character.

Question 47: ✑ Passwords must be different from the las six passwords used.

Question 48: ✑ Passwords must use at least one capital letter or number.

Question 49: Which of the following practices are being employed? (Choose two.)

Password length
Password lockout
Password age
Password complexity
Password expiration
Passwords history

Question 50: Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer?

Email previewing
Kill process
Patching
Clear browsing cache

Question 51: A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?

Infrared port
WLAN card
Thunderbolt cable
Bluetooth module

Question 52: Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

Social engineering
Password reuse
Phishing
Snooping

Question 53: A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?

WEP
SSID
WPA2
WPA

Question 54: Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Choose two.)

SNMP
SFTP
ICMP
SMTP
POP3
DHCP

Question 55: A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

UPDATE
DROP
ALTER
DELETE

Question 56: A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

USB
DVI
DSL
NFC

Question 57: Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

Cable
Satellite
DSL
Fiber

Question 58: Which of the following is MOST likely used to represent international text data?

ASCII
Hexadecimal
Unicode
Octal

Question 59: For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

prioritization.
fault tolerance.
redundancy.
replication.

Question 60: Which of the following operating systems do not require extensions on files to execute a program? (Choose two.)

Windows 8
Windows 7
Android
Linux
Windows Server 2012
UNIX

Question 61: A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

802.11b
802.11a
802.11n
802.11g

Question 62: Which of the following is an example of multifactor authentication?

Smart card and PIN
Fingerprint and retina scan
Hardware token and smartphone
Password and passphrase

Question 63: Which of the following language types would a web developer MOST likely use to create a website?

Interpreted
Compiled
Query
Assembly

Question 64: A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems.

Question 65: Which of the following is being developed?

Flowchart
Algorithm
Pseudocode
Software

Question 66: A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two.)

Patent
NDA
Trademark
EULA
Copyright

Question 67: Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

Anti-malware software
Full disk encryption
Strong administrator password
Host-based firewall

Question 68: In which of the following situations should there be come expectation of privacy?

Posting a comment on a video sharing site
Posting a comment on a friend's social media page
Sending email and pictures to a close relative
Submitting personal information on a school enrollment site

Question 69: Which of the following data types should a developer use when creating a variable to hold a postal code?

String
Integer
Float
Boolean

Question 70: Which of the following is the closest to machine language?

Query languages
Compiled languages
Assembly languages
Scripted languages

Question 71: A function is BEST used for enabling programs to:

define needed constant values.
be divided into reusable components.
define variables to hold different values.
hold a list of numbers.

Question 72: When transferring a file across the network, which of the following would be the FASTEST transfer rate?

1.22Gbps
1001Kbps
123Mbps
110Mbps

Question 73: A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

127.0.0.1
192.168.257.1
255.255.255.0
172.16.2.189

Question 74: A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

Game console
Laptop
Workstation
Server

Question 75: A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?

Database
Network share
Flat file
Word processor

Question 76: A computer user is downloading software from the Internet and notices the following at the end of the install file: ``¦x86.exe`. Which of the following statements

Question 77: BEST represents what the ``¦x86.exe` means in the installation file?

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.
x86 supports an installation on a 16-bit CPU architecture.
x86 only supports an installation on a 32-bit CPU architecture.
x86 only supports an installation on a 64-bit CPU architecture.

Question 78: Which of the following would be used to send messages using the SMTP protocol?

Email software
Conferencing software
Document sharing software
Instant messaging software

Question 79: Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

Turn on private browsing
Notify when downloads are complete.
Delete browsing history on program close.
Configure prompting before downloading content

Question 80: Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Company social media screen name
Customer service number
Customer date of birth
The first and last name of the Chief Executive Officer (CEO)

Question 81: The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Conferencing software
Presentation software
Word processing software
Database software

Question 82: Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

Disable the pop-up blocker
Configure the browser proxy settings.
Renew the IP address.
Clear the browser cache.

Question 83: Which of the following would be considered the BEST method of securely distributing medical records?

FTP file sharing
Social networking sites
Fa
Encrypted flash drive

Question 84: Which of the following should have the HIGHEST expectation of privacy?

A locally stored word processing document
A picture posted to a social media website
A presentation saved to a corporate file server
A spreadsheet emailed to a business client

Question 85: hich of the following storage devices have a spinning disk? (Choose two.)

HDD
SSD
ROM
Optical drive
RAM
Flash drive

Question 86: Which of the following computer components allows for communication over a computer network?

NAS
CPU
RAM
NIC

Question 87: A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?

Fiber
Cellular
Cable
Satellite

Question 88: Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Mandatory access control
Role-based access control
Rule-based access control
Discretionary access control

Question 89: A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Input
Storage
Output
Processing

Question 90: A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?

Concurrent license
Subscription license
Group license
Open-source license

Question 91: A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

Script blocker
Browser add-on
Corrupted cache
Proxy server

Question 92: Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter?

Traditional
Cloud
Private
Public

Question 93: A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?

SELECT
EXPORT
ALTER
IMPORT

Question 94: Which of the following would a company consider an asset?

A company-sponsored technology conference
Information residing on backup tapes
An external company used to destroy defective hard drives
A certified third-party vendor that provides critical components

Question 95: A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Written email
Written procedure
Written policy
Written memo

Question 96: A company's team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)

RJ45
FireWire
VGA
Bluetooth
HDMI
USB

Question 97: A programmer uses DML to modify:

backups
permissions
data
files

Question 98: A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?

DLP
ACL
IPS
TLS

Question 99: A developer needs to add a table to a database. Which of the following database activities should the user perform?

CREATE
REPORT
UPDATE
ALTER

Question 100: Which of the following does a NoSQL database use to organize data?

Tables
Schemas
Primary keys
Keys/values

Question 101: A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?

Data restoration
Fault tolerance
File backup
Restoring access

Question 102: A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?

Text editing software
Web browsing software
Visual diagramming software
Spreadsheet software

Question 103: Which of the following BEST describes the physical location of the data in the database?

HDD
Table
Column
RAM

Question 104: A user logs into a laptop using a username and complex password. This is an example of:

biometrics
least privilege
multifactor authentication
single-factor authentication

Question 105: To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user's workstation. Which of the following troubleshooting methodologies is being performed?

Duplicate the problem
Question the obvious.
Divide and conquer.
Research the knowledge base.

Question 106: A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of Internet service connections would BEST meet the user's needs?

DSL
Fiber optic
Satellite
T1 line

Question 107: Which of the following types of encryption would BEST protect a laptop computer in the event of theft?

Disk
VPN
HTTPS
Email

Question 108: Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?

Implement the solution.
Verify functionality.
Question users.
Divide and conquer.

Question 109: A technician overhears a systems administrator mention the term `IOPS`. To which of the following operating system functions would the term BEST apply?

Application management
Disk management
Process management
Service management

Question 110: Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?

Vector
Array
List
String

Question 111: A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?

Database
Word processing document
Flat file
Spreadsheet

Question 112: Which of the following would MOST likely use an ARM processor?

Server
Laptop
Tablet
Workstation

Question 113: A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this?

Perform process management.
Set the system date and time.
Perform task scheduling.
Set a reminder to run the script.

Question 114: Which of the following would indicate the FASTEST processor speed?

3.6Mbps
3.6Gbps
3.6GHz
3.6MHz

Question 115: A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?

Access point
Wireless router
Network switch
Cable modem

Question 116: The computer language that is closest to machine code is:

markup language
scripting language
query language
assembly language

Question 117: Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?

Report
Column
Procedure
Record

Question 118: Which of the following is an example of an interpreted language?

C++
Python
Java
Go

Question 119: An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?

Full browser cache
Proxy settings
Script blocker
Private browsing

Question 120: Which of the following filesystems would a Linux computer MOST likely use?

HFS
ext4
FAT32
NTFS

Question 121: Which of the following concerns does installing cross-platform software address?

Product key
Subscription
Licensing
Compatibility

Question 122: Which of the following requires the MOST frequent updating to remain effective?

Device drivers
Host firewall
Web browser
Antivirus

Question 123: Which of the following BEST explains the use of float over integer to store monetary values?

It supports decimals.
It stores symbols
It accommodates larger values.
It accepts negative values.

