Practice Test 1 Flashcards
What’s a true statement about the assembly language?
Each assembly language can run on any platform
Assembly languages are not programming languages
Assembly code is not human-readable
Only specialists use assembly code
An assembly language is any low-level programming language in which there is a very strong correspondence between the program’s statements and the architecture’s machine code instructions. Assembly code is very difficult to follow and is only really used by specialists trying to solve a very particular problem with an application.
The assembly language represents machine code in human-readable text.
Assembly languages are the first generation of programming languages. They rate at slightly higher level than machine code.
An assembly language is typically specific to a particular hardware architecture. Different assembly languages can run on different platforms.
What is an advantage of using a CLI (Command Line Interface) instead of GUI (Graphical User Interface)?
More people use CLI, so there is more help available
Non-technical users can learn how to use CLI faster than GUI
With CLI, it is easier to multitask when working on different things at once
CLI takes up less system resources to run
Running CLI takes a lot less of the computer’s system resources than a GUI, which needs to load things like icons, fonts, and additional drivers for components such as video and a mouse.
CLI requires a lot of knowledge and memorization to operate and navigate around it, making the learning curve a lot steeper than visually intuitive GUI.
Being more user friendly than a command line, especially for new or novice users, a GUI is used by more users.
Command line environments are capable of multitasking, but they do not offer the same ease and ability to view multiple things on one screen. GUI users have windows that enable users to view and control multiple programs and folders at once.
Which device is likely to use ARM(Advanced RISK Machine) CPU?
IBM PC
Laptop
Tablet
iMac
Chipsets for mobile phones/smartphones and tablets are often based on the ARM microarchitecture. RISC stands for Reduced Instruction Set Computing. RISC microarchitectures use simple instructions processed very quickly, which is not sufficient for larger devices.
Most laptops today are powered by an Intel CPU, though there are several models that use AMD processors. Intel’s flagship CPU series is Core, whose earliest models (Core Solo and Core Duo) were laptop-only chips.
IBM PCs require “IBM compatible” CPUs, which are defined by having compatibility with the basic x86 instruction set.
iMac is the Intel-based family of Macintosh desktop computers designed, manufactured, and sold by Apple Inc., and use Intel’s i-series CPUs.
What is the end result of the iterative process of establishing and testing a theory while troubleshooting?
Identify the person resposible for creating the problem
Establish a root cause for the problem
Resolve the problem
Ensure that the problem is never repeated
The end result of the iterative process of establishing and testing a theory (establish a theory, test it, if it doesn’t work, establish another theory) is to establish a root cause for the problem.
The iterative process of establishing and testing a theory is the combination of Steps 3 and 4 of CompTIA’s troubleshooting model. Resolving the problem is part of Step 6: implement the solution or escalate as necessary.
Ensuring that the problem is never repeated is part of Step 7: verify full system functionality and, if applicable, implement preventive measures.
Many technical problems are not caused by a specific person, but by events and circumstances, such as power or equipment failure, hardware or software malfunction, etc.`
What type of language has working with datasets as its primary purpose?
Querry
Compiled
Markup
Assembly
Code written in a query language, such as SQL (Structured Query Language), is designed to retrieve specific records from a dataset.
An assembly language is any low-level programming language, designed to perform many functions.
A markup language is a means of making data in a document accessible to a program, via a series of nested tags that describe the structure and/or meaning of the tag contents. A markup document represents a dataset, and the program that reads it is the one that works with it.
Compiled languages can perform any programming task, including working with datasets, usually via a markup document or embedded queries. That is a small part of their designed functionality.
Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID?
NFC
NID
NAS
NIC
Near Field Communications (NFC) is a peer-to-peer version of RFID; that is, an NFC device can work as both tag and reader to exchange information with other NFC devices.
Network Interface Card (NIC) provides the Ethernet port in the computer to connect it to a network.
A Network Attached Storage (NAS) appliance is one or more hard drives housed in an enclosure with basic server firmware, usually running some form of Linux.
Network Interface Device (NID) is a device that serves as the demarcation point between the carrier’s local loop and the customer’s on-premises wiring.
The information layer of data analytics requires software to perform which function?
Data correlation
Data collection
Data storage
Meaningful reporting
-Data Correlation-Data analytics (relationship of data to information) can be thought of in terms of data, information, and insights layers. The information layer requires software to perform data correlation, which means analyzing the whole data set and finding connections and links between data points.
The data layer is the raw values collected by the system, with the help of data capture and collection functions.
As well as collecting the data, it must be stored and secured, which is where data storage comes in.
To inform human decision making at the insights layer, the information identified by the analytics system must be presented in ways that humans can analyze and interpret. This is done through meaningful reporting.
An employee makes unauthorized copies of customer Social Security numbers, saves them in an unencrypted spreadsheet, and transfers them to the employee’s personal email account. The employee then opens new credit card accounts with this information and uses the cards to buy personal items. Which of the following did NOT occur?
Identify checks
Identity theft
Mishandling personally identifiable information (PII)
Identity fraud
Rigorous identity checks when setting up a new account can help mitigate masquerading, which involves subverting the account creation process.
The rise in consciousness of identity theft as a serious crime is growing. Identity theft is using Personally Identifiable Information (PII) to impersonate an individual.
Staff should be trained to identify PII and to handle personal or sensitive data appropriately, and process Personally Identifiable Information (PII) more sensitively and securely.
Identity fraud can either mean compromising someone’s computer account or masquerading as that person. Strong authentication makes this type of attack much more difficult to perform.
Why are USB (Universal Serial Bus) thumb drives non-volatile?
They are easy to connect to the computer
They retain data without power
They can be inserted and removed while the computer is powered on
They are very small and light
Volatile means that data is only retained in the memory chips while there is a power source, and non-volatile means that it retains data without power. USB thumb drive is a removable flash memory device, and removable flash memory devices do not need power to retain information.
Inserting and removing a device without turning off the computer is not a condition of non-volatility.
The degree of difficulty of connecting to the computer is not a condition of non-volatility.
The size and weight of a device is not related to volatility.
Convert the binary number 1000000 into decimal notation.
64
40
32
128
A quick way to calculate a binary number which consists of a 1 with the rest being 0’s is to count the number of 0’s, and then calculate 2 to the power of that number. In this case, there are six 0’s, and 2 to the power of 6 = 64.
If the task was to convert 1000000 into hexadecimal notation, the answer would be 40.
If this example had one less 0, i.e., 100000, then the answer would be 32.
If this example had one more 0, i.e., 10000000, then the answer would be 128.
What kind of computer firmware provides support for mouse operation at boot?
UEFI
BIOS
DOS
CMOS
Newer motherboards use UEFI (Unified Extensible Firmware Interface), a firmware which provides support for 64-bit CPU operation at boot, as well as a full GUI and mouse operation at boot.
BIOS (Basic Input/Output System) is firmware which provides industry standard program code to get the essential components of the PC running. It does not provide support for mouse operation at boot.
CMOS (Complementary Metal-Oxide Semiconductor) is a semiconductor chip inside computers that stores information, such as the system time and date, but is now obsolete.
DOS (Disk Operating System) is not firmware; it is an operating system that runs from a hard disk drive.
An attacker used hosts compromised with bot malware to launch a coordinated attack against a web service to overload it. Which of the following is the active attack threatening web service availability to your users?
Destruction
Impersonation
Denial of Service (DoS)
Replay
Denial of Service (DoS) is where an attacker targets the availability of a service. A DoS attack might tamper with a system or overload it. A Distributed Denial of Service (DDoS) uses hosts compromised with bot malware to launch a coordinated attack against a web service.
To prevent physical destruction of devices, you can put your servers in a physically secure room and control access to that room.
Replay is an integrity concern where a host captures another host’s response to some server and replays that response in an effort to gain unauthorized access.
Impersonation is an integrity concern where a person will attempt to figure out a password or other credentials to gain access to a host.
What is the main purpose of NIC (Network Interface Card) expansion card?
To replace the outdated NIC on the motherboard
To serva as a faster alternative to the onboard NIC
To provide additional NICs to servers on a wired business network
To allow workstation comptuers to connect to the network
Network Interface Card (NIC) provides the Ethernet port in the computer. Servers with a NIC on the motherboard (onboard card) may have additional NICs supplied on expansion (or add-on) cards.
Almost all workstation computers come with a NIC on the motherboard, allowing for Ethernet connection to the network.
An outdated NIC on the motherboard is not a frequent occurrence.
Both onboard cards and expansion cards operate in the same manner using the same protocols and cable ports. NICs come in many different forms and speeds, but both types come in equal speeds.
What is an advantage of the float data type compared to the integer data type?
The float data type is not limited to whole numbers
The float data type is a more natural way of expressing numbers in computing systems
The float data type requries less processing time for arithmetic operations
The float data type consumes less storage.
The float data type can support decimal fractions, as opposed to integers which are whole numbers.
The float data type does not consume less storage than an integer. An integer data type consumes 1 to 8 bytes of computer storage, while a float consumes between 4 and 8 bytes of storage.
Floating-point operations are slower than integer operations of the same data size, requiring more processing time for arithmetic operations.
An integer exists inside the computer as a true binary value, while a floating-point number needs additional steps to be expressed in binary format for the computer to accurately store its value.
The accountant of a small company uses a database application to maintain the list of vendors, their services, and their invoices to the company. The application uses Microsoft Access for the database layer, with the front-end interface layer in Visual Basic, to work with the data and to generate custom reports. What is the application architecture of this system, which resides on the accountant’s desktop computer?
Three Tier
Two tier
One tier
N Tier
If the application front-end, processing logic, and the database engine are hosted on the same computer, the application architecture is described as one-tier or standalone. The accountant’s desktop computer hosts both back-end and front-end layers, making it a standalone application.
