Overview Flashcards
A technician overhears a systems administrator mention the term IOPS
. To which of the following operating system functions would the term BEST apply?
A- Disk Management
B- Process Management
C- Application Management
D- Service Management
A-
The term “IOPS” (Input/Output Operations Per Second) is typically associated with disk management. It refers to the measurement of the number of input and output operations that a storage device (such as a hard disk drive or solid-state drive) can perform in one second. Understanding IOPS is essential for assessing the performance and efficiency of storage devices and ensuring that they can handle the required workload for specific applications and processes.
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
A- Array
B- Vector
C- List
D- String
A- Array
Container can be used as a term for a special type of identifier that can reference multiple values (or elements). One example of a container construct is a simple array. For example, say that you want your program to store a list of user names who have logged on to the computer in the last 24 hours. You would declare the array with the data type of the values it will contain and the number of elements or “rows” that the array can contain:
declare Logons(9) as string
One of the limitations of the array container type is that it cannot be resized. Most programming languages support container types called vectors that can grow or shrink in size as elements are added or removed
Which of the following would MOST likely use an ARM processor?
A- Tablet
B- Laptop
C- Workstation
D- Server
A- Tablet
ARM processors are commonly used in tablets and smartphones due to their power efficiency and suitability for mobile devices. They are designed to consume less energy while providing good performance, making them ideal for portable devices like tablets. Laptops, workstations, and servers, on the other hand, often use different types of processors, such as x86 processors, which are better suited for higher performance computing tasks.
Which of the following would indicate the FASTEST processor speed?
A- 3.6 GHz
B- 3.6 MHz
C- 3.6 Mbps
D- 3.6 Gbps
A- 3.6 GHz
Among the options provided, “3.6GHz” indicates the fastest processor speed. The unit “GHz” stands for gigahertz, which represents one billion cycles per second. Higher gigahertz values indicate a faster processor speed, meaning it can handle more instructions and computations in a given amount of time.
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
A- Cable modem
B- Wireless Router
C- Access point
D- Network switch
B- Wireless router
A user is most likely to configure a wireless router to allow inbound connectivity for a gaming console’s chat functions on a home network. Wireless routers are equipped with Network Address Translation (NAT) capabilities, which allow devices connected to the local network to communicate with the internet while also providing a level of security by hiding their private IP addresses. By configuring the wireless router to allow inbound connections for the gaming console, the chat functions can work smoothly by allowing external communication to reach the console within the home network.
The computer language that is closest to machine code is:
A- query language
B- scripting language
C- markup language
D- assembly language
D- assembly language
Assembly language is the computer language that is closest to machine code. It is a low-level programming language that uses mnemonics and symbols to represent the individual machine instructions of a specific computer architecture. Each assembly language instruction directly corresponds to a machine instruction, making it easier for programmers to write code that interacts directly with the hardware and perform specific tasks at a low level. Although assembly language is more human-readable compared to machine code, it is still closely tied to the underlying hardware and provides a level of abstraction above machine code.
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
A- Record
B- Report
C- Column
D- Procedure
A- Record
In a database, all of an employee’s information is typically stored in a “record.” A record is a collection of related data fields that are grouped together to represent a single entity, in this case, an individual employee. Each record in the database would contain various data fields, such as the employee’s name, ID, position, department, and other relevant information.
Which of the following filesystems would a Linux computer MOST likely use?
A- HFS
B- NTFS
C- FAT32
D- ext4
D- ext4
A Linux computer would most likely use the ext4 (fourth extended filesystem) filesystem. ext4 is the default and widely used filesystem for Linux distributions. It is a journaling filesystem that provides improved performance, scalability, and reliability over its predecessor, ext3. It offers features suitable for modern Linux systems and is well-supported across various distributions, making it the preferred choice for most Linux installations.
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
A- Local application
B- Intranet application
C- Extranet application
D- Internet application
B- Intranet application
An intranet application is a type of application that is accessible within a private network, typically within an organization or company. In this scenario, the employee portal is only accessible to employees when they are at work because it is hosted on the company’s intranet. It is not accessible from outside the company’s network, meaning employees cannot connect to it from home without a VPN (Virtual Private Network) connection.
Which of the following storage types is MOST vulnerable to magnetic damage?
A- Flash
B- Optical
C- SSD
D- HDD
D-HDD
HDD stands for Hard Disk Drive, and it is the storage type that is most vulnerable to magnetic damage. HDDs use magnetic storage to store data on spinning disks, and exposure to strong magnetic fields can corrupt or erase the data stored on them.