Question 124: An IP address is 32 bits long. If converted to bytes, it would be:

4 bytes
8 bytes
64 bytes
16 bytes

Question 125: Which of the following BEST describes the purpose of a vector in programming?

Repeating a similar operation
Storing a collection of data
Performing mathematical calculations
Capturing user input

Question 126: Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?

Open
WPA2
WPA
WEP

Question 127: Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?

Managed relational database
Locally installed productivity software
Text file on a shared drive
Informational intranet page

Question 128: A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?

n-tier
Two-tier
One-tier
Three-tier

Question 129: A global variable called `age` will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?

Float
Double
String
Integer

Question 130: Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?

Data capture and collections
Average loss output
Asset inventory inputs
Sales statistics

Question 131: A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?

Intranet application
Extranet application
Internet application
Local application

Question 132: A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)

External hard drive
Printer
Display
Speakers
Mouse
Webcam

Question 133: A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?

POP3
IMAP
ICMP
SMTP

Question 134: Which of the following is a reason why complex passwords are required?

To reduce social engineering attacks
To encourage password variety
To prevent someone from guessing them
To make them harder to remember

Question 135: A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?

Duplicate the problem
Question users
Divide and conquer
Gather information

Question 136: Which of the following storage types is MOST vulnerable to magnetic damage?

HDD
Optical
SSD
Flash

Question 137: When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?

Property
Method
Object
Attribute

Question 138: Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?

The SSID is not being broadcast.
The router is operating on a different channel.
The key does not meet password complexity requirements.
The light switches do not support WPA2.

Question 139: Which of the following are the primary functions of an operating system? (Choose two.)

Provide user data encryption.
Provide peer-to-peer networking capability.
Provide structure for file and data management.
Provide system resources.
Provide protection against malware and viruses.
Provide virtual desktop capability.

Question 140: SQL databases use primary and foreign keys to enable which of the following?

Relationships
Fields
Rows
Schemas

Question 141: Which of the following is a logical structure for storing files?

Permissions
Extension
Folder
Shortcut

Question 142: Which of the following is both an input and output device?

Speaker
Microphone
Touch-screen monitor
Keyboard

Question 143: A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?

Document lessons learned.
Establish a theory of probable cause.
Duplicate the problem, if possible.
Determine if anything has changed.

Question 144: A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?

Password history
Password age
Password reuse
Password expiration

Question 145: A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?

Prioritization
Backups
Indexes
Failover

Question 146: A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?

Checking browser add-ons
Checking certificate validity
Checking the proxy settings
Checking that caching is enabled

Question 147: A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Anti-malware
Host firewall
Device Manager
Antivirus

Question 148: Which of the following contains exactly four copper wires?

RJ45
RJ11
USB
VGA

Question 149: A technician replaces the video card in a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Replace the user's display.
Replace the video cable.
Update the PC's operating system.
Install new video drivers.

Question 150: All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

Tape library
Workstation
External HDD
Server

Question 151: Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?

Unauthorized hacking
Behavior security
Authorized hacking
Information Identity Management

Question 152: A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?

System updates
Input validation
Password lockout
Login auditing

Question 153: Which of the following is the number of bytes that is in 2KB?

1048576
2048
20000
1024

Question 154: A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?

Create a guest network
Change to WEP security.
Change the SSID.
Change the default password.

Question 155: Which of the following is the BEST overall storage option for a laptop?

SD card
Flash drive
Hard drive
Solid-state drive

Question 156: A technician has worked through all steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do NEXT?

Confirm the root cause.
Escalate as necessary.
Establish a new theory.
Gather information.

Question 157: A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)

Update the IPS signatures.
Quarantine the network.
Update the network firewall.
Reset the network router.
Update the malware definitions.
Contact the ISP.

Question 158: The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem?

Client-side scripting has been deactivated on some clients visiting the site.
Server-side scripting has been deactivated by the server administrator.
Legacy browsers that do not support scripting are being used by some clients.
Private browsing is being used by some clients visiting the site.

Question 159: Which of the following is MOST likely to be considered protected personal information?

Medical records
Court records
Genealogy records
Property tax records

Question 160: A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:

confidentiality concerns.
integrity concerns.
accounting concerns.
availability concerns.

Question 161: A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?

Record
Field
Schema
Constraint

Question 162: The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?

Man-in-the-middle
Eavesdropping
Denial-of-service
Email service outage

Question 163: Which of the following is an IP address?

10010110
0x64F32
172.0.0.1
00:0F:AC:17:2F:32

Question 164: A developer is troubleshooting code in an application. The code is supposed to return the word `vegetables` if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?

If category id = 1 then 'Fruit' Else 'Vegetables'
If category id = 1 then 'Fruit' Else if category id >= 2 then 'Vegetables' Else 'Candy'
If category id = 1 then 'Fruit' Else if category id = 2 then 'Vegetables' Else 'Candy'
If category id <> 1 then 'Vegetables' Else 'Fruit'

Question 165: Which of the following would allow an application to run automatically when a computer is started?

Drivers
Services
Processes
Journaling

Question 166: An organization exports an inventory database nightly. This is an example of:

database report.
database query.
database backup.
database import.

Question 167: A user is having issues connecting to the Internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue?

Verify the proxy settings.
Disable the pop-up blocker.
Clear the browser cache.
Validate the certificate.

Question 168: Which of the following data types BEST performs calculations?

Integer
Vector
String
Char

Question 169: A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?

Install and configure a firewall.
Install and configure an IDS.
Install and run an antivirus program.
Install and use another browser.

Question 170: Which of the following internal computing components has the primary function of producing visual output to a monitor or other display device?

VGA
GPU
CPU
GUI

Question 171: A schema is a critical part of which of the following?

NoSQL database
Key/value database
Relational database
Document database

Question 172: In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity?

RF
VPN
IR
NFC

Question 173: Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the following best practices should she implement?

Password length
Password reuse
Password history
Password complexity

Question 174: Which of the following encryption types would BEST be used to protect data on a shared computer?

Email
Mobile
VPN
File

Question 175: A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use?

Spreadsheet software
Visual diagramming software
Presentation software
Word processing software

Question 176: Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter?

Hypervisor
Load balancer
Web applications
Dynamic routing

Question 177: Which of the following is the BEST example of structured data?

Employee beverage preferences organized in a single text field
Vendor order information stored in unnamed fields
Manager home addresses stored in a flat file without fields
Customer information that can be sorted or grouped by any field

Question 178: Which of the following numbering systems is used to represent MAC addresses?

Octal
Decimal
Hexadecimal
Binary

Question 179: A database administrator has placed data from another source into a database. Which of the following did the database administrator perform?

Query
Create
Export
Import

Question 180: A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router?

Setting a new SSID
Enabling encryption
Using 802.11ac
Changing the default password

Question 181: Which of the following programming language types is generally the FASTEST way to write a program ad hoc tasks quickly?

Pseudocode
Scripting language
Assembly language
Compiled programming language

Question 182: A user has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?

The password might be easier for an attacker to guess.
Password compromise would allow access to all of the systems.
Single sign-on would be unable to function correctly.
Systems might reject the password based on different requirements.

Question 183: Which of the following should be used to store a list of strings?

Array
Variable
Constant
Branch

Question 184: Which of the following services is used to translate a URL to an IP address?

ARP
DNS
MAC
IMAP

Question 185: Which of the following is the BEST method for ensuring there is no Telnet access?

Host-based firewall
Intrusion detection system
Network sniffer
Antivirus software

Question 186: Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member?

Collaborative workspace
Project management
Personal information management
Spreadsheet

Question 187: A user needs to connect a laptop to an Ethernet port in the room. Which of the following types of connections does the user need?

RG6
RJ11
RJ45
DB9

Question 188: Which of the following computing devices is MOST likely to have an internal wireless antenna?

Server
Mobile phone
Workstation
NAS

Question 189: Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?

Establish a theory of the cause.
Implement the solution.
Verify system functionality.
Identify the problem.

Question 190: A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?

Loss of revenue in case of a breach
Training involved for IT staff and users
Difficulty of integration
Amount of equipment that will be replaced

Question 191: A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)

Logs
Encryption
Software token
Receipt
Password
Database

Question 192: A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST describes the fact that the operation is only performed if the input is correct?