A two-tier client-server application separates the database engine, or backend/data layer, from the presentation and application layers. If this system used a remote server to host the data, then it would be a two-tier application.
In a three-tier application, the presentation and application layers are also split, making the entire system more complex.
An n-tier application architecture can be used to mean either a two-tier or three-tier application, or an application with more complex architecture, like having separate access control.
Why is data persistence an important consideration when using a database with an application?
Applications need a way to prevent the loss of information after they terminate
Applications need a way to communicate with a database
Applications need a way to view the data in a variety of formats
Applications need a way to limit users access to some of the data
When an application terminates, it loses the internal variables and other temporary data that it used during processing. A database represents a way for an application to store data persistently and securely.
Applications communicate with databases with the help of a database connection such as ODBC (Open Database Connectivity) or ADO (ActiveX Data Objects).
Applications limit users’ access to the data through security controls such as log-in screens. Databases limit users’ access to the data through tools such as ACL (Access Control Lists).
Applications view data in a variety of formats using queries and reports.
What is a key difference between copyright and a patent?
Patents are registered for a limited time only, but copyright protection is permanent.
Copyright protection happens automatically, but a patent must be applied for and registered.
Copyright is valid for a limited time only, but a patent is granted on a permanent basis
Patents are granted automatically, but a copyright must be applied for and registered
Copyright is automatic legal protection granted to certain types of work. There is no need to apply for copyright or display any copyright notice in order to be protected by it. The creation of the work ensures copyright protection automatically.
A patent must be applied for and registered because there is no automatic protection, as there is for copyright.
Patents are registered for a limited time only.
Copyright lasts for a number of years after the owner’s death. The exact length of time varies between 15 and 70 years depending on the nature of the work. After this time, provided the copyright has not been extended for some reason, the work becomes public domain and may be used freely.
What problem is Windows’ UAC (User Account Control) designed to solve?
Elevated privileges
Inadequate account authentication
Too many guest accounts
Too many administrative accounts
“Least privilege” means that users receive permissions required to perform tasks and no more. Early versions of Windows led to the problem of “elevated privileges”, where all users were given administrative privileges, as otherwise it was difficult to perform typical administrative tasks. UAC was created to solve this problem.
The “Guest” account, used in Windows 7 and 8.1, is a standard, local user account, with very limited permissions. There is typically one such account, but having many of them is not a problem.
UAC enables users to perform common tasks as non-administrators and as administrators without having to switch users. The number of administrative accounts is not relevant to this feature.
Inadequate account authentication is not part of UAC functionality.
An essential part of troubleshooting is to establish a plan of action to eliminate the root cause without destabilizing some other part of the system. What needs to be in the plan of action?
Details outlining every occurrence of the problem.
Recommendations for a workaround
Steps required to implement the solution
Cost analysis of resolving the problem vs. ignoring it
A plan of action should contain the detailed steps and resources required to implement the solution.
In most situations, it is not necessary to provide details outlining every occurrence of the problem, as part of the troubleshooting process. If such details are required, they are not part of the plan of action.
There are typically three solutions to any problem: repair, replace, or ignore. The decision as to whether or not repairing or replacing is cost-effective does not necessarily involve a cost analysis, but a simple judgement call.
If the solution to the problem is to ignore it, then it may help to have recommendations for a workaround.
Which of the following uses MHz (Megahertz) to measure their speed?
Modern computer processors
Bluetooth
Wireless technologies
Older PC bus interfaces
MHz stands for Megahertz, which is 1 million (1,000,000) cycles per second. Older PC bus interfaces work at this slower signaling speed.
Modern computer processors work at much faster speeds of at least 1 GHz (Gigahertz) which is 1 billion (1,000,000,000) cycles per second. The first 1 GHz processors for consumer computers were released in the year 2000.
Wi-Fi (wireless networking) most commonly uses the 2.4 GHz and 5 GHz radio frequencies to provide wireless high-speed Internet and network connections.
To communicate between devices, Bluetooth sends signals over a 2.4 GHz radio frequency.
For enterprise networks with very large amounts of data to backup, which is best to implement?
Tape drives
Use of personally owned devices
Cloud storage only
Peer-to-peer (P2P) network
Enterprise networks with large amounts of data to backup may use more specialized media, such as tape drives.
An online Peer-to-Peer (P2P) network is one where, instead of a central server, each client contributes resources to the network. Most companies discourage use of P2P file sharing software on corporate networks.
Portable devices (e.g., smartphones, USB sticks, and media players) pose a threat to data security; they facilitate file copying. Some companies try to prevent staff from bringing such devices.
It is a good idea to use a combination of backup storage methods for on-site and off-site backups. You could back up often to locally attached storage or network-attached storage (NAS) and then copy backups to a cloud storage off-site.
What is available in software installer packages to select specific feature sets or modules within the software package?
Add-ons and plugins
Additional features
Advanced installation
Advanced Options
Most software installer packages offer a choice between a default installation and a custom (or advanced options) installation. A custom installation allows the user to choose specific settings, such as where to install the software and what icons or startup/autorun options to configure, as well as the selection of specific feature sets or modules within the software package.
Advanced installation can refer to an installation using advanced options, although it is not a widely used term.
Additional features may be part of the advanced options during software installation.
Add-ons and plugins are software components that add a specific feature to an existing computer program. They may be part of the advanced options during installation.
Which is a true statement about a GPU (Graphics Processing Unit)?
GPU uses analog signals
GPU works with the CPU to handle complex high-resolution images
GPU must be on its own graphics card
Computers used primarily for gaming require a GPU in place of a CPU
The GPU is a dedicated processor for display functions. It works with the CPU to handle complex high-resolution images.
Every computer needs a CPU. While the GPU can perform some functions that the CPU cannot, the GPU does not replace the CPU.
CPUs are located on the motherboard in a special mount. GPUs may be part of the CPU or come on a plug-in expansion card.
Early GPUs generated analog signals for Cathode Ray Tube (CRT) monitors but plugged into the motherboard and communicated with the CPU using digital signals.
CompTIA’s troubleshooting model includes having to establish a theory of probable cause. What is one of the components of this step?
Question the internet
Question users
Question the obvious
Question the theory of probable cause
Step 3 in CompTIA’s troubleshooting model is to establish a theory of probable cause. Its three components are: question the obvious, consider multiple approaches, and divide and conquer.
Step 1 in CompTIA’s troubleshooting model is to identify the problem. One of the six components of this step is to question users.
Step 2 in CompTIA’s troubleshooting model is to research knowledge base/Internet, if applicable.
Step 4 in CompTIA’s troubleshooting model is to test the theory to determine cause. Steps 3 and 4 form an iterative process of establishing and testing a theory until something works.
Which statement holds true about a desktop/workstation when comparing it to a server?
Server components cost less than those of a desktop
Servers use the same type of components as a desktop
Desktop components are more powerful
Desktop components are more reliable
In this context, a server is a powerful computer that supports a number of users simultaneously in a computer network. Most servers use the same type of components as a desktop.
The server components are more powerful and more reliable, and consequently more expensive.
If a desktop PC (Personal Computer) stops working, a single user may be unable to do their job; if a server computer stops working, tens or even hundreds of users may not be able to do their jobs, which means that servers need to be very reliable.
This higher level of reliability is achieved by specifying high quality (and more expensive) components and also by using extra copies of components for redundancy.
Which of the following declarations represents a 2-dimensional array?
declare Animal (2) as String
declare Animal(9,9) as string
declare ANimal (1) as string
declare Animal(2,2,2) as string
The Animal(9,9) array is a 2-dimensional array, with up to 10 elements in each dimension (elements in the array are counted from zero). The elements are similar to rows and columns, with the first dimension serving as the row, and the second dimension serving as columns for each row. The Animal(9,9) array can have up to 100 total elements, in 10 rows by 10 columns.
The Animal(1) array is a 1-dimensional array with up to 2 elements.
The Animal(2) array is a 1-dimensional array with up to 3 elements.
The Animal(2,2,2) array is a 3-dimensional array with up to 3 elements in each dimension.
Convert the hexadecimal number 16 into decimal notation.
22
10
16
F
To calculate the decimal value of a number in hexadecimal notation, multiply each digit with its corresponding power of 16 from right to left. The calculation for 16 is: 6 * 1 + 1 * 16 = 22.
10 would be the correct answer if the question was to convert 16 in decimal into hexadecimal. Hexadecimal numbers are the same as decimal for 0 to 9, and A to F is decimal 10 to 15.
Hexadecimal and decimal numbers are the same for 0 to 9, not all the way to 16. 16 in hexadecimal converts to 22 in decimal.
F is not part of decimal notation. It is part of hexadecimal notation and converts to 15 in decimal notation.
A web application contains a form, which users fill out. What is the most likely use for this form?
To create a database
To create a flat file for each user
To import data from a flat file into a database
To manually input data into a database
The manual data input process typically involves a form. The forms can be generic as part of the database administration software, or custom in a desktop or web application.
Importing data from a flat file is typically not done through a form in a web application. It’s usually done though database administration tools, or a series of scripts.
A form in a web application is not the right tool to create a database. It’s usually done though database administration tools, or a script.
A web application can create files for its users, usually with information about the browsing session. Data that the user fills out on the form is typically for input into a database.
Which of the following poses a higher risk to ensuring business continuity?
Syncing data between servers
A converged network
Service and data replication
Real-time synchronization
A network carrying both voice and data is said to be converged. There is also a greater vulnerability to Denial of Service (DoS) (without redundancy the network is a single point of failure for both voice and data traffic) and eavesdropping on voice communications.
To increase site redundancy, you must consider implementing service and data replication between multiple data centers.
To increase site redundancy, you can synchronize data between servers and potentially between sites.
To increase site redundancy, you can implement replication which might be real-time or bundled into batches for periodic synchronization.
