ITProTV Study Flashcards
What would you use to Describe an OBJECT?
Constants
Attributes
Properties
Methods
Attributes
Methods define a PROCEDURE.
Properties are Components or Subtypes of an Object
Constants work like Variables except the Value Stored is CONSTANT, does not change.
What type of language would you use to write a Device Driver to Linux?
Scripting
Query
Scripted
Assembly
Assembly
Which of the following is an example of a Company’s Assets, but is NOT intellectual property?
Trademarks
Copyrights
Customer Lists
Patents
Customer Lists
Where would you have the Opportunity to Encrypt data at REST? (Choose All that Apply)
VPN
File-Level Data
Data Stored on Mobile Device
Data Stored at Disk Level
File-Level Data
Data Stored on Mobile Device
Data Stored at Disk Level
REST is data stored at DISK Level, also known as FDE (Full Disk Encryption)
Select, Insert, Delete, Update are Members of WHICH of the following Relational Methods?
Data Manipulation
Data Definition
Constraints
Database Access
Data Manipulation
Microsoft Access is which of the following Database Access Methods?
User Interface/Utility Access
Direct/Manual Access
Programmatic Access
Query/Report Builder
User Access/Utility Access
Which of the following represents an ALL Encompassing approach to Business Continuity?
Replication
Disaster Recovery
Backup Considerations
Redundancy
Disaster Recover
You are concerned about browser security in your organization. You want to ensure the JavaScript is Blocked from All Websites. What would you Implement?
Check for Valid Certificate
Enable Pop Up Blockers
Deactivate Client Side Scripting
Clear the Cache
Deactivate Client-Side Scripting
Successful Troubleshooting Requires the following Ordered and Systematic Approach?
- Identify
- Research
- Establish a Theory
- Test the Theory
- Establish an Action Plan
- Implement the Solution
- Verify System Functionality
- Document the Findings/Lessons Learned
The number 65 is a value. It may mean a Score on an Exam, the Distance in Kilometers to the Next City on a Highway, or the American Society for Computer Information ASCII Value for the Capital Letter A. In this Instance, how would you characterize the number 65?
The Number 65 is Data
The Number 65 is a Float
The Number 65 is Information
The Number 65 has Context
The Number 65 is DATA
Which of the following is NOT part of the Data Definition Language?
DROP
DELETE
CREATE
ALTER
DELETE
DELETE is Data Manipulation
ALTER is used to add a Column, Delete a Column, or Modify a Column
DROP is used to Remove a Table or Delete an entire DB.
CREATE is used to Create a Table or DB
Which of the following is an IP Address? (Choose ALL that Apply)
www.google.com
C8-D3-FF-DD-4B-C1
192.168.0.1
2001:0db8:85a3:0000:0000:8a2e:03070:7334
- 168.0.1
2001: 0db8:85a3:0000:0000:8a2e:03070:7334
Which is the Purpose of ODBC?
Export/Import
Backup
Database Dump
Permissions
Export/Import
ODBC is used to Import/Export allowing the user to transfer data between many different formats.
You are calculating the GrossPay amount by multiplaying the HoursWorked field X the HourlyRate field. Which data type would you use for the GrossPay, HoursWorked, and HourlyRate?
ASCII
Boolean
Float
Integer
Float
Which of these is a Valid HEXADECIMAL number?
E8
H4
0001
11.5
E8 (1-9 and A-F)
H4 is NOT because it contains the Digit H.
0001 is NOT because it’s Binary
11.5 is NOT because it’s a Float/Decimal.
Of which data storage programming concept are arrays and vectors examples of?
Properties
Containers
Methods
Objects
Containers
Arrays are MULTI-Dimensional Containers
Vectors are one column or one row IN an Array
Properties/Attributes/Methods are all associated with OBJECTS
Which of the following is NON-Repudiation Concept?
Video
Security Questions
Mandatory Access Controls
Password
Video can’t be Repudiated.
Which of the following is an interpreted programming language? (Choose Two)
HTML
JavaScript
SQL
C++
HTML
JavaScript
Which of these is NOT correct when comparing a plain text VS cipher text?
Plain Text is written in the user’s native language.
Plain Text uses a key to scramble the message to cipher text
Cipher Text uses a key to scramble a message to plain text.
Cipher text uses a key to unscramble a message to plain text.
Which of these is NOT CORRECT:
Cipher Text uses a key to scramble a message to Plain Text.