Reuse
Looping
Modeling
Branching

Question 193: A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on:

a server OS.
a mobile OS.
an embedded OS.
a workstation OS.

Question 194: Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.)

Virtual-hosted desktops
RAID storage
Private cloud servers
Off-site backups
Uninterruptible power supplies
Warm sites

Question 195: A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use?

WHILE
FOR
BEGIN
IF THEN

Question 196: Which of the following has the longest range?

WiFi
NFC
Bluetooth
Infrared

Question 197: Which of the following programming constructs would be used to repeat a statement 100 times in a loop?

IF
RETURN
WHILE
ELSE

Question 198: A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation?

Configure the USB port.
Manually install the driver software.
Download the driver software.
Connect the mouse.

Question 199: Which of the following is the WEAKEST link in the security posture of an organization?

Technology
Regulations
Infrastructure
People

Question 200: A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of:

compiling the language.
identifying functions.
drawing a value stream map.
developing pseudocode.

Question 201: A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?

Enable an audit log.
Implement smart card login.
Adopt a procedure for adding accounts.
Enhance the granularity of user permissions.

Question 202: A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts?

Text editor
Command line
Spreadsheet
Word processor

Question 203: Which of the following will a company do to update a customer's address while using a flat file database?

Update the address field in the customer order table.
Update the address in the customer address table.
Update the primary key to reflect the customer's address.
Update the address for each order the customer placed.

Question 204: A developer embeds a query in a high-level program to extract information from a database. This is an example of:

database direct access.
database utility access.
database programmatic access.
database manual access.

Question 205: Which of the following is the LOWEST unit for measuring bandwidth?

Kbps
MBps
Mbps
KBps

Question 206: A user connects a company computer to free WiFi at a local coffee shop. Which of the following BEST describes this situation?

Private browsing mode protects the information on the network.
It is safe to access company information using the network.
Information on this network is encrypted.
The information on the network can be seen by others.

Question 207: A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work?

USB cable
Workstation
IP address
Driver

Question 208: Which of the following is used for assigning IP addresses to networking devices?

ARP
DHCP
SMTP
DNS

Question 209: A help desk has initiated a new policy requiring that technicians manually categorize the reason for a customer call. After several months, they are unable to perform any analysis on the information. Which of the following concepts is MOST closely tied to the root cause of this issue?

Data security
Data capture
Data as an asset
Data correlation

Question 210: During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?

Establish a plan of action.
Implement preventive measures.
Test the theory to determine the cause.
Document findings/lessons learned.

Question 211: An end user reports seeing the old company intranet site and not the recently released updated version. Which of the following would MOST likely solve the problem?

Change http to https in the URL.
Disable all add-ons.
Enable pop-up blockers.
Clear browser cache.

Question 212: Which of the following BEST describes a LAN-hosted application? (Choose two.)

Files saved to the cloud
Services required
Internet access required
Network required
Cloud availability
Internet access not required

Question 213: A technician is given a document with step-by-step instructions to perform a task. Which of the following BEST describes that document?

Guidelines
Policies
Standards
Procedures

Question 214: A technician installs a webcam to a computer and wants to install an updated driver. In which of the following would the technician find the MOST current driver?

Installation disc that came with the device
OEM website for the camera
Internet help-desk forums
Computer manufacturer's website

Question 215: Which of the following is a benefit of a locally hosted network solution?

No Internet access is required.
System fault tolerance is increased.
System backups are not required.
There are fewer IT support requirements.

Question 216: Which of the following is an example of a compiled computer language?

Python
Perl
Java
HTML

Question 217: When following the troubleshooting methodology, which of the following should be performed when establishing a theory of probable cause?

Duplicate the problem.
Question the obvious.
Identify the symptoms.
Determine if anything has changed.

Question 218: Which of the following would be considered confidential information?

A list of services offered by a private investigator
An individual’s record of traffic citations
The design for a company’s yet-to-be-released product
A large corporation's financial results for the year

Question 219: Which of the following information types is MOST likely a violation of an email security policy?

Login credentials
Customer product information
Project schedules
Technical installation documents

Question 220: Which of the following programming languages is considered a low-level language with commands specific to the processor type used?

C++
HTML
Assembly
SQL

Question 221: Joe, a tech-savvy teenager, has received one of the best new home Wi-Fi routers on the market. Joe’s parents have entrusted Joe to set up the router. To leverage the best throughput options available for Joe’s devices, the router is located in Joe’s bedroom. Joe’s parents’ devices are set to slower standards. Which of the following is being used for Joe’s devices?

802.11ac 5GHz
802.11ac 2.4GHz
802.11n 2.4GHz
802.11n 5GHz

Question 222: Which of the following data is MOST likely to be stored as a string?

Cat
42
z
3.1415927

Question 223: Which of the following is MOST likely used to measure SSD capacity?

Gb
Gbps
GHz
GB

Question 224: Which of the following information types would cause the GREATEST loss of value to an organization if encrypted by a ransomware attack?

Employee emergency contacts
Advertising material archive
User login history
Research projects database

Question 225: Which of the following database design requirements is MOST likely a reason to implement a flat file?

Simplicity
Search speed
Data type flexibility
Scalability

Question 226: A user received an account compromise notice from an online retailer. Two weeks later, the user received another notice stating the new compromise used the credentials from the first compromise. Which of the following password best practices MOST likely would have prevented the second compromise?

Password reuse
Password complexity
Password length
Password age

Question 227: A programmer is constructing an algorithm that predicts personality traits based on users’ selection of their favorite ice cream flavors. Which of the following programming concepts should be used to represent the flavor of ice cream?

Vectors
Arrays
Variables
Constants

Question 228: Which of the following data types can be used to store a whole number?

Float
Char
Integer
Boolean

Question 229: Which of the following architectures is notepad.exe an example of?

Three-tier
One-tier
Two-tier
n-tier

Question 230: Which of the following would be used to expand the number of wired devices on a network?

Access point
Modem
Router
Switch

Question 231: Several wireless security cameras need to be installed in a small office. Which of the following should be used to configure the wireless encryption?

IP-based HDD
On-board NIC
Web-based interface
Plug-and-play drivers

Question 232: A large percentage of computers within an organization are suddenly reporting that their operating systems may be illegally obtained. Which of the following is the MOST likely cause?

The key management server is offline
The company did not pay for the license
Internet access is unavailable
Hackers have stolen the organization's license

Question 233: Which of the following are database constraints? (Choose two.)

Column
Primary key
Not null
Field
Table
Row

Question 234: Which of the following is a biometric authentication method?

Retina scan
Password
Personal identification number
Smart card

Question 235: Given the following WMIC BIOS GET SERIALNUMBER

Question 236: Which of the following describes the above sequence?

A database dump
Insertion of data
A function
A query

Question 237: An administrator has found that a server has become corrupted. Which of the following will allow the administrator to recover the data?

Server UPS rack
Redundant NICs
Off-site backups
OS restore disks

Question 238: A company wants to provide encrypted, remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would BEST fulfill these requirements?

VPN
Disk-level encryption
Secure web gateway
AES

Question 239: A technician is selecting a processor for a custom PC. Which of the following units would be used to compare the speed of the various processors?

GHz
MHz
GBps
MBps

Question 240: A database administrator is writing code to ask the database a question. Which of the following is the administrator doing?

Mining data
Creating a query
Manipulating data
Making a report

Question 241: Which of the following is the correct jack for an Ethernet cable?

DB9
RJ45
Cat 5
DVI

Question 242: An organization needs to send customer PII to an outside entity. Which of the following mediums is BEST?

Courier service
Encrypted email
ODBC
Flash drive

Question 243: A user is installing software that legally allows anyone to modify it. Which of the following license types does this software use?

Site
Open-source
Subscription
Proprietary

Question 244: A home user just purchased a new computer from a large retailer. After setting up the computer, the user notices many games and applications are pre-installed. To reduce security concerns, which of the following should the user complete?

Remove the unwanted bloatware.
Check for disk fragmentation.
Call the computer manufacturer.
Perform a System Restore

Question 245: A company is looking into ways to ensure only approved users are able to access the company website on devices. Which of the following would work BEST to achieve this goal?