What is the maximum transfer rate for the Firewire standard which uses 6-pin “alpha” connectors and cabling?
1 Gbps
400 Mbps
600 Mbps
800 Mbps
Firewire was based on IEEE 1394, which is an interface standard for a serial bus for high-speed communications and isochronous real-time data transfer. Firewire was used on some Apple Mac computers; it was a competitor to USB (Universal Serial Bus) but never received mainstream support amongst PC vendors. The Firewire 400 standard uses 6-pin “alpha” connectors and cabling, with the maximum transfer rate of 400 Mbps (Megabits per second).
There is no Firewire standard with a maximum transfer rate of 600 Mbps.
The Firewire 800 standard uses 9-pin (“beta”) connectors and cabling, and supports transfer rates up to 800 Mbps.
There is no Firewire standard which supports transfer rates up to 1 Gbps (Gigabits per second).
Which of the following computer components does an “all-in-one” workstation contain within the monitor case?
Mouse
Microphone
Keyboard
Scanner
The terms workstation, PC (Personal Computer), and desktop computer are often used interchangeably, so this refers to an “all-in-one” desktop unit or PC. All-in-one means that the computer components (except the keyboard and mouse) are contained within the monitor case. These components typically include the processor, system memory, disk storage, and audio/visual equipment, such as a camera, speakers, and a microphone.
A keyboard is not contained inside the monitor case of an “all-in-one”.
A mouse is not contained inside the monitor case of an “all-in-one”.
A scanner is part of an “all-in-one” PSC (Printer-Scanner-Copier) or MFP (Multifunction Printer) but not a workstation/PC.
What is the main cause of memory leaks?
Operating system upgrades
Damaged memory chips
Programming errors
Outdated software
Memory leaks refer to Windows memory loss, caused by a program or an app. This occurs when an application does not release memory when it’s done with it, eventually causing a system slowdown.
If the software that is outdated and no longer supported has proper memory management in the code, then it would not cause more leaks than current but badly written programs.
Damaged memory chips cause problems, but memory leaks refer specifically to memory losses due to software programs incorrectly managing memory allocation.
Upgrading the operating system can be a cause of memory leaks, with an increase in memory usage by the new drivers. Operating system upgrades are done less frequently than everyday use of programs that cause leaks.
A file contains information about the company’s customers. The information includes Name, Address, Phone, and Email for each customer. What’s the best way to convert this file into a database?
Create a table called customers, with fields called name, address, phone, and email
Create a table called Customers, with records called Name, Address, Phone, and Email.
Create a database called Customers, with tables called Name, Address, Phone, and Email.
Create a database called Customers, with fields called Name, Address, Phone, and Email.
A database consists of tables of information, organized into columns and rows. Each row represents a separate record in the database, and each column represents a single field within a record. Name, Address, Phone, and Email are fields for each customer, and the collection of these fields is a table.
Name, Address, Phone, and Email do not need to be individual tables. They are all part of a record for each customer.
Name, Address, Phone, and Email are not records, they are fields, or columns in the table. A record is one set of information about a customer.
Fields make up a table, and tables make up a database.
What type of software is Google Drive?
Collaboration software
Productivity software
Business software
Networking software
Google Drive is a cloud-based document storage and sharing service used for collaboration among users. The workspace server hosts the document and contains the accounts and permissions of the users allowed to access it.
The Google Drive client software provides the user with the tools to view and edit the document within the workspace using Google Docs or using a productivity software suite such as Microsoft Office (via the Drive plug-in).
Businesses use Google Drive for document storage and sharing, but it is not considered to be specialized business software.
Networking software is for administrators to deploy, manage, and monitor a network, not sharing documents.
What does 5 GB (GigaBytes) memory mean in the context of the Microsoft Windows operating system?
5000000 KB
5120 MB
5000 MB
5210 MB
In the Microsoft Windows operating system, file sizes and memory capacity use binary measurements. 5 GB equals to 5 * 1024 MB = 5120 MB (MegaBytes).
Storage capacity is typically quoted in decimal measurements. If this was a hard disk with a capacity of 5 GB, it would equal 5000 MB. But in the Microsoft Windows operating system, the calculation for each GB of memory is 1024 MB.
5210 MB = 5.088 GB, not 5 GB.
If this was a hard disk with a capacity of 5 GB, it would equal 5,000,000 KB (KiloBytes). But in the Microsoft Windows operating system, the calculation for each GB of memory is 1024 * 1024 = 1,048,576 KB; 5 GB = 5,242,880 KB.
Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command?
Select
Delete
Insert
Drop
DML commands refer to SQL commands that access or modify the contents of the database. The DROP command deletes (drops) a table or the entire database, and is a DDL (Data Definition Language) command, which modifies the structure of the database.
DML commands include DELETE, which deletes records from a table, and therefore modifies the contents of the database.
DML commands include INSERT, which adds a new row into a table, and therefore modifies the contents of the database.
DML commands include SELECT, which is the first building block of a query to retrieve data from a database.
When a general language performs scripting, what does it call on as part of the code?
Markup instructions
Machine code
Query statements
system commands
Most languages can call (or “wrap”) system commands as part of the code and can therefore also be used for scripting.
Machine code is the instructions converted to strings of ones and zeros for the CPU (Central Processing Unit) to process. Machine code calls can be used to optimize certain parts of a program, but not for scripting.
Query statements are requests to a database, for the purpose of retrieving data which the program needs for additional processing. Embedded query statements are not used for scripting.
Markup instructions can be used to format the output of a program, not for scripting.
Which of the following exposes a user to a Man-in-the-Middle (MitM) attack?
Encryption
A cryptographic hash
Cipher text
Plain text
Plain text is also known as clear text and is an unencrypted message. To secure transmissions from eavesdropping, sniffing and MitM attacks, data should be encrypted.
Cipher text is an encrypted document or message that can travel across a public network, such as the Internet, and remain private.
With encryption, even if an eavesdropper could intercept and examine the data packets, the content would be unreadable.
Cryptographic hashing is a type of encryption that can be used to prove that a message has not been tampered with and for secure storage of data where the original meaning does not have to be recovered (e.g., passwords).
If one part of the network fails, what should the networking team do to keep the rest of the network operational?
Be convincing or establish trust
Focus on the integrity of the data
Implement solutions to prevent masquerading
Implement network cabling to allow for multiple paths between servers
Network cabling should be designed to allow for multiple paths between the various servers, so that during a failure of one part of the network, the rest remains operational (redundant connections).
Identity fraud can either mean compromising someone’s computer account or masquerading as that person. Strong authentication makes this type of attack much more difficult to perform.
Being convincing or establishing trust usually depends on the attacker obtaining privileged information about the organization.
Integrity means that the data being stored and transferred has not been altered without authorization. In a network outage, availability to the data is the top concern.
A Bluetooth device is set up by “pairing” or “bonding” the device with the computer. To do this, the devices need to be put into what mode?
Public
Wireless
Work
Discoverable
A Bluetooth device can establish a connection with another device if the devices are put into discoverable mode. This enables Bluetooth devices to search, connect, and transfer data (i.e., “pair” or “bond”) with each other.
Bluetooth is often described as “Bluetooth wireless technology,” giving the impression that wireless is a mode of a Bluetooth device. However, wireless typically refers to wireless networking, better known as Wi-Fi, which provides high-speed access to the internet, while Bluetooth is primarily used to connect devices without using cables.
Work mode is an option on a smartphone, for business users who want to keep their work-related apps and features separate from personal ones.
Public mode is a setting for network connections.
What is NOT one of the features of an application virtualization software such as Citrix XenApp, which installs on a network server instead of individual workstations?
The data files are easier to back up
The data can be made more secure
Users can use the application without a network connection
The application can be used on multiple operating systems without being developed as a cross-platofrm application
Application virtualization software is installed and executed on a network server. Client workstations access the application using a remote terminal or viewer, with a local network connection to the server.
Locating the application and its data files on a server is easier to secure. Security is implemented in one location, the server, instead of each workstation running a locally installed application.
Having the all of the application’s data files on one server is easier to back up, than having local installations and corresponding sets of data files.
Application virtualization software allows applications to run in environments that do not suit the native application, meaning that they can run from different operating systems without being developed as a cross-platform application.
Which of the following measures their data transfer capacity in Mbps (megabits per second)?
Data center telecommunications links
Latest PC Bus standards
Wireless networks
Older computer peripheral interfaces
Wireless networks and residential Internet links, as well as many internal computer interfaces, typically have their data transfer capacity measured in Mbps or Mb/s (Megabits per second).
Older computer peripheral interfaces run slower than their more modern counterparts. They have their data transfer capacity measured in Kbps or Kb/s (Kilobits per second).
The latest PC bus standards can support higher data transfer capacity measured in Gbps or Gb/s (Gigabits per second).
Major telecommunications links between data centers, cities, and countries have the highest data transfer capacity measured in Tbps or Tb/s (Terabits per second).
Convert the decimal number 35 into binary notation.
1000001
100011
100101
11111
Binary numbers can be calculated from right to left, with each position being worth twice the previous one. 100011 is 1 * 1 + 1 * 2 + 0 * 4 + 0 * 8 + 0 * 16 + 1 * 32 = 35.
11111 is 1 * 1 + 1 * 2 + 1 * 4 + 1 * 8 + 1 * 16 = 31. Alternately, it can be calculated as 100000 - 1, or 32 - 1 = 31.
100101 is 1 * 1 + 0 * 2 + 1 * 4 + 0 * 8 + 0 * 16 + 1 * 32 = 37.
1000001 is 1 * 1 + 0 * 2 + 0 * 4 + 0 * 8 + 0 * 16 + 0 * 32 + 1 * 64 = 65.
What should a user do before installing a driver from a third-party website?