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
A- Method
B- Object
C- Property
D- Attribute
A- Method
In programming, a method is a block of code that defines a specific behavior or action that an object can perform. It encapsulates a sequence of instructions to carry out a particular task. In this case, when the developer creates a boss object with the ability to jump, they are defining a method that allows the boss object to execute the action of jumping within the game. This method would contain the necessary logic and instructions to make the boss object perform the jump action whenever it is triggered or called in the game’s code.
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
A- The light switches do no support WPA2
B- The router is operating on a different channel
C- The key does not meet password complexity requirements
D- The SSID in not being broadcasted
B- The router is operating on a different channel
When the administrator replaced the wireless router with a new device, it’s possible that the new router is set to operate on a different Wi-Fi channel than the old one. This change in the Wi-Fi channel could lead to communication issues between the light switches and the router, causing them to no longer communicate properly. Adjusting the new router to operate on the same channel as the old one should resolve this problem.
A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
A- Backups
B- Prioritization
C- Indexes
D- Failover
D- Failover
Failover is a technique used to increase database availability. It involves the automatic switching of operations to a redundant or standby system in case the primary system fails. This ensures continuity of service and minimizes downtime.
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
A- Checking proxy settings
B- Checking the caching is enabled
C- Checking browser add-ons
D- Checking certificate validity
D- Checking certificate validity
Receiving a message that a website may not be secure and being prompted to click a link to continue is often related to an issue with the website’s SSL/TLS certificate. Checking the certificate validity would be the most likely step to identify and address the security concern in this situation.
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
A- Antivirus
B- Anti-malware
C- Device manager
D- Host firewall
D- Host firewall
To verify that port 3389 is open for remote desktop on a PC, the user should check the host firewall settings. The host firewall controls incoming and outgoing network traffic on a computer, and it’s the most relevant place to check and configure port openings for services like Remote Desktop Protocol (RDP) on a Windows PC.
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
A- Replace the user’s display
B- Update the PC’s operating system
C- Replace the video cable
D- Install new video drivers
D- Install new video drivers
If the resolution on the display seems very low and the operating system is not allowing the user to adjust it higher after replacing the video card, the most likely solution is to install new video drivers. Sometimes, the default drivers provided by the operating system may not fully support the capabilities of the new video card. Installing updated drivers specific to the new video card can resolve this issue and provide the correct display resolution options.
A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?
A- Change the SSID
B- Change the default password
C- Change the WEP security
D- Create a guest network
D- Create a guest network
Creating a guest network segregates the corporate network and does not allow for guest devices to see the corporate resources
The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem?
A- Private browsing is being used by some clients visiting the site
B- Client-side scripting has been deactivated on some clients visiting the site
C- Legacy browsers that do not support scripting are being used by some clients
D- Server-side scripting has been deactivated by the server administrator
B- Client-side scripting has been deactivated on some clients visiting the site
If the marketing department is receiving inconsistent values in a newly launched form, the most likely problem is that client-side scripting has been deactivated on some clients visiting the site. Client-side scripting, which is typically done using JavaScript, is responsible for handling form validation and interaction on the user’s device. If it is disabled, the form may not function correctly, leading to inconsistent results when users submit data.
The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
A- Eavesdropping
B- Email service outage
C- Man-in-the-middle
D- Denial-of-service
C- Man-in-the-middle
man-in-the-middle attack can intercept the messages between two users, and inject new ones, in this case, the ones that don’t have the attachment.
Which of the following would allow an application to run automatically when a computer is started?
A- Processes
B- Drivers
C- Tasks
D- Journaling
E- Services
E- Services
Services are background processes that run automatically when a computer starts up. They are designed to perform various tasks and provide functionalities for the operating system and other applications without requiring user intervention. By configuring an application to run as a service, it will start automatically when the computer boots up.
An organization exports an inventory database nightly. This is an example of:
A- database query
B- database report
C- database backup
D- database import
C- database backup
The organization exports their inventory database nightly, which means they are creating a copy of the database to be stored separately from the main database. This copy serves as a backup, ensuring that in case of any data loss or corruption in the main database, they can restore the information from the exported copy.
Which of the following language types would a web developer MOST likely use to create a website?
A- Interpreted
B- Query
C- Compiled
D- Assembly
A- Interpreted
A web developer would MOST likely use an interpreted language to create a website.