Disabling the browser's cache
Creating certificates
Installing antivirus extensions
Configuring proxy settings

Question 246: Which of the following would be the BEST design construct to allow developers to group functions and properties for reuse when designing an application?

Function
Vector
Class
Constant

Question 247: A replay attack would be the primary concern of:

integrity.
confidentiality.
availability.
authentication.

Question 248: A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years. Which of the following would the administrator MOST likely choose for the project?

Solid-state drive
USB flash drive
Hard disk
Tape drive

Question 249: Which of the following graphic interfaces is capable of the HIGHEST possible resolution?

Component video
S-Video
DVI
VGA

Question 250: A technician is configuring computers for a mass deployment. As part of a web-based application, several new windows need to open once a user logs in. Which of the following should the technician configure to ensure the browsers open properly?

Security extensions setting to disable
Pop-up blocker exceptions
Applications to run in private mode
Unrestricted PowerShell execution policy

Question 251: Which of the following software types is MOST likely to use stencil files?

Visual diagramming
Word processing
Presentation
Conferencing

Question 252: Which of the following availability concerns is mitigated by having a business continuity site?

Service outage
Replay attack
Eavesdropping
Wiretapping

Question 253: The manager of human resources is unable to connect to the wireless network while in the conference room. The network administrator decides to check the logs of the network. While in the log files, the administrator finds that several access points are down. Which of the following troubleshooting steps should be performed NEXT?

Identify the problem
Research the knowledge base.
Establish a plan to resolve the problem
Verify full system functionality

Question 254: Which of the following is the number of bits in 8KB?

16,000
32,000
8,000
64,000

Question 255: Which of the following is considered a traditional input and output device?

Keyboard
Display monitor
Hard drive
Printer

Question 256: Which of the following is the MOST likely benefit of a structured database?

Easily searchable
Fewer storage requirements
Higher security
Faster accumulation

Question 257: Which of the following is a benefit of partitioning a drive?

Increased available space
Increased network bandwidth
Reduced risk of corruption
Reduced malware risk

Question 258: Which of the following describes the unit of containment that an application is constrained to on an operating system?

Thread
Directory
Console
Process

Question 259: Which of the following would be the MOST efficient device for a traveling salesperson to use while working with a customer?

Terminal
Desktop
Tablet
Smartphone

Question 260: Which of the following security concepts reduces the chance of an on-path attack?

Performance
Availability
Confidentiality
Integrity

Question 261: A project team wants to graphically illustrate the logic of a subprogram. Which of the following would be the BEST choice?

Word processing software
Visual diagramming software
Image editing software
Presentation software

Question 262: A technician is trying to determine what a particular error code means on a printer. The technician is using an online forum for the printer's vendor to look for documentation on the error code. Which of the following steps in the troubleshooting methodology is the technician currently performing?

Verifying full system functionality
Documenting the lessons learned
Researching the knowledge base
Establishing a theory of probable cause

Question 263: Which of the following are ways in which an IT administrator can protect mobile devices? (Choose two.)

Encrypt the devices
Only install applications from authorized stores
Root the devices to install third-party security software
Access web stores to purchase applications
Disable location services
Enable installation of applications from unknown sources

Question 264: Which of the following application models runs the interface separately on a client machine?

Two-tier
n-tier
One-tier
Three-tier

Question 265: A bystander takes note while a customer is sharing credit card information over the phone. Which of the following is being performed?

Snooping
Eavesdropping
Social engineering
On-path attack

Question 266: A network technician is installing a new mouse for an employee. Which of the following types of cables should the technician use for the mouse?

USB
HDMI
Ethernet
DVI

Question 267: Which of the following is an example of structured data?

Photographs
Video recordings
Social media posts
Phone numbers

Question 268: A user wants to ensure that a banking site is secure before logging in. Which of the following should the user look for in the URL?

HTML
SFTP
SSL
HTTPS

Question 269: Which of the following methods of access is MOST likely to be used during a database recovery?

Programmatic
Graphical user interface
Direct
Utility

Question 270: Which of the following passwords is the MOST secure?

BuZZyPr3st0
BuZZyPresto
BuZZyPr3$t0
buzzypresto

Question 271: Which of the following language categories is MOST commonly used in databases?

Assembly
Scripting
Markup
Query

Question 272: An employee uses a password to log in to a company computer. Which of the following authentication methods did the employee use to gane access to the network?

Permissions
Single sign-on
Single-factor
Multifactor

Question 273: Which of the following OS types is MOST likely to be used by a public cloud service provider?

Mobile
Hypervisor
Embedded
Workstation

Question 274: Which of the following internet service types would MOST likely be utilized by a large data center?

Satellite
Cable
DSL
Fiber

Question 275: When users access a company’s website from home, they are prompted to log in with a username and password. However, when in the office they are not prompted to log in and instead are able to access the website directly. Which of the following is this the BEST example of?

Hardware token
Single sign-on
Non-repudiation
Multifactor authentication

Question 276: A user has incorrectly typed in a password four times and has been warned the account will be locked after two more attempts. Which of the following will MOST likely resolve the current situation?

Password expiration
Password manager
Password reset process
Password reuse

Question 277: A faulty WAP was replaced recently. Users are now able to connect to the new WAP, but their connections are very slow and are dropping. Which of the following is the BEST action for a technician to perform?

Change the SSID.
Change the channel.
Change the encryption type.
Change the WAP password.

Question 278: Which of following numbering systems is base-10?

Hexadecimal
Binary
Decimal
Octal

Question 279: A technician is deploying a new application that runs on thin clients with no local storage on the user's device. The thin client cannot make a VPN connection to the company data center. Which of the following application types would MOST likely fulfill this requirement?

Locally installed
Cloud-hosted
Local network-hosted
Three-tier

Question 280: Which of the following Windows 10 components allows a user to view and manage files stored on a computer’s storage system?

Program Manage
File Manager
Control Panel
File Explorer

Question 281: Which of the following is the BEST reason to use password complexity requirements?

To discourage reuse
To meet customer requirements
For stronger access control
As a legal requirement

Question 282: Which of the following should a developer use to ensure a block of code executes a defined number of times?

if ... else statement
while loop
switch statement
for loop

Question 283: A technician recently fixed a printer issue by replacing the cable. The technician is now updating the ticket to record the action that was taken. Which of the following steps in the troubleshooting methodology is the technician currently performing?

Establishing a theory of probable cause
Documenting the findings
Identifying the problem
Verifying the solution

Question 284: A user replaced the external speakers for a workstation, but the new speakers are not producing sound. Which of the following is MOST likely the issue?

The sound card is not enabled in Device Manager
The user did not install batteries into the speakers
The user did not complete the software setup
The speakers are plugged into the microphone port

Question 285: After an issue has been identified, which of the following should be performed NEXT?

Implementing the solution
Documenting the findings
Verifying system functionality
Establishing a theory of probable cause

Question 286: Which of the following describes a unique entry to a data set?

Inde
Column
Record
Schema

Question 287: A technician wants to reset the boot order on a computer. Which of the following would the technician MOST likely use?

BIOS
CPU
SSD
Motherboard

Question 288: Which of the following would MOST likely be used to create a one-time script on a Windows server?

HTTPS
PowerShell
C++
cron

Question 289: Which of the following would be used to protect distinguishing features of a person, business, or organization?

Patent
Copyright
Trademark
Trade secrets

Question 290: Which of the following works BEST if code needs to be reused or called by other pieces of code?

Declaration
Anonymous block
Function
Formula

Question 291: A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?

Table schema
Logical schema
Flowchart schema
Physical schema

Question 292: A user calls to report that the cable internet is slow and inconsistent, specifically in the evenings. Which of the following is the MOST likely issue?

Shared bandwidth
Router failure
Site congestion
Off-peak internet usage

Question 293: A design studio wants to utilize a tool that can be installed on multiple operating systems with a group-use license. Which of the following concepts meets the studio's requirements?

Online workspace software
Conferencing software
Open-source software
Cross-platform software

Question 294: A network administrator needs to ensure the software that manages a computer is fully backed up. Which of the following backups does this describe?

Operating system
Email
Database
File

Question 295: Which of the following are the main functions of an operating system? (Choose two.)

Flowchart editing
Text processing
Application management
Hardware access control
Program compilation
Web browsing

Question 296: Which of the following is a benefit of embedded operating systems?