Search the web for references of the driver’s legitimacy and reputation
Install patches or updates for the application to fix any coding problems
Ensure the site is downloaded over an HTTP connections
Ensure the driver software uses a digitally self-signed certificate
When installing new software applications or drivers, it is important to obtain the setup files from a legitimate source. Search for references to the site on the web and in forums to find out if anyone has posted warnings about it.
When using a website to install software, ensure that the software is being downloaded over a secure HTTPS connection.
Ideally, driver software should also be digitally signed by the vendor, and the vendor’s certificate should be trusted by your computer.
A patch or update is a file containing replacement system or application files and can fix coding problems in the original file. This should be installed after installing the driver.
Which of the following authentication factors is an example of something you have?
A password
A software token
A geographic location
a fingerprint pattern
A software token is an example of an authentication factor of something you have and is generated by an application and stored on the user’s device as a cookie.
Many types of biometric information can be recorded, including fingerprint patterns, iris or retina recognition, or facial recognition. This is an authentication factor of “something you are”.
Location-based authentication measures some statistic about “where” you are (your presence in a specific geographic location). This is considered “somewhere you are” authentication.
The typical “something you know” technology is the logon or sign-in. A sign-in comprises a username and a password.
What does the term “hybrid laptop” mean?
Laptop that can be used like a phone
Laptop that can be used like a desktop
Laptop that can be used like a gaming console
Laptop that can be used like a tablet
Hybrid laptops can be used like a tablet or a traditional laptop. They need touchscreens to have tablet functionality. Some laptops are converted into tablets by flipping the screen. Others have a detachable keyboard, which functions as a cover for the screen.
Laptops can be used to make video calls, but it is not a replacement for the phone and not a hybrid laptop.
Laptops can be used like a desktop, and bigger models are often called “desktop replacements,” but they are not hybrid laptops.
For a laptop to be used like a gaming console, it needs to have a powerful CPU and graphics processor, as well as a gaming pad, but that does not make it a hybrid laptop.
A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information?
Data monitoring
IT security training
Acceptable Use Policy
CCTV surveillance cameras installation
Users must keep their work passwords known only to themselves. This means not writing down the password. Employees should be trained to understand what information is confidential, and how to handle it correctly.
An Acceptable Use Policy, or Fair Use Policy, sets out what someone is allowed to use a particular service or resource for.
CCTV surveillance cameras can be used in the workplace for security assurance and to observe someone writing down a password, but not to prevent the password from being written on a sticky note.
Monitoring data means analyzing data communications to measure an employee’s productivity.
What are the properties of a file “Books/CoverPhoto.js”?
It’s an image file named “Books/CoverPhoto.js”.
It’s an executable file named “CoverPhoto.js” in folder “Books”.
It’s a document file named “Books/CoverPhoto.js”.
It’s an image file named “CoverPhoto.js” in folder “Books”.
An executable file contains program code, and can make changes to the computer system. Executable file extensions include “exe”, “bat”, “cmd”, and “js”. The slash symbol (/) is reserved for listing folders or directories in all operating systems, and the back-slash symbol () is also used for this on some systems.
Image file extensions include “jpg” and “jpeg”, but not “js” which stands for JavaScript code, a script file that runs within an interpreter.
File names cannot contain the reserved symbol “/”, so the entire name is not the file name. “Books” is the folder, and “CoverPhoto.js” is the file.
Document file formats are used by word processing software, with extensions such as “txt”, “rtf”, “doc”, and “docx”.
If a worm propagates over a network, which of the following is the first action to take, to prevent further infection?
Enable on-access scanning
Disconnect the network link
Use nativirus software to try to remove the infection
Escalate the problem to a support professional
Malware such as worms propagate over networks. Therefore, one of the first actions should be to disconnect the network link.
If a file is infected with a virus, the antivirus software should detect it and take the appropriate action. You can use antivirus software to try to remove the infection.
After you have determined you cannot clean a file or if the antivirus software does not detect it, and allows the virus to infect the computer, then you should get help by escalating the problem to a support professional.
With on-access scanning, when a file is accessed, the antivirus software scans the file and blocks access if it detects anything suspicious. If a worm propagates, on-access scanning has failed.
A systems administrator is installing a new wireless access point (AP). During installation, the administrator should make sure to complete which of the following?
Enable all services on the wireless AP
Change the SSID to something that helps identify the administrator
Change the default password
Store a hardcopy of a complex password of at least 12 characters
You must always change the default password (typically “default,” “password,” or “admin”) for any new device to prevent unauthorized access to it.
It is best practice not to enable services you do not need, especially on a multifunction device such as a wireless access point.
You must choose a strong password that cannot be cracked by password-guessing software. Use a long, memorable phrase of at least 12 characters. However, to maintain confidentiality, you should never write down a password.
It is a good idea to change the SSID from the default to something unique to your network. Remember that the SSID is easily visible to other wireless devices, so do not use one that identifies you personally or your address.
Which of the following types of collaboration software is least sensitive to latency?
Document sharing
Video conferencing
Instant messaging
Screen sharing
Latency is the delay in seconds that a packet of data takes to travel over a network. Tasks which need to be real-time are more sensitive to latency, where slight delays impact the ability to perform the task. Such delays do not greatly impact the sharing of documents, which are often done passively and not in real-time.
Screen sharing is when a remote user views the host’s desktop, often used for software demonstrations and product support, and need to be in real-time.
Instant messaging software allows users to communicate in real-time, through text as well as voice and video calls.
Video conferencing software allows users to configure virtual meeting rooms, and need to be in real-time.
Why is scalability an important consideration when choosing to use a database instead of a flat file?
Nonscalable systems increase their costs at the same rate as the number of users that they support.
Nonscalable systems have strict limits for the amount of data they can support.
Nonscalable systems can only exchange data with other nonscalable systems.
Nonscalable systems have strict limits for the number of users they can support
Scalability means being able to expand usage without increasing costs at the same rate. For example, in a nonscalable system, doubling the number of users would also double the costs of the system.
Nonscalable systems do not have limits for the number of users they can support, other than trying to not incur the high costs of having many users.
Nonscalable systems do not have limits for the amount of data they can support. Some systems have more efficient processes to work with large amounts of data than other systems, but even if inefficiently, they can still support it.
Data exchange can happen between different types of systems.
A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?
Device manager
Driver manager
Command Prompt
Programs and Features
There is no page or window called “Driver Manager”. Drivers are installed for specific devices, and can be managed from the Device Manager page.
A good way to uninstall a driver is by uninstalling the software package used to install the driver in the first place, on the Programs and Features page from Control Panel.
A user can locate the device and uninstall it on the Device Manager page. Uninstalling the device usually comes with the option to uninstall the related drivers as well.
A user can delete drivers using command-line syntax from the Command Prompt window.
Which of the following is least likely to pose a substantial risks to an organization, such as a system intrusion?
Employees using permitted software and services as outlined in the handbook
Emplopyeees file sharing on P2P networks
Employees using personally owned devies in the workplace
Employees using social networking
An employee’s handbook should set out the terms under which use of web browser/email/social networking/P2P software is permitted for personal use.
Many employees expect relatively unrestricted access to Internet facilities for personal use. However, employees’ use of social networking poses substantial risks to the organization.
Many employees expect relatively unrestricted access to Internet facilities for personal use. However, employees’ use of P2P networks for file sharing poses substantial risks to the organization.
Portable devices, such as smartphones, USB sticks, media players, and so on, pose a considerable threat to data security as they facilitate file copying.
Which of the following is NOT part of IoT (Internet of Things) home automation?
Sprinkler system
Door lock
HVAC
Insulin pump
IoT-enabled medical devices include portable devices such as cardiac monitors/defibrillators and insulin pumps, which allow doctors and nurses to adjust dosages and monitor a patient remotely. While these devices may be located at a patient’s home, they are not part of the home controlled by IoT home automation.
The ability to control HVAC (Heating, Ventilation, and Air Conditioning) systems from an app installed on a smartphone is functionality provided by IoT thermostats, part of IoT home automation.
The ability to control alarms, locks, lighting, and entry systems is functionality provided by IoT home automation security systems.
The ability to control devices such as outdoor sprinkler systems is functionality provided by IoT home automation lawn/gardening management systems.
What’s a true statement about variables?
A variable can have any data type that the programming language supports
A program has to delcare all variables before using them
Each procedure must assign an initial value, when declaring variables
A variable contains a vlue that must change during the execution of the program
A variable is used in a program to access a program element. Its value can be a text string, a number, or any other data type if the programming language supports it.
It’s good practice to declare all variables in a program before using them, but not all programming languages require it. It is often possible to use undeclared variables, although this can make code harder to read and more prone to errors.
A variable contains a value that can change during the execution of the program, but it can also remain unchanged.
Variables can have initial value assignments, but it is not mandatory.
Which of the following will NOT help a network administrator avoid service unavailability due to one or more disks failing?
redundant Array of Independent Disks (RAID)
Network redundancy
Fault tolerance
Contingency plan
Network redundancy provides fault tolerance to the connections to the network, if a network adapter fails, but will not avoid unavailable service if one or more disks fail.
Combining hard disks into an array of disks can help to avoid service unavailability due to one or more disks failing. A Redundant Array of Independent Disks (RAID) offers a variety of fault tolerant solutions.
To help protect against losing access to a computer system when a component fails, you must implement fault tolerance. Fault tolerant systems are those that contain additional components to help avoid single points of failure.
Vulnerabilities in critical workflows and resources can be mitigated by creating contingency plans and resources that allow the system to be resilient to failures and unexpected outages.
What is the best reason to use a flat file instead of a database?
To support a wide variety of data
For more efficient processing of large amounts of information
To exchange information between systems
To divide the date update tasks among many users
A flat file is a good way of exporting and importing information between systems. It’s easier to work with flat files than try to ensure compatibility between different databases or data formats.
