ITProTV Study Flashcards
What would you use to Describe an OBJECT?
Constants
Attributes
Properties
Methods
Attributes
Methods define a PROCEDURE.
Properties are Components or Subtypes of an Object
Constants work like Variables except the Value Stored is CONSTANT, does not change.
What type of language would you use to write a Device Driver to Linux?
Scripting
Query
Scripted
Assembly
Assembly
Which of the following is an example of a Company’s Assets, but is NOT intellectual property?
Trademarks
Copyrights
Customer Lists
Patents
Customer Lists
Where would you have the Opportunity to Encrypt data at REST? (Choose All that Apply)
VPN
File-Level Data
Data Stored on Mobile Device
Data Stored at Disk Level
File-Level Data
Data Stored on Mobile Device
Data Stored at Disk Level
REST is data stored at DISK Level, also known as FDE (Full Disk Encryption)
Select, Insert, Delete, Update are Members of WHICH of the following Relational Methods?
Data Manipulation
Data Definition
Constraints
Database Access
Data Manipulation
Microsoft Access is which of the following Database Access Methods?
User Interface/Utility Access
Direct/Manual Access
Programmatic Access
Query/Report Builder
User Access/Utility Access
Which of the following represents an ALL Encompassing approach to Business Continuity?
Replication
Disaster Recovery
Backup Considerations
Redundancy
Disaster Recover
You are concerned about browser security in your organization. You want to ensure the JavaScript is Blocked from All Websites. What would you Implement?
Check for Valid Certificate
Enable Pop Up Blockers
Deactivate Client Side Scripting
Clear the Cache
Deactivate Client-Side Scripting
Successful Troubleshooting Requires the following Ordered and Systematic Approach?
- Identify
- Research
- Establish a Theory
- Test the Theory
- Establish an Action Plan
- Implement the Solution
- Verify System Functionality
- Document the Findings/Lessons Learned
The number 65 is a value. It may mean a Score on an Exam, the Distance in Kilometers to the Next City on a Highway, or the American Society for Computer Information ASCII Value for the Capital Letter A. In this Instance, how would you characterize the number 65?
The Number 65 is Data
The Number 65 is a Float
The Number 65 is Information
The Number 65 has Context
The Number 65 is DATA
Which of the following is NOT part of the Data Definition Language?
DROP
DELETE
CREATE
ALTER
DELETE
DELETE is Data Manipulation
ALTER is used to add a Column, Delete a Column, or Modify a Column
DROP is used to Remove a Table or Delete an entire DB.
CREATE is used to Create a Table or DB
Which of the following is an IP Address? (Choose ALL that Apply)
www.google.com
C8-D3-FF-DD-4B-C1
192.168.0.1
2001:0db8:85a3:0000:0000:8a2e:03070:7334
- 168.0.1
2001: 0db8:85a3:0000:0000:8a2e:03070:7334
Which is the Purpose of ODBC?
Export/Import
Backup
Database Dump
Permissions
Export/Import
ODBC is used to Import/Export allowing the user to transfer data between many different formats.
You are calculating the GrossPay amount by multiplaying the HoursWorked field X the HourlyRate field. Which data type would you use for the GrossPay, HoursWorked, and HourlyRate?
ASCII
Boolean
Float
Integer
Float
Which of these is a Valid HEXADECIMAL number?
E8
H4
0001
11.5
E8 (1-9 and A-F)
H4 is NOT because it contains the Digit H.
0001 is NOT because it’s Binary
11.5 is NOT because it’s a Float/Decimal.
Of which data storage programming concept are arrays and vectors examples of?
Properties
Containers
Methods
Objects
Containers
Arrays are MULTI-Dimensional Containers
Vectors are one column or one row IN an Array
Properties/Attributes/Methods are all associated with OBJECTS
Which of the following is NON-Repudiation Concept?
Video
Security Questions
Mandatory Access Controls
Password
Video can’t be Repudiated.
Which of the following is an interpreted programming language? (Choose Two)
HTML
JavaScript
SQL
C++
HTML
JavaScript
Which of these is NOT correct when comparing a plain text VS cipher text?
Plain Text is written in the user’s native language.
Plain Text uses a key to scramble the message to cipher text
Cipher Text uses a key to scramble a message to plain text.
Cipher text uses a key to unscramble a message to plain text.
Which of these is NOT CORRECT:
Cipher Text uses a key to scramble a message to Plain Text.
Which of the following file systems supports Compression? (Choose Two)
FAT32
NTFS
EXT4
HFS+
NTFS
HFS+
Screen locks, whitelists, and blacklists can raise your expectation of privacy when using which of the following?
Mobile Applications
Business Software
Desktop Software
Instant Messaging
Desktop Software
Which of the following allows Windows to translate commands to a device?
Drivers
Services
Processes
Utilities
Drivers
You have just purchased wireless security camera that allows you to view activity from anywhere over your smartphone. What is the proper installation sequence?
Connect the Device to a Wired or Wireless Network
Verify Network Connectivity
Verify Internet Connectivity
Verify that the device can be managed over its Internet Connection
When sending an email, what portions of the email transmission MUST be Public? (Choose All that Apply)
The Body of the Email
An Attachment
The “FROM” Address
The “TO” Address
The “FROM” Address
The “TO” Address