Ability to run multiple applications
Easy to transfer data between systems
Resource efficiency
Frequent updates

Question 297: Which of the following represents a series of numbers interpreted as characters?

ASCII
Binary
Hexadecimal
Octal

Question 298: A computer with a single purpose receives input from a controller. Which of the following types of devices is this computer?

Gaming console
Server
Workstation
Tablet

Question 299: Which of the following file management features allows access to resources on a network?

Permissions
Journaling
Authentication
Encryption

Question 300: A technician needs to reconfigure the existing wireless network for a small company. Employees at the company report internet connectivity and calls drop when using wireless headsets to communicate. Which of the following configuration changes should the technician make to MOST likely resolve the issue?

Utilize a different frequency.
Update the SSID.
Change the Wi-Fi channel.
Restart the DHCP server.

Question 301: Which of the following describes the type of OS used in an electric vehicle?

Server OS
Workstation OS
Mobile device OS
Embedded OS

Question 302: A group of interns will be on the network over the next seven days. They will need access to the file server. Which of the following should be implemented?

Group objects
Permissions
Passwords
Usernames

Question 303: Which of the following is the BEST method to protect data in transit?

Disk-level encryption
Column-level encryption
Network-level encryption
AES encryption

Question 304: Which of the following would provide the MOST secure means of protecting a laptop? (Choose two.)

Hardware token
Biometrics
Eight-character password
Long password
Personal identification number
Security questions

Question 305: Which of the following features will render a file unreadable without the proper cipher?

Password
Permissions
Encryption
Compression

Question 306: Which of the following is MOST likely to be used to store or transfer data?

Backup tape
USB
Floppy disk
DVD

Question 307: An administrator must select a data storage program to support an application. The program should include a management system to maintain structured data. Which of the following will the administrator MOST likely use?

Spreadsheet
Flat file
NoSQL
Relational

Question 308: Which of the following internet service types requires filters to be installed on telephone lines at the location?

Satellite
Fiber
Cable
DSL

Question 309: An employee uses a password to log in to a company computer. Which of the following authentication methods did the employee use to gain access to the network?

Single sign-on
Multifactor
Permissions
Single-factor

Question 310: A user sends a message to a family member via a public instant messaging application. Which of the following BEST describes how long the message will remain on the application's servers?

No more than 30 days from sending
As described in the terms of use
Only until read by the family member
No less than one day from sending

Question 311: Which of the following components MOST likely will provide performance improvement by using an add-on card compared to the on-board component?

GPU
CPU
Wi-Fi
USB

Question 312: Which of the following would MOST likely facilitate a shared credential with another user?

Password validation
Password generator
Password encryption
Password manager

Question 313: A script is designed to save the results of user input from a survey to a database table. Which of the following database access methods is used to add the survey data to the table?

Query builder
User interface
Programmatic access
Direct access

Question 314: An end user clicks on a link from an email that redirects to a web page. Which of the following browser settings should be enabled to reduce the threat of malicious code being executed from the web page?

Private browsing
Script blocker
Cache clearing
Pop-up blocker

Question 315: An administrator wants to block application traffic on specific ports from entering into the local area network. Which of the following devices would be the BEST choice to perform this task?

Router
Firewall
Access point
Switch

Question 316: A customer recently purchased an item at a store using a mobile phone to make the payment. Which of the following technologies was MOST likely used to complete the purchase?

Wi-Fi
NFC
Hotspot
Bluetooth

Question 317: Which of the following is the MOST likely reason to use an array?

To flag a list of functions
To identify potential looping code
To define a list of objects
To describe the properties of a program

Question 318: A technician is tasked with installing a network device that allows for internet connection from the ISP but blocks all sites on the company's deny list. Which of the following devices is MOST likely used to complete this task?

IDS
Firewall
Router
IPS

Question 319: Which of the following is known to be the WEAKEST encryption standard?

WEP
WPA
TKIP
AES

Question 320: A company wants a solution with an easily searchable method of storing information and files associated with a customer. Which of the following should be used to implement this business case?

Flat file
Fileshare
Spreadsheet
Database

Question 321: Ann, a home user, purchases a wireless keyboard to use with a computer connected to a television. After installing batteries, plugging the USB receiver into a USB port on the computer, and successfully logging on, Ann notices some of the new keyboard's multimedia keys do not function. Which of the following steps is MOST likely needed to enable the missing keyboard functionality?

Utility installation
Hardware replacement
OS update
BIOS configuration

Question 322: Which of the following types of software would be the MOST appropriate for scheduling personnel and viewing activity progress?

Project management software
Spreadsheet software
Accounting software
Database software

Question 323: Which of the following would provide the BEST means of preventing data loss in the event of a disaster?

Off-site storage
Drive redundancy
Backup generator
File history

Question 324: A home user has recently purchased a new desktop computer. After following the prompts during setup and accepting all defaults, the user has noticed outbound network traffic. Which of the following is the MOST likely cause?

Group Policy objects are being implemented.
Applications are retrieving the latest security configuration changes.
The computer is mining cryptocurrency.
Pre-installed applications are reporting user information.

Question 325: A development team is brainstorming how a new program should operate. Which of the following techniques can be used to depict the program visually during brainstorming?

Pseudocode
Branching
Flowchart
Spreadsheet

Question 326: Data contained on which of the following would have the HIGHEST expectation of privacy?

Workstation
Mobile
Cloud
Laptop

Question 327: A user clicks a link to a web page to view a document, but nothing happens. Which of the following is MOST likely the issue?

Scripting is disabled.
Pop-up blockers are enabled.
The security settings are too high.
The web certificate is invalid.

Question 328: A user wants to use a workstation to view data ad hoc from a company database. Which of the following access methods would be BEST?

Command-line interface
Report builder
Programmatic
User interface

Question 329: Which of the following is typically used to lay out documents with images and text for the web?

Python
C++
JavaScript
HTML

Question 330: A non-profit organization obtains images from the internet to use on a website. Which of the following is the organization possibly infringing on?

Patent
Copyright
Trademark
DRM

Question 331: Which of the following is the number of bits contained in a byte?

16
8
4
1,024

Question 332: Which of the following should a software developer use to BEST prevent unauthorized reproduction of software?

Patent
Watermark
Copyright
Trademark

Question 333: Which of the following types of software is MOST likely to display a certificate error during normal usage?

Web browser
Accounting
Spreadsheet
Visual diagramming

Question 334: A programmer is designing an expert system that uses a series of closed-ended questions to arrive at specific output. Which of the following characteristics will MOST likely be used in the code for the expert system to achieve this?

Branching
Arrays
Vectors
Looping

Question 335: When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

GPU
RAM
SSD
CPU

Question 336: Which of the following CIA triad concerns is violated when known-good computer hard drives and printed documents are placed in the trash?

Availability
Confidentiality
Integrity

Question 337: S. Accounting

Question 338: Which of the following is part of identifying the solution when troubleshooting an issue?

Spotting symptoms
Duplicating the problem
Testing the theory
Gathering information
Determining if anything has changed

Question 339: After implementing a solution, which of the following should a technician do NEXT?

Verify system functionality.
Establish a new theory.
Document the findings.
Determine if anything has changed.

Question 340: The data set that is supporting an application utilizes commas to separate records. Which of the following describes the data set?

Flat file
Spreadsheet
Relational
NoSQL

Question 341: A user's mouse appears to be jumping around the screen. Which of the following will MOST likely to fix the issue?

Clean the mouse.
Use a different USB port.
Update the drivers.
Restart the computer.

Question 342: Which of the following characteristics describes MOST versions of RAM?

Programmable
Volatile
Cached
Read-only

Question 343: A programmer has been tasked to write the logic of a program without knowledge of the language to be used. Which of the following BEST describes how the programmer can accomplish this task?

Write pseudocode. c
Write a narrative.
Write a script.
Write a query.

Question 344: Which of the following is the BEST example of one-tier service architecture?

Online banking website
Database management system
Mobile photography application
Cloud management system

Question 345: Which of the following language types would MOST likely be used to display information in a web browser?

Assembly
Markup
Compiled
Scripting

Question 346: Ann, a user, wants to remove unnecessary software and services from her personal computer to make it more secure. This is an example of:

updating.
baselining.
patching.
hardening.