Databases support a wider variety of data formats than text files or spreadsheets do.
In a file-based storage model, when one user opens the file, it’s locked to other users. They may be able to view the file but not change it. A database system supports concurrent users without locking the whole database.
A single file-based data storage solution does not offer high enough speed for the volumes of transactions (adding and updating records) on enterprise-level systems.
What is a proper example of a string definition?
‘It’s going to be a great day.’
“It is polite to say "Thank you"”
“The sales person said to the customer: “Have a nice day!” and smiled.”
“We're so happy to see you!
When single or double quotes can be used to delimit a string, the quotes are not part of the string itself. To use a quote character within a string, an escape character () is used. Embedding "Thank you" into the rest of the string is the proper way of defining it.
The quoted portion needs to have an escape character () preceding each quote character: "Have a nice day!", for the string to be processed correctly.
The apostrophe (single quote) needs to have an escape character () preceding it: ‘It's going to be a great day.’
The delimiter needs to be consistent: if it starts with a double quote, it needs to end with a double quote.
A company operates in 2 offices. Both offices are located in the same town, with about 100 employees in each building. What type of network does it need to connect all of its employees, LAN (Local Area Network), or WAN (Wide Area Network)?
LAN, because the company owns the equipment and cabling required to set it up
WAN< because there are multiple locations
LAN, because the offices are local to each other
WAN, because LAN is unable to accommodate more than a few computers
LAN is a network in a single location. WAN is a network in different geographic locations but with shared links. A company with employees in more than one location needs to use a WAN.
LAN is not limited to just a few computers; it can accommodate enterprise networks with hundreds of servers and thousands of workstations.
Regardless of how close the offices are to each other, they are not in the same location, so WAN needs to be used.
Even if the company already owns the equipment and cabling required to set up a LAN, it needs a WAN to connect all of the employees across multiple locations.
What is a true statement about permissions in a database which uses SQL (Structured Query Language)?
Only the owner of a database object can grant permission over that object to other users.
The owner of a database object has complete control over that object.
An account with permission to access records in a table can access all columns in the table.
The account that creates a database object is the permanent owner of that object.
When an account creates an object, it becomes the owner of that object, with complete control over it. The account has permission over the object as long as it remains the owner of the object.
The owner of a database object can be changed using the ALTER AUTHORIZATION statement.
The owner of a database object, as well as the owner of the database itself, can grant permission over that object to other users.
SQL supports a secure access control system where specific user accounts receive rights over different objects in the database, including at the column level. An account can have permission to access only specific list of columns in a table, instead of the entire table.
A program is a sequence of what?
Atrributes
Flow charts
Instructions
Functions
A program is a sequence of instructions which the computer performs. The sequence can consist of just one instruction, such as the popular example “print ‘Hello World’”, or thousands, even millions of instructions in a single program.
Functions are elements of programs, and can be something that the programmer creates, or internal system functions. But a program is not a sequence of functions.
A graphical flow chart helps to visualize the program sequence and understand the processes. It’s a tool that programmers use, not a component of a program.
An attribute is a term of OOP (Object-Oriented Programming) to define objects.
What should a user do to protect sensitive information from malware, when working on a public workstation?
Set up a firewall
Disable cookies
Clear the browser cache
Enable pop-up blockers
Using a public workstation carries a risk of malware, which can capture sensitive information. A good practice is to clear the browser cache before shutting down or logging off, and not to allow passwords to be cached.
Disabling first-party cookies is likely to leave a website unusable. Public workstations usually have layers of protection against intrusive settings changes. The options for deleting stored cookies are usually in the same place as clearing the cache, so can be done at the same time.
A pop-up blocker can protect the computer from adware, but not malware.
Public workstations typically do not allow users to make system changes, such as setting up a firewall.
A user runs Microsoft Edge on a Windows 10 desktop. For more secure browsing, the user tries to disable scripting, but cannot deactivate it. What should the user do?
Continue browsing with enabled scripting
Refraing from using microsoft edge
Switch to a differnet operating system
Install a scipt blocker add-on
Script blocker add-ons prevent unauthorized websites from running JavaScript, and provide control over which websites are allowed to run scripts. Browsers that do not allow the user to disable scripts can have add-ons.
If Microsoft Edge is the user’s preferred browser, then using a different browser is not as desirable as installing a script blocker add-on, and continuing to use the preferred browser.
If there was a good reason for the user to decide to disable scripting, then keeping it enabled is not the ideal solution.
Switching to a different operating system is a complicated process that takes a lot of time to do, while installing a script blocker add-on can take less than a minute.
Why would a programmer create a function instead of a procedure?
Procedures do not exist in some programming languages.
The function needs to include a nested loop, which does not work in a procedure.
The process which calls the function needs to receive back a return value.
Functions compile more efficiently.
The key difference between a procedure and a function is that a function can return a value to whatever called it, whereas a procedure cannot.
Nested loops work the same way in both functions and procedures.
There are many factors which affect code efficiency, including ways to program function calls. But using a function over a procedure for this reason is not a consideration.
Functions and procedures exist in all programming languages. Some languages make very little distinction between the two, and consider functions to be procedures which return a value.
An attacker successfully connects to an open wireless access point, and proceeds to monitor and capture the plain text traffic on the network. Which of the following integrity concerns does this describe?
A replay attack
A man in the middle attack
A denial of service attack
An impersonation attack
A Man-in-the-Middle (MitM) attack is where a host sits between two communicating nodes, and transparently monitors, captures, and relays all communications between them.
A replay attack is where a host captures another host’s response to some server and replays that response in an effort to gain unauthorized access.
An impersonation attack is where a person will attempt to figure out a password to gain access to a host, then hijacks the authorizations to the account and masquerades as that user.
A Denial of Service (DoS) attack is where an attacker targets the availability of a service. A DoS attack might tamper with a system or try to overload it in some way.
A programmer’s task is to analyze a colleague’s pseudocode and make it better. What will the programmer try to do?
Make it more compact and efficient
Make it human readable
Make it compile across all platforms
Make it run faster
“Better” code is a matter of some judgement, but it is desirable for a program to be as compact and efficient as possible. The fewer lines of code that can be used to perform the necessary instructions, the easier the code will be to maintain and update.
The pseudocode stage is a very early stage of the process, often before the selection of the programming languages. Compiling happens at a much later stage, for programs which use a compiled language.
Pseudocode is already human-readable.
Faster execution time is part of program optimization, which happens at a much later stage of the programming process.
Which of the following best describes containers and identifiers?
A container is a set of constants
An identifier is a type of container
Identifiers have attributes, properties, and methods
A container is a type of identifier
A container is a term for a special type of identifier that can reference multiple values (or elements). One example of a container construct is a simple array.
An identifier is a way to access a program element, such as a stored value, class, method, or interface. An identifier can be a variable, a constant, or a container.
A container is a set of values, not limited to constants.
Objects have attributes, properties, and methods. An identifier can reference an object, or other types of elements which do not have attributes, properties, or methods.
A relational database has a table, Customers, which contains information about the company’s customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What’s the best way to keep track of customers’ purchases in this database?
Create 2 new tables: Products and Purchases
Create a new table, Purchases, with fields “Customer”, “Date”, “Description” and “Amount”.
Extend the Customers table with new fields “PurchaseDate”, “PurchaseDescription” and “PurchaseAmount”.
Create a new table, Purchases, with fields “PurchaseDate”, “PurchaseDescription” and “PurchaseAmount”.
A proper relational database design has as little redundancy as possible in the data. In this example, customers can make multiple purchases, and multiple customers can purchase the same type of product. This relationship calls for a 3-table design: a list of customers, a list of products, and a cross-reference of which customers purchased which products.
A 2-table design, with a list of customers and a list of each of their purchases, means there is a duplication of product information.
A Purchases table, without a foreign key field to connect with the Customers table, is not a good relational model.
Adding new fields to the Customers table with information about a purchase creates redundancy when a Customer makes multiple purchases.
A laptop built a year ago is likely to have which CPU (Central Processing Unit)?
16-bit
64-bit
32-bit
128-bit
Most modern workstations and laptops use 64-bit CPUs.
Some budget laptop models might come with a 32-bit chip, though this is increasingly unusual.
16-bit CPUs were used several decades ago and were replaced by 32-bit CPUs. The first 32-bit CPU was introduced in 1985.
There are currently no mainstream general-purpose processors built to operate on 128-bit technology. Most modern CPUs feature Single-Instruction Multiple-Data (SIMD) instruction sets where 128-bit vector registers are used to store several smaller numbers, such as four 32-bit floating-point numbers. In other words, 128-bit processing is emulated with 32-bit or 64-bit architecture.
What type of access control and technology helps ensure non-repudiation, and tracks what users are doing on the network?
Authorization access
Lease privilege
Implicit deny
Accounting; logs
Accounting is usually provided for by logging events. This allows the accounting system to track what users are doing within the system and enforce non-repudiation.
Least privilege means that a user should be granted rights necessary to perform their job and no more.
As part of least privilege, access controls are usually founded on the principle of implicit deny. This means that unless there is a rule specifying that access should be granted (explicit authorization), any request for access is denied.
Access control or authorization models determine how users receive rights.
A new scanner is purchased for the office, and the technician is using a disk with driver software instead of Plug-and-Play. What is the most likely reason?
The computer is running Windows 7, which does not have Plug-and-Play.
Plug-and-Play installation did not work for this scanner model.
The scanner is wireless and therefore does not qualify for Plug-and-Play.
The technician does not have enough expertise to use Plug-and-Play.
Windows devices are now all Plug-and-Play (PnP). This means that when a new device is connected Windows identifies it and tries to install a device driver. When Plug-and-Play does not work, driver software may need to be installed manually before the device can be recognized.