Which of the following file systems supports Compression? (Choose Two)
FAT32
NTFS
EXT4
HFS+
NTFS
HFS+
Screen locks, whitelists, and blacklists can raise your expectation of privacy when using which of the following?
Mobile Applications
Business Software
Desktop Software
Instant Messaging
Desktop Software
Which of the following allows Windows to translate commands to a device?
Drivers
Services
Processes
Utilities
Drivers
You have just purchased wireless security camera that allows you to view activity from anywhere over your smartphone. What is the proper installation sequence?
Connect the Device to a Wired or Wireless Network
Verify Network Connectivity
Verify Internet Connectivity
Verify that the device can be managed over its Internet Connection
When sending an email, what portions of the email transmission MUST be Public? (Choose All that Apply)
The Body of the Email
An Attachment
The “FROM” Address
The “TO” Address
The “FROM” Address
The “TO” Address
You have encountered an application that will NOT open in a user’s browser. What should you check? (Choose Three)
Is the Application approved for that Browser and Version?
Is Client-Side Scripting Enabled?
Is the Script Blocker Enabled?
Is the Browser Version the most recent?
Is the Application approved for that Browser and Version?
Is the Script Blocker Enabled?
Is the Browser Version the most recent?
In Programming, which of the following are considered IDENTIFIERS? (Choose Two)
Arrays
Constants
Attributes
Variables
Constants
Variables
What would you use if you wanted to assign a Special Rule to a column or group of Columns?
ConstRAINT
Row
Field
Attribute
ConstRAINT
Phishing is a Type of Social Engineering. Which part of the CIA Triad addresses Social Engineering?
Accountability
Integrity
Availability
Confidentiality
Confidentiality
Integrity = Man-in-the-Middle Attacks, Replay Attacks, Impersonation Attacks, and Unauthorized Information Alteration. Availability = Concerns include Denial of Service, Power Outage, Hardware Failure, Destruction, and Service Outage.
Which of the following are types of NON-Relational Databases? (Choose ALL that Apply)
Key/Value Database
Parent Table
Document Database
Child Table
Key/Value Database
Document Database
Along with Trademarks, which of the Following are Considered a Company’s Intellectual Property and are typically protected against unauthorized use? (Choose ALL that Apply)
Copyrights
Patents
Customer Lists
Trade Secrets
Copyrights
Patents
Which of the following is NOT associated with a Primary Key in a Relational Database?
The Primary Key is Optional
It must have a value.
Only one Primary Key per table is allowed.
It must be Unique.
Which of the following is NOT:
The Primary Key is Optional
Which of the following is NOT used for Data Definition?
SELECT
DROP
ALTER
CREATE
SELECT = Data Manipulation (DELETE, UPDATE, INSERT)
DROP, ALTER, CREATE are Data/Table/DB Definition
Which of the following is NOT a Valid IPv4 Address?
- 7.15.38
- 168.0.0
- 258.3.100
- 168.1.100
192.258.3.100
Valid number ranges for each octet from 0 to 255.
Which of the following Allows you to have Sever Types of the Same Thing, Different ways to Describe them, and Various Activities that are Associated with them?
Objects
Functions
Identifiers
Containers
Objects
Properties are Components or Subtypes of an Object
Attributes are what are used to Describe Properties of an Object or the Object itself.
Methods define a Procedure of what an Object can do.
Identifiers include Variables and Constants
Which of the following is NOT Characterized as a Confidentiality Concern?
Social Engineering
Snooping
Man-in-the-Middle
Wiretapping
Man-in-the-Middle = Integrity Concern, occur when an unauthorized person intercepts a message on it’s way to it’s destination.
Snooping is equivalent of looking over someone’s shoulder to see what is happening.
Wiretapping is the interception and possibly covert recording of telephone, wireless, or network traffic.
Social Engineering is the art of pretending to be someone or something else to get people to trust you.
Other Confidentiality Concerns are Eavesdropping and Dumpster Diving.
What are your options for Local Network Storage types? (Choose ALL that Apply)
RAM
NAS
File Server
USB
NAS
File Server
“NETWORK” being the Key Word here……..
Which of the following is an example of Single-Platform Software?
GIMP
CorelDraw
Microsoft 365
Adobe Creative Cloud
CorelDraw
Which of the following are INTEGRITY concerns? (Choose Three)
Impersonation
Dumpster Diving
Unauthorized Information Alteration
Replay Attack
Impersonation
Unauthorized Information Alteration
Replay Attack - A type of Man-in-the-Middle Attack.