ITProTV Study Flashcards

1
Q

What would you use to Describe an OBJECT?

Constants
Attributes
Properties
Methods

A

Attributes

Methods define a PROCEDURE.
Properties are Components or Subtypes of an Object
Constants work like Variables except the Value Stored is CONSTANT, does not change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of language would you use to write a Device Driver to Linux?

Scripting
Query
Scripted
Assembly

A

Assembly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an example of a Company’s Assets, but is NOT intellectual property?

Trademarks
Copyrights
Customer Lists
Patents

A

Customer Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where would you have the Opportunity to Encrypt data at REST? (Choose All that Apply)

VPN
File-Level Data
Data Stored on Mobile Device
Data Stored at Disk Level

A

File-Level Data
Data Stored on Mobile Device
Data Stored at Disk Level

REST is data stored at DISK Level, also known as FDE (Full Disk Encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Select, Insert, Delete, Update are Members of WHICH of the following Relational Methods?

Data Manipulation
Data Definition
Constraints
Database Access

A

Data Manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Microsoft Access is which of the following Database Access Methods?

User Interface/Utility Access
Direct/Manual Access
Programmatic Access
Query/Report Builder

A

User Access/Utility Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following represents an ALL Encompassing approach to Business Continuity?

Replication
Disaster Recovery
Backup Considerations
Redundancy

A

Disaster Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are concerned about browser security in your organization. You want to ensure the JavaScript is Blocked from All Websites. What would you Implement?

Check for Valid Certificate
Enable Pop Up Blockers
Deactivate Client Side Scripting
Clear the Cache

A

Deactivate Client-Side Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Successful Troubleshooting Requires the following Ordered and Systematic Approach?

A
  1. Identify
  2. Research
  3. Establish a Theory
  4. Test the Theory
  5. Establish an Action Plan
  6. Implement the Solution
  7. Verify System Functionality
  8. Document the Findings/Lessons Learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The number 65 is a value. It may mean a Score on an Exam, the Distance in Kilometers to the Next City on a Highway, or the American Society for Computer Information ASCII Value for the Capital Letter A. In this Instance, how would you characterize the number 65?

The Number 65 is Data
The Number 65 is a Float
The Number 65 is Information
The Number 65 has Context

A

The Number 65 is DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT part of the Data Definition Language?

DROP
DELETE
CREATE
ALTER

A

DELETE

DELETE is Data Manipulation
ALTER is used to add a Column, Delete a Column, or Modify a Column
DROP is used to Remove a Table or Delete an entire DB.
CREATE is used to Create a Table or DB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an IP Address? (Choose ALL that Apply)

www.google.com
C8-D3-FF-DD-4B-C1
192.168.0.1
2001:0db8:85a3:0000:0000:8a2e:03070:7334

A
  1. 168.0.1

2001: 0db8:85a3:0000:0000:8a2e:03070:7334

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is the Purpose of ODBC?

Export/Import
Backup
Database Dump
Permissions

A

Export/Import

ODBC is used to Import/Export allowing the user to transfer data between many different formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are calculating the GrossPay amount by multiplaying the HoursWorked field X the HourlyRate field. Which data type would you use for the GrossPay, HoursWorked, and HourlyRate?

ASCII
Boolean
Float
Integer

A

Float

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these is a Valid HEXADECIMAL number?

E8
H4
0001
11.5

A

E8 (1-9 and A-F)

H4 is NOT because it contains the Digit H.
0001 is NOT because it’s Binary
11.5 is NOT because it’s a Float/Decimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Of which data storage programming concept are arrays and vectors examples of?

Properties
Containers
Methods
Objects

A

Containers

Arrays are MULTI-Dimensional Containers
Vectors are one column or one row IN an Array
Properties/Attributes/Methods are all associated with OBJECTS

17
Q

Which of the following is NON-Repudiation Concept?

Video
Security Questions
Mandatory Access Controls
Password

A

Video can’t be Repudiated.

18
Q

Which of the following is an interpreted programming language? (Choose Two)

HTML
JavaScript
SQL
C++

A

HTML

JavaScript

19
Q

Which of these is NOT correct when comparing a plain text VS cipher text?

Plain Text is written in the user’s native language.
Plain Text uses a key to scramble the message to cipher text
Cipher Text uses a key to scramble a message to plain text.
Cipher text uses a key to unscramble a message to plain text.

A

Which of these is NOT CORRECT:

Cipher Text uses a key to scramble a message to Plain Text.

20
Q

Which of the following file systems supports Compression? (Choose Two)

FAT32
NTFS
EXT4
HFS+

A

NTFS

HFS+

21
Q

Screen locks, whitelists, and blacklists can raise your expectation of privacy when using which of the following?