Plug-and-Play is an automatic process and does not require any expertise to run.
Wireless devices need to be connected to the computer by adding them to the network or with a USB cable. Once the computer recognizes the device, Plug-and-Play starts automatically.
The earliest version of Windows that attempted PnP (not very successfully) is Windows 95. Windows 2000/XP provided highly improved PnP capability, and all subsequent versions, including Windows 7, have fully functional PnP.
A wireless network in a small home office generated poor signal quality. The signal improved when an old cordless phone stopped working. What problem did the cordless phone cause when it was active?
Bluetooth signal overlap
Attenuation
Interference
Modulation
Wireless radio frequency interference can be caused by many different things, including fluorescent lighting, microwave ovens, cordless phones, and heavy machinery.
Attenuation is the loss of strength of the wireless signal, and is determined by the distance between the wireless client and access point.
Modulation is the process of converting data into radio waves; it is what wireless networks use to send data.
Bluetooth uses the 2.4 GHz frequency range but a different modulation technique, so interference is not common. Even if the cordless phone was used with a Bluetooth-enabled headset, it is unlikely that the signal overlapped with the wireless network.
A website visitor realizes that an important notification is not showing because the browser has a pop-up blocker. What’s the best thing to do?
Use a different browser
Avoid visiting this website
Disable the pop-up blocker
Add an exception for this website
Most browsers have a list of exceptions, called Trusted Sites, of websites and individual web pages which are allowed to display pop-ups. Adding a trusted site is done through Settings or Options or Preferences, depending on the browser.
Disabling the pop-up blocker will have all websites with pop-ups displaying them, which can be very distracting, and interferes with a good browsing experience.
Using a different browser, one with the pop-up blocker disabled, for websites with important notifications as pop-ups, is time-consuming, and adds an unnecessary layer of complexity to web browsing.
If the problem is that an important notification is blocked, that means that the user needs to visit this website for a reason, otherwise the notification is unimportant.
Which of the following is the most likely example of cross-platform software?
Applciation that runs from the Chrome browser on a dell pc and safari browser on an iMac
Application that runs on a dell pc and a samsung smartphone
Application that runs on a dell pc and a samsung laptop
Application that runs on a samasung tablet and a motorola smartphone
A Dell PC (Personal Computer) and a Samsung smartphone do not have the same type of OS (Operating System) installed (unless they both have the Linux OS, which is unlikely). In most cases, the PC runs a version of Windows, and the smartphone has a version of Android OS. Applications that run on both of them are cross-platform.
A Dell PC and a Samsung laptop are likely to have the Windows OS. Single-platform software can work on both, even with different versions of Windows.
A Samsung tablet and a Motorola smartphone are likely to have Android OS. An app designed for just the Android OS is not cross-platform.
Web-only applications are single-platform, regardless of which browsers they support.
Which of the following helps to authenticate the user requesting a password reset over the telephone?
An IP address
Biometric recognition
A hardware token
Personally Identifiable Information (PII)
PII is often used for password reset authentication to confirm identity over the telephone.
Password-type credentials are generally seen as not providing adequate security for high-risk applications. One solution is to provide each user with a unique hardware token to prove their identity.
“Something you are” authentication means employing some sort of biometric recognition system. Many types of biometric information can be recorded, including fingerprint patterns, iris or retina recognition, or facial recognition.
An IP address can be used to refer to a logical network segment or it could be linked to a geographic location using geoip.
An office computer needs a new keyboard and mouse. Before ordering them, the assistant should check which ports are available, to decide which style to purchase. Which port is NOT part of the consideration?
PS/2
Bluetooth
USB
HDMI
HDMI (High Definition Multimedia Interface) is the most widely used graphic device interface. HDMI can be used to connect the computer to an output device, such as a monitor, but not to input devices, such as keyboard or mouse.
Historically, mice and keyboards used the PS/2 interface, which had a round connector with pins. A keyboard PS/2 port is colored purple to differentiate it from the otherwise identical mouse connector, which is color-coded green.
Modern mice and keyboards use USB (Universal Serial Bus) ports to connect to a computer. The connection can be wired or wireless via a USB dongle.
Modern mice and keyboards use Bluetooth ports for wireless connections to a computer.
What type of software is project management software?
Networking software
Productivity software
Collaboration software
Business software
Project management involves breaking a project into a number of tasks and assigning responsibilities, resources, and timescales to ensure the completion of those tasks. Specialized business software such as Microsoft Project assists with this process by visualizing task timelines and dependencies, and recording information about task properties and progress.
Productivity software refers to applications that help users complete typical office tasks. Project management is a more complex task with many functions, and requires specialized business software.
Collaboration software means that multiple users can work together on the same file or project. Working on a project is very different from managing a project, and requires different type of software.
Networking software is for administrators to deploy, manage, and monitor a network.
Which of the following ways best defeats social engineering?
By establishing enough trust with end-users so they will reveal secure information
Allowing access to network resources by using innocuous data
Training end-users how to identify and report suspicious activity on the network or workstation
Making sure employees directly observe other users type passwords
Social engineering is best defeated by training users to recognize and respond to social engineering attacks. Users should understand what constitutes secure information and know in what circumstances, if any, it should be revealed to other people.
Shoulder surfing is a social engineering attack that involves stealing a password or PIN, or other secure information, by watching the user type it.
Being convincing or establishing trust is a social engineering trick that usually depends on the attacker obtaining privileged information about the organization.
Often, malicious people can start to gain access to your network resources through the use of seemingly innocuous data.
Which of the following SQL (Structured Query Language) commands can run with just one parameter?
Create table
Create view
Create database
Create index
The CREATE DATABASE command requires just one parameter: the name of the database. Other parameters which configure the new database are optional.
The CREATE TABLE command requires the name of the table, as well as at least one column name and its specifications.
The CREATE INDEX command requires the name of the index, the table that will have the index, and which column(s) are in the index.
The CREATE VIEW command requires the name of the view, and the contents of the view, such as a query from a table with some criteria.
Which of the following will NOT help prevent the attachment of portable personally owned devices, such as smartphones and Universal Serial Buses (USBs)?
Endpoint security
Network access control
Data loss prevention solutions
Requiring a fob
The most widely implemented way to authenticate a user, based on something they have, is the smart card or Universal Serial Bus (USB) fob, which contains a chip with authentication data, such as a digital certificate.
Network access control is one way of preventing the attachment of portable devices, such as smartphones and USB sticks to corporate networks.
Endpoint security is one way of preventing the attachment of portable devices, such as smartphones and USB sticks to corporate networks.
Data loss prevention solutions are one way of preventing the attachment of portable devices, such as smartphones and USB sticks to corporate networks.
Who can view the contents of a text file located in the public profile?
Administrator has full access to all files in all folders
Only users who are granted permission to view the file can access it
The owner of the file can always access that file
Any user has access to files in the public profile
Users need to have the “read” permission on a file to view its contents.
If the owner of the file set the permissions to deny access for all users, then nobody can view the contents of the file, not even its owner or the administrator. An administrator can take ownership of the file and change the permissions.
If the permissions are set to restrict the owner from being able to read the file, then the owner cannot view the contents. The owner can change the permissions to be able to view the contents of the file.
Users have access to the public profile, but can only view the contents of files with “read” permissions granted to their accounts.
Which of the following is the best example of variety of data in a database?
A table with a tinyint, integer, float, and decimal fields
A table with a string, number, and date fields
A string field with data in multiple languages
A number field with values from -999,999,999,999 to 999,999,999,999
Databases support a wider variety of data formats than text files or spreadsheets do. String, number, and date fields offer a wide range of storage and computing formats, as well as processing capabilities.
Tinyint, integer, float, and decimal fields represent numerical data fields. They differ in how they store the data, but not enough in their computing operations.
Variety of data refers to multiple data formats, not languages. A string field has certain operations available to it, such as combining it with another string field, and the multi-language content of the field makes no difference to that.
Variety of data does not refer to a wide range of values in one data format.
What do the instructions in this pseudocode do?
declare Animal(9) as String
For i = 0 to 9
If i > 5 Then
Animal(i) = “dog”
Else
Animal(i) = “cat”
End If
Next
Set the first 6 elements of the array Animal to “dog”, and the rest to “cat”.
Set the first 5 elements of the array Animal to “dog”, and the rest to “cat”.
Set the first 5 elements of the array Animal to “cat”, and the rest to “dog”.
Set the first 6 elements of the array Animal to “cat”, and the rest to “dog”.
This pseudocode loops 10 times. It branches to set the array Animal to “dog” only when i is more than 5, which happens with values 6 through 9. For the first 6 values (0 through 5), it branches to set the array to “cat”.
If the condition was “i >= 5”, then it would set the first 5 elements of the array to “cat”, and the rest to “dog”.
If the condition was “i < 5”, then it would set the first 5 elements of the array to “dog”, and the rest to “cat”.
If the condition was “i >= 5”, then it would set the first 6 elements of the array to “dog”, and the rest to “cat”.
Which of these practices is unsecure as your security becomes dependent on other organizations’ security measures?
Reusing across sites
Writing down password
Shortening password expiration
Using passphrase with special characters
Resuing the same password on different organizations’ sites is unsecure, as your security becomes dependent on the security of these other (unknown) organizations.
Passwords should be changed periodically. Many systems can automatically enforce password expiration, meaning users have to choose a new password.
Using a long phrase, perhaps with one or two symbols and numbers mixed into it, can offer a good balance between complexity and memorability.
To maintain confidentiality, users should neither write down passwords nor share them with others. Users must keep their work passwords known only to themselves. Employees should be trained to understand what information is confidential and how to handle it correctly.
What type of process is the Windows Task Scheduler?