An interpreted language is a programming language such as javascript, that is executed line-by-line by an interpreter at runtime, rather than being compiled into machine code beforehand. When a web developer writes code in an interpreted language, the code is translated and executed directly by the web browser or server as it is encountered, allowing for more immediate feedback during development.
Which of the following is the closest to machine language?
A- Scripted languages
B- Compiled languages
C- Query languages
D- Assembly languages
D- Assembly languages
Assembly language is the closest to machine language among the options provided.
Machine language is the lowest-level programming language that directly represents the instructions executed by a computer’s central processing unit (CPU). Machine language instructions are written in binary code, which consists of sequences of 1s and 0s representing specific CPU operations.
Assembly language is a low-level programming language that is closely related to machine language. It uses mnemonics and symbols to represent the individual machine language instructions. Each mnemonic corresponds to a specific machine language instruction, and the assembly code is eventually translated into machine code through an assembler.
A function is BEST used for enabling programs to:
A- hold a list of numbers
B- be divided into reusable components
C- define needed constant values
D- define variables to hold different values
B- be divided into reusable components
A function is BEST used for enabling programs to be divided into reusable components.
In programming, a function is a named block of code that performs a specific task or a set of related tasks. It allows programmers to break down a larger program into smaller, manageable, and reusable parts, known as functions. These functions can be called and executed whenever needed, reducing code duplication and improving the program’s organization and maintainability.
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A- Written procedure
B- Written policy
C- Written email
D- Written memo
B- Written policy
A written policy is a formal document that outlines the rules, guidelines, and procedures related to a specific decision or change within the company. In this case, a written policy would clearly state the conditions, requirements, and expectations for staff members who wish to work from home. It provides a comprehensive and standardized approach for employees and management to follow, ensuring consistency and clarity throughout the organization.
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
A- DLP
B- ACL
C- TLS
D- IPS
C- TLS
To reduce the risk of sensitive data being intercepted and viewed during a Man-in-the-Middle (MITM) attack, the technician should enable TLS (Transport Layer Security).
TLS is a cryptographic protocol that provides secure communication over a computer network, typically the Internet. It ensures that data transmitted between the client (e.g., a web browser) and the server is encrypted and protected from unauthorized interception or eavesdropping. When TLS is implemented, the data exchanged between the client and server is encrypted, making it difficult for attackers to intercept and decipher the sensitive information.
A developer needs to add a table to a database. Which of the following database activities should the user perform?
A- CREATE
B- ALTER
C- UPDATE
D- REPORT
A- CREATE
The “CREATE” activity is used to create new database objects, such as tables, views, indexes, or even entire databases. In this case, the developer wants to add a new table, so they would use the “CREATE TABLE” statement to define the table’s structure and columns within the database.
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
A- File backup
B- Fault tolerance
C- Data restoration
D- Restoring access
B- Fault tolerance
RAID (Redundant Array of Independent Disks) technology is used to achieve fault tolerance in storage systems. In a RAID setup, multiple hard drives are combined into an array, and data is distributed or mirrored across these drives. If one hard drive in the RAID array fails, the data is still accessible from the other drives, preventing data loss and maintaining the system’s availability.
RAID technology enhances fault tolerance by providing redundancy in case of hardware failures. It is commonly used in critical systems and servers to ensure that data remains available even in the event of a disk failure.
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
A- Text editing software
B- Visual diagramming software
C- Spreadsheet software
D- Web browsing software
C- Spreadsheet software
Spreadsheet software, such as Microsoft Excel or Google Sheets, would be the best choice for this task as it allows users to enter text and numbers, perform calculations, and create various types of charts and graphs to demonstrate sales figures effectively
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
A- Contract
B- Patent
C- Copyright
D- Trademark
D- Trademark
Trademark - As copyright is not given to the selection of a name, if a company wants to promote its goods it will normally trademark its name and/or logo. A trademark must be distinctive within the industry in which the company is selling goods and services. An ordinary trademark is indicated by the ™ symbol. A registered trademark is indicated by ®. If you re-use or imitate an existing trademark, you are liable to legal action from the owner. Copyright is automatic legal protection granted to certain types of work indicating that the copyright holder owns the right to control the use of the work, including rights of publication, distribution, or sale. There is no need to apply for copyright or display any copyright notice in order to be protected by it. The creation of the work ensures copyright protection automatically. Nonetheless, in case of a dispute, you might need to prove when the work was created in order to defend yourself against charges of plagiarism. Plagiarism is the unacknowledged or unauthorized use of someone else’s work.