Question 347: A technician is installing a new application on laptops that will be installed in work trucks. The laptops do not have a network connection. Which of the following application delivery models would BEST fulfill this need?

Cloud-hosted
Locally installed
Local network-hosted
Three-tier

Question 348: A company has multiple users that need to modify the same document concurrently. Which of the following types of collaboration software would be BEST suited for this situation?

Web conference
Online workspace
Email client
Instant message

Question 349: Which of the following is MOST commonly used by Linux operating systems?

NTFS
HFS
FAT32
ext4

Question 350: An employee needs a visual aid to help demonstrate slides to a group. Which of the following would the employee MOTS likely select to help?

Word processing software
Spreadsheet software
Visual diagramming software
Presentation software

Question 351: Which of the following explains the key difference between an EULA and terms and conditions?

An EULA, upon acceptance, grants the user full copyright to the product and/or service.
Terms and conditions are not legally binding.
Terms and conditions clarify what services a company agrees to offer the user.
An EULA can only be accepted by an attorney.

Question 352: Which of the following is used to connect to a wireless access point?

NIC
SSD
GPU
USB

Question 353: Which of the following notational systems represents physical electrical impulses going into electronic and computing devices?

Binary
Decimal
Hexadecimal
ASCII

Question 354: A hotel guest is using the public computer to check travel plans. Which of the following is the BEST approach to prevent others from seeing what the guest was doing on the computer?

Restart the computer when done.
Log off the computer.
Use private browsing.
Enable pop-up blocker.

Question 355: Which of the following is an example of encrypted data in transit?

Compressing a file with a password
Encrypting a drive partition
Accessing a banking website
Validating a download with a checksum

Question 356: A user’s personal wireless network name includes the user’s last name. To make the wireless network less identifiable, which of the following would the user access to change the wireless network name to exclude?

SSID
WAP
WPA2
WEP

Question 357: A company has a reoccurring issue that involves users having antivirus browser extensions installed after updating to the latest version of the company’s antivirus software. Which of the following would prevent this issue?

Changing proxy settings
Disabling browser extensions
Clearing browser history
Disabling certificate verification

Question 358: A computer technician needs to keep track of the last three passwords any employee has used. Which of the following best practices would the technician MOST likely use?

Password manager
Password complexity
Password history
Password length

Question 359: Which of the following needs to be done for a line of code to call on a specific object that does not exist?

Define a variable.
Set up a loop.
Remove all constants.
Set up an array.

Question 360: Which of the following would be the MOST secure method to communicate information to a supervisor regarding a project’s status?

Personal email
Project distribution list
Company-provided instant messaging system
Text message

Question 361: Protection of a computer manufacturer’s laptop design would be considered an example of a:

patent.
trademark.
watermark.
copyright.

Question 362: A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is BEST suited to meet this need?

List
Flat file
Web page
Database

Question 363: Which of the following is the purpose of a GURU?

To cache CPU information
To speed up processor functions
To offer short-term memory storage
To increase video rendering speed

Question 364: Which of the following is the BEST approach when troubleshooting an issue and questioning a user?

Inform the customer about the things the customer did to cause the issue.
Quickly identity the issue and tell the customer immediately what to do.
Administratively take control of the customer's system to determine the underlying issue.
Ask clarifying questions and actively listen to the answers without interrupting.

Question 365: A user wants to create a link between two tables in a database. Which of the following is the user MOST likely to use?

Foreign key
Primary key
Constraint
Inde

Question 366: Which of the following explains why the default administrator password for a home wireless router should be changed?

To prevent data transmission encryption
To prevent social engineering attacks
To prevent unauthorized router configuration changes
To improve wireless signal strength

Question 367: Which of the following filesystems is MOST commonly found on a computer running macOS?

NTFS
FAT32
ext4
HFS

Question 368: Which of the following BEST describes the technology utilized in digital wallets?

Infrared
RFID
NFC
Bluetooth

Question 369: A company expects to gather increasingly large amounts of information, which need to be accessed quickly by employees. Which of the following is the MOST appropriate method to store the information?

Database
Spreadsheet
Flat file
Network shared folder

Question 370: A database administrator needs to add a record to an existing table. Which of the following statements would the administrator MOST likely use?

SELECT
UDATE
INSERT
DELETE

Question 371: Which of the following data types would BEST be used for conditional operators?

String
Char
Float
Boolean

Question 372: Which of the following contains reusable code?

Constant
Function
Variable
Array

Question 373: Which of the following is a programming language data type that contains a list of related values, such as colors?

Array
String
Float
Boolean

Question 374: Which of the following is the LARGEST storage capacity?

100TB
9,000GB
9,900MB
1PB

Question 375: A solution engineer has designed a new website for a company. The design calls for a separate web server and application server, which communicate with a back-end database. Which of the following is this an example of?

Two tier
Single tier
Four tier
Three tier

Question 376: A systems administrator wants to ensure users cannot change their passwords to ones they have used before. Which of the following password best practices should the administrator implement?

Password complexity
Password expiration
Password history
Password length

Question 377: Which of the following is BEST to do immediately after installing an OS on a new machine in order to mitigate OS vulnerabilities?

Enable the firewall.
Install patches.
Disable system users.
Install antivirus software.

Question 378: A consultant is designing a flowchart for a presentation. The flowchart uses red arrows to guide viewers to the next object. Which of the following represents the function being used?

Sequence
Exit strategy
Color-coding
Engagement

Question 379: Which of the following actions would a technician MOST likely perform FIRST when troubleshooting an issue?

Research errors that are known to result in the issue.
Gather information to clarify and duplicate the symptom.
Systematically evaluate common causes of the issue.
Apply known solutions that address the symptom.

Question 380: Which of the following is MOST often used to retrieve data from a relational database?

DELETE
IMPORT
ALTER
QUERY

Question 381: Which of the following is a characteristic of volatile storage?

It is the preferred method for archiving files.
It causes information to be lost if power is removed.
It can only be written once.
It is inherent in all solid-state components.

Question 382: In which of the following categories do smart devices belong?

Mobile devices
Appliances
IoT devices
Multifunction devices

Question 383: A programmer wants to use a programming language in which high performance is a requirement. Which of the following language types is the BEST option?

Interpreted language
Markup language
Scripting language
Compiled language

Question 384: A log entry indicating the deletion of a file by a user during a previous session is an example of data:

querying.
persistence.
exportation.
analysis.

Question 385: Which of the following operating system components would MOST likely be involved when an application needs to save data?

Memory management
Disk management
Process scheduler
Task scheduler

Question 386: A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is BEST for this requirement?

PIN
SSO
Multifactor authentication
Software token

Question 387: A user is having issues trying to reach a website. The technician asks questions of the user and then tries to open the same website on another device. Which of the following troubleshooting steps is the technician performing?

Finding the root cause
Gathering information
Establishing a plan of action
Duplicating the problem

Question 388: A technician is installing a printer on a Windows 10 workstation. The technician has connected the printer using a serial cable, and the printer is powered on. However, the printer does not appear in Devices and Printers. Which of the following actions will MOST likely resolve the issue and enable the printer to function?

Manually install the printer driver.
Turn the printer off and back on.
Enable Bluetooth on the printer.
Connect the printer using a USB cable.

Question 389: A user needs all of the data from a database, including the structure of the objects, the users, and the statistics. Which of the following is the BEST method to obtain this information?

A report
A dump
A script
A query

Question 390: Which of the following is the exact number of bytes in a gigabyte?

1,073,741,824 bytes
1,099,511,627,776 bytes
1,048,576 bytes
1,024 bytes

Question 391: Which of the following is an element of a NoSQL database?

Schema
Primary keys
Tables
Constraints
Delimiters

Question 392: Which of the following wireless technologies has the shortest transmission distance?

Wi-Fi
IR
NFC
Bluetooth

Question 393: A technician has been asked to install a video interface than can support both high bandwidth digital video and audio on a single cable. Which of the following should the technician use?

S-video
HDMI
DVI
DisplayPort
VGA

Question 394: Which of the following shows how many results are possible when evaluating Boolean data types?

Three
Five
Two
Four

Question 395: Which of the following is used to define what employees can do on company IT resources?