Cron job
Application
Service
Batch file
A service is a Windows process that runs in the background, without a window or user interaction. Task Scheduler is a service which sets up computers to run automated tasks.
An application is a program with which users interact on the desktop. Task Scheduler runs in the background, whether or not a user scheduled anything manually via its console, as many of Windows’ processes come with predefined task schedules.
A batch file is a plain-text script file, with a series of commands which are executed by the command-line interpreter. Windows built-in administration tools such as the Task Scheduler are not batch files.
The software utility cron is a time-based job scheduler in Unix and Linux computer operating systems.
A website visitor realizes that an important notification is not showing because the browser has a pop-up blocker. What’s the best thing to do?
Add an exception for this website
Avoid visiting this website
Use a different browser
Disable the pop-up blocker
Most browsers have a list of exceptions, called Trusted Sites, of websites and individual web pages which are allowed to display pop-ups. Adding a trusted site is done through Settings or Options or Preferences, depending on the browser.
Disabling the pop-up blocker will have all websites with pop-ups displaying them, which can be very distracting, and interferes with a good browsing experience.
Using a different browser, one with the pop-up blocker disabled, for websites with important notifications as pop-ups, is time-consuming, and adds an unnecessary layer of complexity to web browsing.
If the problem is that an important notification is blocked, that means that the user needs to visit this website for a reason, otherwise the notification is unimportant.
What is the easiest way to install a standard mouse, and configure it to use basic settings?
Get the disk with a spaced driver
Download online driver from the manufacturer
Use Control Panel/Settings
Use the Mouse app on the smartphone
A standard mouse does not need a special driver for installing. Basic settings can be configured using the Mouse applet in Control Panel/Settings.
To access and configure extra buttons on some mice, the manufacturer’s driver is needed. The driver is on a disk included with the mouse.
In the absence of a disk with the driver, it can usually be found online on the manufacturer’s website, and downloaded for installation. The driver is needed to access and configure extra buttons on some mice, not to install the mouse and configure basic settings.
There are apps on the smartphone which enable the smartphone to operate as a mouse, but they are not used for installing and configuring a standard mouse.
What does a PC (personal computer) need more of to open more programs simultaneously and work on large files more efficiently?
HDD
CPU
SDD
RAM
RAM (Random Access Memory) is the main storage area for programs and data when the computer is running. Having more RAM allows the PC to open more programs simultaneously and work on large files more efficiently.
RAM only works while the power is on, so when the computer is turned off, programs and data are stored on an HDD (Hard Disk Drive), a mass storage drive based on magnetic disk technology. The size of HDD does not affect efficiency of working on programs and files.
SSD (Solid State Drive) is similar to HDD, which uses a type of transistor-based memory called flash memory, so is much faster than HDD.
CPU (Central Processing Unit) is the device that runs software programs.
An Employee object includes the following fields: Name, Address, Phone, Age, DateOfBirth, Salary. Which of the following is NOT a good example of a method in this object?
CalculateSalesTax, which multiplies two numbers (input as variables) and returns the result to the calling program
EstimateRaise, which calculates a percentage (input as a variable) of the Salary field
UpdateAge, which subtracts DateOfBirth from today’s date and updates the Age field with that value
PrintAddressLabel, which displays the values of the Name and Address fields
CalculateSalesTax works with information which is not in the Employee object, so it needs to be an independent function in the program, and not a method of the Employee object.
EstimateRaise uses the Salary field of the Employee object to make a calculation which the calling program needs for its purposes. This is a good example of a method of the Employee object.
UpdateAge updates a field in the Employee object, which is the proper use for a method.
PrintAddressLabel works with multiple fields in the Employee object, and is a good example of a method.
What is an advantage of a relational database over a key/value pair database?
Relational databases use less memory to store the data
Relational databases support more data types
Relational databases have a less complex design structure
Relational databases have query languages to retrieve data
Key/value pair databases usually do not have query languages to retrieve data. They only provide some simple operations such as get, put, and delete, so any data querying (retrieving) takes place manually at the application level.
Key/value pair data does not need to have a formal structure, which means that its data model is less complex than a relational database.
Key/value pair databases do not use placeholders to store optional values, which most relational databases do. This means that key/value pair databases often use far less memory to store the same amount of data.
Key-value databases do not have any restrictions for data types. Relational databases support a wide range of data types, but not an unlimited amount.
A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?
The enclosure converts the external hard drive into terminal
The enclosure protects the fragile drive from water damage
The enclosure converts a 2.5” portable drive into the 3.5” desktop standard
The enclosure provides ports to connect the drive to the computer
The external hard drive is shipped in a special enclosure, which provides some combination of USB, Firewire, eSATA, and/or Thunderbolt ports to connect the drive to the computer.
An external hard drive can be used as an internal drive, but the special enclosure that comes with it is not used for that purpose.
External units may be designed for desk use (3.5” drives) or to be portable (2.5” drives). 3.5” drives require a separate power supply, so most external drives now use the 2.5” form factor. The enclosure that comes with the drive is not used to convert one into the other.
There are special waterproof enclosures available to protect the external drive from water damage, but most do not.
What is the correct SQL (Structured Query Language) command to read information from a table?
RETRIVE
SELECT
VIEW
EXTRACT
The SELECT command is the first building block of a query to retrieve data from a database. SQL clauses such as FROM, WHERE, and ORDER BY are other building blocks of a query statement.
Even though specifications for queries frequently use the term “retrieve”, it is not part of the SQL syntax.
EXTRACT is a SQL function which extracts a part from a given date, e.g. SELECT EXTRACT(MONTH FROM “2020-01-01”). This function is not available in all SQL versions.
A VIEW is a virtual table based on the result set of an SQL statement.
When does this pseudocode execute the print command?
If i == 0 XOR i != 0 Then
print “Yes”
End If
When i is not equal to 0
Always
Never
When i is equal to 0
XOR (Exclusive OR) evaluates if either condition is true but not both. In this example, i is always either equal to, or not equal to, 0, at different times, so the branch sequence always executes.
If the operator was AND, then the statement would always be false, because “i is equal to 0” and “i is not equal to 0” cannot be true at the same time, and the branch sequence would never execute.
If this example had only the first condition, then the branch sequence would execute when i is equal to 0.
If this example had only the second condition, then the branch sequence would execute when i is not equal to 0.
Which 802.11 wireless standard can use both 2.4 GHz (Gigahertz) and 5 GHz frequency bands?
802.11a
802.11ac
802.11g
802.11n
The 802.11n standard, available since 2009, can use either 2.4 GHz or 5 GHz frequency band and supports data rates of up to 600 Mbps (Megabits per second).
The 802.11g standard, available since 2003, uses the 2.4 GHz frequency band and supports data rates of up to 54 Mbps.
802.11a is the original standard, available since 1999. It uses the 5 GHz frequency band and supports data rates of up to 54 Mbps. 802.11a was not as widely adopted as the other standards.
802.11ac is the latest standard, available since 2013. It is widely supported, and delivers up to 1.7 Gbps throughput, but only in the 5 GHz range.
Why is it important to write data to a storage device, such as a hard disk?
Data stored in system memory is only preserved while the computer is powered on
Data is available for processing only when it’s on a storage device
Data on a storage device uses less space than when it’s in system memory
Data stored in system memory cannot be shown to the user
Writing data to storage devices, such as hard disks or optical discs, is an important step for preserving data for later use, because data stored in most types of system memory is only preserved while the computer is powered on.
Data can be processed by the CPU when it’s on a storage device or in system memory.
Data can be shown or played to the user when it’s on a storage device or in system memory.
The space used by data is determined by the content of the data, and not its location.
Which numbers does this pseudocode display?
declare i as Number = 10
Do While i > 0
If i < 7 Then
i = i - 1
End If
print i
i = i - 1
Loop
10, 9, 8, 7, 6, 5, 4, 3, 2, 1
9, 7, 5, 3, 1
10, 9, 8, 7, 5, 3, 1
9, 8, 7, 6, 5, 4, 3, 2, 1, 0
-10,9,8,7,5,3,1-This pseudocode loops backwards from 10, decreasing the value of i inside the loop. Until i is less than 7, it decreases by 1, after that it decreases by 1 twice per loop (once inside the branch, and once outside the branch).
If the pseudocode did not include the branch, then every number from 10 to 1 would be printed.
If the pseudocode did not include the branch, and the print command followed the command to decrease i, then every number from 9 to 0 would be printed.
If the branch condition was always true (for example, “if i <= 10”) then only the odd numbers from 9 to 1 would be printed.
The systems administrator just found out that a user has been using the same password for the last two years. Which of the following password best practices should the systems administrator enforce?
Maintain confidentiality
History/Expiration
Memorability
Reuse across sites
Many systems can automatically enforce password expiration, meaning users have to choose a new password. Such a system may keep a history of previously used passwords to prevent users from reusing passwords.
A typical user might be faced with having to remember many logons for different services at work and on the Internet and resort to reusing the same password for each, which is unsecure.
Maintaining confidentiality means that a user should not write down a password or share it with other users.
Artificial complexity makes a password hard to remember, meaning users write them down or have to reset them often. Using a long passphrase, with symbols and numbers mixed, can offer a good balance between complexity and memorability.
What does this pseudocode do?
declare i as Number = 0
Do While i <= 100
i = i + 1
print i
i = i - 1
Loop
Displays numbers from 1 to 100
Produces an infinite loop
Displays number “1” 100 times
Displays numbers from 0 to 99 times
In this pseudocode, the variable i never changes. First it increases by 1, and then decreases by 1, so the condition to end the loop is never met. The program never stops displaying number “1”, and is stuck in an infinite loop until the system crashes or the user interrupts it.
If the pseudocode did not include “i = i - 1”, then it would display numbers from 1 to 100.