Mobile Applications
Business Software
Desktop Software
Instant Messaging

A

Desktop Software

22
Q

Which of the following allows Windows to translate commands to a device?

Drivers
Services
Processes
Utilities

A

Drivers

23
Q

You have just purchased wireless security camera that allows you to view activity from anywhere over your smartphone. What is the proper installation sequence?

A

Connect the Device to a Wired or Wireless Network
Verify Network Connectivity
Verify Internet Connectivity
Verify that the device can be managed over its Internet Connection

24
Q

When sending an email, what portions of the email transmission MUST be Public? (Choose All that Apply)

The Body of the Email
An Attachment
The “FROM” Address
The “TO” Address

A

The “FROM” Address

The “TO” Address

25
Q

You have encountered an application that will NOT open in a user’s browser. What should you check? (Choose Three)

Is the Application approved for that Browser and Version?
Is Client-Side Scripting Enabled?
Is the Script Blocker Enabled?
Is the Browser Version the most recent?

A

Is the Application approved for that Browser and Version?
Is the Script Blocker Enabled?
Is the Browser Version the most recent?

26
Q

In Programming, which of the following are considered IDENTIFIERS? (Choose Two)

Arrays
Constants
Attributes
Variables

A

Constants

Variables

27
Q

What would you use if you wanted to assign a Special Rule to a column or group of Columns?

ConstRAINT
Row
Field
Attribute

A

ConstRAINT

28
Q

Phishing is a Type of Social Engineering. Which part of the CIA Triad addresses Social Engineering?

Accountability
Integrity
Availability
Confidentiality

A

Confidentiality

Integrity = Man-in-the-Middle Attacks, Replay Attacks, Impersonation Attacks, and Unauthorized Information Alteration.
Availability = Concerns include Denial of Service, Power Outage, Hardware Failure, Destruction, and Service Outage.
29
Q

Which of the following are types of NON-Relational Databases? (Choose ALL that Apply)

Key/Value Database
Parent Table
Document Database
Child Table

A

Key/Value Database

Document Database

30
Q

Along with Trademarks, which of the Following are Considered a Company’s Intellectual Property and are typically protected against unauthorized use? (Choose ALL that Apply)

Copyrights
Patents
Customer Lists
Trade Secrets

A

Copyrights

Patents

31
Q

Which of the following is NOT associated with a Primary Key in a Relational Database?

The Primary Key is Optional
It must have a value.
Only one Primary Key per table is allowed.
It must be Unique.

A

Which of the following is NOT:

The Primary Key is Optional

32
Q

Which of the following is NOT used for Data Definition?

SELECT
DROP
ALTER
CREATE

A

SELECT = Data Manipulation (DELETE, UPDATE, INSERT)

DROP, ALTER, CREATE are Data/Table/DB Definition

33
Q

Which of the following is NOT a Valid IPv4 Address?

  1. 7.15.38
  2. 168.0.0
  3. 258.3.100
  4. 168.1.100
A

192.258.3.100

Valid number ranges for each octet from 0 to 255.

34
Q

Which of the following Allows you to have Sever Types of the Same Thing, Different ways to Describe them, and Various Activities that are Associated with them?

Objects
Functions
Identifiers
Containers

A

Objects

Properties are Components or Subtypes of an Object
Attributes are what are used to Describe Properties of an Object or the Object itself.
Methods define a Procedure of what an Object can do.
Identifiers include Variables and Constants

35
Q

Which of the following is NOT Characterized as a Confidentiality Concern?

Social Engineering
Snooping
Man-in-the-Middle
Wiretapping

A

Man-in-the-Middle = Integrity Concern, occur when an unauthorized person intercepts a message on it’s way to it’s destination.

Snooping is equivalent of looking over someone’s shoulder to see what is happening.
Wiretapping is the interception and possibly covert recording of telephone, wireless, or network traffic.
Social Engineering is the art of pretending to be someone or something else to get people to trust you.
Other Confidentiality Concerns are Eavesdropping and Dumpster Diving.

36
Q

What are your options for Local Network Storage types? (Choose ALL that Apply)

RAM
NAS
File Server
USB

A

NAS
File Server

“NETWORK” being the Key Word here……..

37
Q

Which of the following is an example of Single-Platform Software?

GIMP
CorelDraw
Microsoft 365
Adobe Creative Cloud

A

CorelDraw

38
Q

Which of the following are INTEGRITY concerns? (Choose Three)

Impersonation
Dumpster Diving
Unauthorized Information Alteration
Replay Attack

A

Impersonation
Unauthorized Information Alteration
Replay Attack - A type of Man-in-the-Middle Attack.