Service-level agreement
Standard operating procedures
Acceptable use policy
IT security manual

Question 396: A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following BEST describes the device the salesperson should suggest?

2.5Tbps
2.5GB
2.5MHz
2.5GHz

Question 397: Which of the following may be prevented by adding locks and video cameras to the refuse collection location?

Tailgating
Eavesdropping
Dumpster diving
Social engineering

Question 398: Which of the following language types is MOST likely used to retrieve data from a database?

Query language
Compiled language
Assembly language
Scripted language

Question 399: Which of the following would be BEST to use to form an internal network?

Hub
Router
Switch
Firewall

Question 400: Which of the following would be BEST to use to protect a network?

Firewall
Proxy server
Antivirus software
Anti-malware

Question 401: Which of the following protocols is used to download messages from an email server?

POP3
HTTPS
HTTP
IMAP

Question 402: A company wants to set up an application without needing to buy hardware. Which of the following would be the BEST solution?

Cloud-hosted
Local network-hosted
On-site-hosted
Locally installed

Question 403: A Chief Executive Officer (CEO) is concerned about protecting the company’s intellectual property from competitors. Which of the following will address the CEO’s concerns?

Copyright
Service-level agreement
Trade secrets
Memorandum of understanding

Question 404: A user from the accounting department received a call asking for hardware and software information. To which of the following is this user being exposed?

Whaling
Eavesdropping
Impersonation
Phishing

Question 405: Which of the following internet connection types is MOST affected by adverse weather, such as rain or snow?

Cellular
Cable
Fiber
DSL

Question 406: Which of the following is MOST likely managed directly by the operating system?

Email
Instant messaging
Database connections
Memory allocation

Question 407: An administrator is creating accounts based on departments within the company. Which of the following access models does this BEST represent?

Role-based access
Discretionary access
Non-discretionary access
Mandatory access

Question 408: Which of the following filesystems is compatible with the greatest number of operating systems?

ext4
FAT32
NTFS
HFS

Question 409: Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

All internet browsing is private and anonymous.
Only the attempts to access unapproved URLs are logged.
All internet usage is logged by a corporate server and may be monitored live.
Only the attempts to access sites that include prohibited keywords are logged.

Question 410: A user is trying to set up a new wireless access point. Which of the following should the user do first?

Enable the highest available wireless standard.
Enable WPA2 encryption.
Change the SSID to a unique name.
Change the default password.

Question 411: Which of the following are benefits of a security awareness training program? (Choose two.)

Increases the availability of computers
Lowers the incidence of hardware failures
Provides information on how to avoid phishing
Enhances overall security
Advances end users' technical skills
Creates IT security opportunities for end users

Question 412: A help desk technician loads a browser-based ticketing system, but when navigating to the queue, the technician realizes that another employee's queue is being accessed. Which of the following explains the issue?

The application is not compatible with the browser.
The proxy settings were misconfigured.
The browser was opened in private mode.
The previous user's session is cached.

Question 413: Which of the following would be the best reason to implement a host firewall?

To prevent wiretapping
To prevent hardware failures
To prevent the removal of software
To prevent external access

Question 414: Which of the following types of memory can retain its content after a system reboot?

DDR
ROM
RAM
DIMM

Question 415: Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Copyright
Patent
License
Trademark

Question 416: Which of the following scripting languages is most likely to be used in a Linux command-line environment?

PowerShell
JavaScript
C++
Bash

Question 417: Employees must use a badge to enter and exit the building. Each time the badge is used, a log entry is created and stored to record who has entered and exited the building. Which of the following best describes what the log entries provide?

Accounting
Authorization
Automation
Authentication

Question 418: Given this example: FEB8077911AB12TB

Question 419: Which of the following is being represented?

MAC address
Hexadecimal
Unicode
String

Question 420: Which of the following data types should a database administrator use to store customer postal codes?

String
Float
Integer
Boolean

Question 421: Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

Type 1 hypervisor
Disk optimizer
Anti-malware
Operating system

Question 422: A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

Script
Certificate
Proxy
Malware

Question 423: The output of a query in a relational database is most likely used to generate:

storage.
scalability.
a schema.
a report.

Question 424: The process of determining the source of an issue during troubleshooting is called:

triaging.
sourcing.
diagnosing.
researching.

Question 425: Which of the following is an example of a compiled language?

XML
C++
Python
SQL

Question 426: Which of the following describes the concept of a database record?

A collection of tables within different schemas
A collection of fields about the same object
A collection of schemas within the same database
A collection of rows, columns, and constraints

Question 427: Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

CPU
Motherboard
RAM
GPU

Question 428: Which of the following is the most secure filesystem?

FAT32
NFS
NTFS
exFAT

Question 429: Which of the following creates multifactor authentication when used with something you have?

Password
Hardware token
Single sign-on
Geolocation

Question 430: Which of the following database structures is the most granular?

Table
Record
Column
Field

Question 431: Which of the following internet service types is most susceptible to weather disruptions?

Cable
DSL
Fiber
Satellite

Question 432: Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

Thin client
Workstation
Cell phone
Laptop

Question 433: A business provides access to the internet for customers through a lobby kiosk. After customers check their personal webmail, which of the following actions should customers immediately take to prevent others front accessing their email accounts on the kiosk?

Change the webmail password.
Clear the browser cache.
Reset the browser's home page.
Restart the kiosk.

Question 434: A corporate network just implemented a 60-day password-warning banner. Which of the following is most likely going to happen in 60 days?

Password expiration
Password implementation
Password reset
Password reuse

Question 435: A small company lacks the resources to properly verify a user's identity when the user calls in for technical support. To which of the following is the company susceptible?

Snooping
Wiretapping
On-path attack
Social engineering

Question 436: Which of the following can a company use to protect its logo?

Copyright
Patent
Trademark
Domain name

Question 437: A company developed a new logo and wants to ensure no one else uses it, in order to prevent brand confusion. Which of the following will the company most likely seek?

Patent
Copyright
Watermark
Trademark

Question 438: A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

Local network-hosted
Cloud-hosted
Locally installed
Hybrid-installed

Question 439: Which of the following actions is most likely associated with database use?

Printing
Querying
Creating diagrams
File sharing

Question 440: Within a database, which of the following would be the best access method to use to display a subset of a table?

DROP
UPDATE
SELECT
INSERT

Question 441: A technician has verified full system functionality. Which of the following actions should the technician take next?

Determine if anything has changed.
Question the users.
Gather information.
Document the findings.

Question 442: Which of the following programming concepts uses properties and attributes?

Objects
Functions
Identifiers
Containers

Question 443: Which of the following connection types is typically used for a display monitor?

USS
RJ45
DVI
Bluetooth

Question 444: A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

Add a network router.
Replace the users' laptops with desktop computers.
Add an access point for the users.
Add a switch and hardwire the users' laptops.

Question 445: A programming construct that is most beneficial for organizing a program's data and behavior is:

a licensing agreement.
an object.
a constant.
a query.

Question 446: Which of the following protocols is used to relay email from a user's mail server?

FTP
POP3
IMAP
SMTP

Question 447: An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

Eavesdropping
On-path attack
Phishing attack
Social engineering

Question 448: Which of the following terms best describes the outcome of a text message that is encrypted from its original form?

Vector
Cipher
Plain
Algorithm

Question 449: A systems administrator is setting up an output device that supports both USB and network capability. Which of the following devices is the administrator most likely installing?

SSD
Camera
Printer
Scanner

Question 450: A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

Sorting
Looping
Branching
Pausing for input

Question 451: A technician travels to a data center to review specifications on a new project. Which of the following is the technician most likely to see pertaining to types of operating systems?

Embedded OS
Hypervisor OS
Mobile device OS
Workstation OS

Question 452: A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

Sequence
Array
Constant
Vector

Question 453: Which of the following categories describes commands used to extract information from a database?

DDL
DLL
DML
DDR

Question 454: Which of the following would be best to use to store a project task list that will be updated by multiple team members?

Conferencing software
Database software
Document sharing software
Visual diagramming software

Question 455: A user needs an interface that supports both video and data. Which of the following will meet this requirement?

VGA
FireWire
Thunderbolt
DVI

Question 456: An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

Patching the operating system
Setting a BIOS password
Installing a host-based firewall
Removing unnecessary software

Question 457: A technician has received multiple reports about a media player, which is located in a waiting room, turning on and off at various times of the day. The technician replaces the power adapter and turns the player back on. Which of the following should the technician do next?

Implement the solution.
Research the knowledge base.
Document the findings/lessons learned.
Verify there is full system functionality.

Question 458: Which of the following business continuity concepts is the best example of fault tolerance?

Redundant power
Restoring access
Data restoration
Disaster recovery

Question 459: Which of the following is an advantage of a flat file?

Portability
Multiple concurrent users
Variety of data
Scalability

Question 460: An application is hosted on a local network. Which of the following descriptions is correct?

Internet access is required.
Files are saved in the cloud.
The application exists locally.
LAN access is required.

Question 461: Which of the following storage types uses platters to store data?

Hard drive
Optical drive
Solid-state drive
Flash drive

Question 462: A user inserts a USB flash drive into a computer for the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Web-based
Driver installation
IP-based
Plug-and-play

Question 463: Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

Site licensing
Single-use licensing
Product key licensing
Open-source licensing

Question 464: Which of the following best explains the reason for password expiration?

To invalidate any compromised passwords
To disable unused user IDs
To enforce new password complexity rules
To discourage writing down passwords

Question 465: Which of the following interfaces would provide the best visual performance?

HDMI
USB-C
VGA
DVI

Question 466: A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

Spreadsheet
Text editor
Visual diagramming
Word processing

Question 467: Which of the following is the slowest processing speed?

4Mbps
5000Kbps
2.6GHz
3.4MHz

Question 468: A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely. Which of the following is the most likely cause?

Firewall settings
Misconfigured access point
Improper switch configuration
Incorrect IP address

Question 469: An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Hardware failure
Social engineering
Denial of service
On-path attack

Question 470: A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?

External hard drive
Scanner
Mouse
Mobile phone

Question 471: Which of the following file types has an RTF extension?

Spreadsheet
Audio
Executable
Document

Question 472: A user wants to minimize the risk of identity theft when making a purchase from the internet on a non-private computer. Which of the following browser options will most likely address this need?

Use of a proxy server
Private browsing
Clearing browser cache
Script blocker extension

Question 473: Which of the following file extensions is used for a consolidated group of files?

.rtf
.avi
.rar
.bat

Question 474: Which of the following is required to view videos stored on a DVD?

Solid-state drive
Optical drive
Hard drive
Flash drive

Question 475: A database administrator needs to add a column to an existing table? Which of the following statements should the administrator use?

CREATE
UPDATE
DROP
ALTER

Question 476: An employee is on an elevator, and a stranger asks where the employee works and who the network administrator is. This is an example of:

dumpster diving
eavesdropping
on-path attack
social engineering

Question 477: A network technician is installing an RJ11 connector inside a home for new internet service. Which of the following network connection types is the technician most likely using?

Fiber
Satellite
DSL
Cable

Question 478: An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?

Server OS
Workstation OS
Embedded OS
Type 1 hypervisor OS

Question 479: Which of the following best describes when to use an array?

The user needs the object to store one value and to be changeable
The user needs the object to store one value permanently.
The user needs to store multiple values in one object
The user needs one object to store numbers only.

Question 480: A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

Concurrency
Scalability
Speed
Variety

Question 481: A technician is running two Wi-Fi networks. Both of the networks have the same network name, but they have different channels and different frequencies. During testing, the connection becomes intermittent. Which of the following should the technician do to obtain a stable connection?

Disable the network broadcast.
Update the Wi-Fi passwords.
Change the SSID.
Disable the captive portal

Question 482: Which of the following is a query language?

Python
SQL
HTML
C++

Question 483: A small videography business is requesting an internet connection that provides flexibility and is immune to electromagnetic interference over long distances. Which of the following is best suited for this situation?

Fiber optic
Cable
Cellular
Satellite

Question 484: Which of the following notational systems uses the most characters to represent the decimal number 10?

Decimal
Octal
Hexadecimal
Binary

Question 485: A company wants a group of networking professionals to have access to the server but must ensure that access is granted only to authorized users. Which of the following is best suited to ensure authorization and accounting? (Choose two.)

Video
Logs
Digital signature
Multifactor authentication
Internet browsing history
Permissions

Question 486: Privacy expectations on a company intranet should be limited to:

precedents.
HR policy.
word of mouth.
system usage agreements.

Question 487: Which of the following would be the most effective use of a database?

To keep a list of vendors to call daily
To list basic employee information for distribution
To automate input of financial transactions and run daily reports
To store visitor information at each location

Question 488: A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

Driver-based
Server-based
Plug-and-play
Web-based

Question 489: A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

Bluetooth
Wi-Fi
NFC
IR

Question 490: A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?

Web server
File
Database
Operating system

Question 491: Which of the following programming languages would most likely include tables and the SELECT command?

Compiled
Scripting
Query
Markup

Question 492: A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?

Variable
Vector
Array
Constant

Question 493: Which of the following is the smallest unit of measurement?

TB
Byte
KB
Bit

Question 494: Which of the following is something found on a laptop but not on a tablet?

Wired Ethernet connection
Local storage
Keyboard
Display

Question 495: Which of the following is most appropriate to list on a social media site about an employer?

Contract
Work email
Hire date
Customers served
Job title

Question 496: A user is having trouble accessing an application. Which of the following should a help desk analyst do first?

Check the user’s permissions to ensure the user has access.
Reset the user’s credentials for the application.
Determine whether the trouble is an access or a network issue.
Document the solution and notify the user.

Question 497: A flatbed scanner that is connected a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Laptop hard drive
Photographic prints
Flatbed scanner
Color printer
Laptop keyboard

Question 498: Which of the following actions takes place during the problem identification phase?

Establishing a theory of probable cause
Duplicating the issue
Documenting the findings
Questioning the obvious

Question 499: Which of the following software types is best suited to create a table and graph using an existing data set?

Visual diagramming
Presentation
Spreadsheet
Word processing

Question 500: Which of the following best protects data in transit?

VPN connection
Backup tapes
Encrypted flash drive
FTP

Question 501: A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

2.4GHz
802.11g
5GHz
802.11b

Question 502: A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

Firewalls are not configured
Online gaming activity
Unnecessary OEM software
Lack of antivirus present

Question 503: When working with storage, 1,000,000MB can also be notated as:

10,000,000KB.
100GB
1TB.
0.01PB.

Question 504: Which of the following database types would be best in which to place financial data?

Semi-structured
Structured
Unstructured
Spreadsheet

Question 505: Which of the following is the greatest benefit of using a cloud-hosted solution?

Multiple users can have simultaneous access.
The solution has the lowest cost.
The fastest data transfer rate can be achieved.
Data can be accessed from anywhere.

Question 506: Which of the following is a procedure to uninstall unwanted or suspicious software?

Deleting the software using Control Panel and features
Deleting the icon from the desktop
Deleting the folder from program files
Deleting the software folder using File Explorer

Question 507: Which of the following interfaces is best for viewing database performance information?

Programmatic
Direct
Utility
Query

Question 508: Which of the following defines a reusable value that can be reassigned?

Method
Function
Variable
Constant

Question 509: Which of the following will best ensure a workstation is protected against attacks over unused ports?

Implement IDS.
Configure a firewall
Install an antivirus.
Disable USB.

Question 510: Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?

NIC
CPU
GPU
RAM

Question 511: Which of the following is secure?

FTP
HTTPS
.org
FAT32
.edu

Question 512: Which of the following best describes the differences between data and information?

Information can exist without data.
Data can be facts, figures, or events that can be processed to create information.
Information is raw unstructured or uncorrelated data.
Data is a result of the analytical processing of information.

Question 513: Which of the following components is most likely to have a dedicated, active cooling method to prevent it from overheating during operation?

Network interface card
Hard drive
Processor
Memory

Question 514: Which of the following would be the most cost-effective method to increase availability?

Scheduled maintenance
Redundant equipment
Disaster recovery site
Continuity plan

Question 515: A hacker was able to obtain a user’s password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?

Avoid password reuse.
Use a complex password.
Delete the tracking cookies.
Clear the browser cache.

Question 516: Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

Internet Options
Network and Sharing Center
Programs and Features
System