If the pseudocode did not include “i = i - 1” and the print statement was first inside the loop, then it would display numbers from 1 to 100.
The pseudocode displays number “1” an infinite number of times.
A web application needs to make changes to the contents of a table in a database, in response to a user’s input. What method contains the command to do that?
DCL (data control language)
DML (data manipulation language)
XML (eXtensible Markup language)
DDL (Data definition language)
DML (Data Manipulation Language) commands refer to SQL (Structured Query Language) commands that access or modify the contents of the database. DML commands include UPDATE, which changes the value of one or more table columns, for a specified set of rows.
DDL (Data Definition Language) commands refer to SQL commands that add to or modify the structure of the database.
DCL (Data Control Language) mainly deals with the rights, permissions, and other controls of the database system, with commands such as GRANT and REVOKE.
XML (eXtensible Markup Language) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
What is the term for the processing speed of 1 billion cycles per second?
Bps
GHz
MHz
GBps
GHz stands for Gigahertz, which is 1000 million or 1 billion (1,000,000,000) cycles per second, when measuring a computer’s internal clock and the speed at which its processors work.
MHz stands for Megahertz, which is 1 million (1,000,000) cycles per second, when measuring a computer’s internal clock and the speed at which its processors work.
Bps stands for Bytes per second when measuring the rate at which data is transferred between components in the computer or between computers over a network.
GBps stands for Gigabytes per second (1,000,000,000 bytes per second) when measuring the rate at which data is transferred between components in the computer or between computers over a network.
What is true about firewalls?
A firewall provides a way to restrict access to a computer or network
A firewall needs to block all outside access to a computer, creating a barrier of protection around it
Firewalls are physical devices that have to be connected to the computer for protection against threats
Computers connected to the internet need to have several host firewalls running for complete protection
A firewall restricts access to a computer or network to a defined list of hosts and applications, by blocking or allowing specific IP (Internet Protocol) addresses and port numbers.
A firewall can be set up to block all outside access to a computer, but its purpose is to offer protection while allowing the computer to be connected to the Internet, which means that some hosts and/or applications need to be on the “approved” list.
One type of firewall is a hardware firewall, which is a dedicated appliance with the firewall installed as firmware. Other types of firewalls are software applications.
More than one host firewall running at the same time can conflict with each other.
Which of the following does NOT follow accepted MAC (Media Access Control) address format?
0123456789ff
a1-b2-c3-d4-e5-f6
192:168:0.10/100
1111.2222.3333
The MAC address, also called a hardware address, is a 48-bit value expressed in hexadecimal notation. There are several accepted formats to display the numbers in equal-sized groups, and separators include colons, hyphens, and periods. There is no accepted format with slashes or groups of unequal lengths.
The MAC address is often displayed as six groups of two hexadecimal digits with colon or hyphen separators.
MAC addresses can be displayed with no separators at all, as one 12-digit hex number.
MAC addresses can be displayed as three groups of four hex digits with period separators.
How is business software different from productivity software?
Business software is for a particular process, and productivity software is for general office functions.
Business software is for a particular process, and productivity software is for general office functions.
Business software is for a particular process, and productivity software is for general office functions.
Business software is for managers and executives, and productivity software is for general office staff.
Productivity software covers general office functions and tasks, while business software is designed to assist with a particular business process or consumer demand.
Both business and productivity software are used by managers, executives, and general office staff. An executive may use presentation software to show projections to the shareholders, while the office employees use specialized database software to generate daily reports.
Both business and productivity software are used by business owners and their employees. Specialized accounting software is used by employees in the payroll department and by small business owners to generate invoices.
Business software is designed to assist with a particular business process or consumer demand, which can fall into any category of a business, including increasing productivity.
What is the second step in CompTIA’s troubleshooting model?
Establish a plan of action to resolve the problem
Research knowledge base/internet, if applicable
Establish a theory of probable cause
Identify symptoms
It is important to know all 8 steps of the CompTIA troubleshooting model in their proper order. Step 2 in CompTIA’s troubleshooting model is to research knowledge base/Internet, if applicable.
Step 1 in CompTIA’s troubleshooting model is to identify the problem. One of the six components of this step is to identify symptoms, which might not be necessary if the problem can be easily duplicated.
Step 3 in CompTIA’s troubleshooting model is to establish a theory of probable cause.
Step 5 in CompTIA’s troubleshooting model is to establish a plan of action to resolve the problem and identify potential effects.
Which file system allows a file with the name “Encyclopedia:Volume 1.txt”?
Ext4
FAT32
HFS+
NTFS
File systems have a number of reserved characters which cannot be used in a file name. Ext4 (4th extended file system), used by Linux distributions, only reserves the slash (/), which means that all other characters are acceptable in a file name. No system allows the slash character in their file names, as it’s used to indicate folders or subdirectories.
HFS+ (extended Hierarchical File System), used by Apple Mac computers, does not allow colons (:) in addition to the slash.
NTFS (New Technology File System) has 9 reserved characters, including the colon.
FAT32 (File Allocation Table, 32-bit version) has 16 reserved characters, including the colon.
Which of the following encrypts data at rest?
File-level encryption
Hypertext Transfer Protocol Secure (HTTPS)
Secure Sockets Layer(SSL)/Transport Layer Security (TLS)
A transport encryption protocol
With data at rest, it is usually possible to encrypt the data using techniques such as whole disk encryption, mobile device encryption, database encryption, and file- or folder-level encryption.
With data in transit (or data in motion) data can be transmitted over a network such as communicating with a web page via HTTPS.
With data in transit (or data in motion) data can be protected by Secure Sockets Layer (SSL)/Transport Layer Security (TLS).
With data in transit (or data in motion) data can be protected by a transport encryption protocol.
What is the difference between the address length of IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6)?
IPv4 addresses are 32 bits, and IPv6 addresses are 64 bits.
IPv4 addresses are 32 bits, and IPv6 addresses are 64 bits.
IPv4 addresses are 4 bits, and IPv6 addresses are 6 bits.
IPv4 addresses are 32 bits, and IPv6 addresses are 128 bits.
An IP (Internet Protocol) address is the location of any device that connects to the internet. IPv4 addresses are 32-bit numbers presented in 4 8-bit sequences, each sequence between 0 and 255. IPv6 addresses are 128-bit numbers, represented as 8 groups of 4 hexadecimal digits, each group representing 16 bits.
IPv4 addresses are 32 bits, and so was the next version, IPv5, which was created but never became an official protocol. IPv6 did not double the bits to 64.
The “4” and “6” in IPv4 and IPv6 stand for “version”, not the number of bits.
IPv4 addresses are presented in 4 groups, and IPv6 addresses are presented in 8 groups, but the total bit count is not 4 and 8.
How does an object store its attributes?
As a vector
As private variables
As public variables
As comments
Attributes are values and data types that define the object. The object stores the attributes as fields or private variables.
Other programs cannot access or change the attributes of an object directly, the way that they can with public variables.
Most programming languages support container types called vectors that can grow or shrink in size as elements are added or removed. Vectors are specialized types with their own rules and limitations, and objects do not use them to store their attributes.
Programmers use comments in code to assist with maintaining it, not for attributes of objects.
A computer program contains a boolean variable. What are the stored values of this variable?
0,1
FALSE, TRUE
“F”,”I”
“false”,”true”
Boolean data types are stored as a special numeric data type, which take up one bit. The only possible values are 0 and 1.
User-friendly constants such as FALSE and TRUE must be defined in the program prior to using them for working with boolean variables. These constants are typically defined as 0 and 1 respectively, which is how they are stored in the system.
Definitions such as “false” or “true” are of string data type, using several bytes of storage instead of one bit that boolean data types use.
Definitions such as “F” or “T” are of char data type, using one byte of storage instead of one bit that boolean data types use.
Why do companies pay for a software license subscription plan instead of a less expensive one-time purchase?
One-time purchases do not include full-feature upgrades
One-time purchases are for only one computer installation
One-time purchases do not include customer support
One-time purchases provide a limited-time use of the software
With a one-time purchase of a software license, subsequent upgrades normally involve a new license fee. One-time license holders typically receive incremental upgrades and security fixes, but not full-feature upgrades. With subscription-based licensing, organizations pay a per-user monthly fee to get access to the software, with full-feature upgrades as part of the subscription.
The one-time purchase of a software license grants perpetual use of the software to the buyer, but without full-feature upgrades, so after a period of time, the software becomes outdated.
One-time purchases of licenses can be for group use, with installations on a specified number of devices or user seats.
The one-time purchase of a software license includes full customer support.
In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set?
The number of tables
the number of columns
The number of rows
The number of fields
With the WHERE clause, an SQL command (such as SELECT, UPDATE, or DELETE) extracts only those records, or rows, that fulfill a condition.
The WHERE clause does not affect the number of columns. SELECT and UPDATE commands list the columns which the SQL statement processes, for the rows that fulfill the condition in the WHERE clause.
Fields are the same as columns, and the WHERE clause does not affect them.
The WHERE clause can include tables in the condition. For example, if the SQL statement involves more than one table, then the WHERE clause contains the logic to connect them. But the result set is only the records, or rows, that fulfill the condition in the WHERE clause.
Data encryption, firewalls, and backups are examples of what?
Data breach
Security controls
Intellectual property
Data capture
Security controls are designed to prevent, deter, detect, and/or recover from attempts to view or modify data without authorization. Typical examples of security controls include backups, access control, data encryption, and firewalls.
Data breach is when private data is exposed publicly without authorization. Preventing data breach is one of the reasons for having security controls in place.
Data capture refers to collection of data points from many different sources as part of data analytics.
Intellectual property refers to information assets, such as patents, which need to be protected from theft.
A user wants the easiest and most secure way to prevent websites from discovering the IP (Internet Protocol) address of the computer. What should the user do?
Switch to incognito mode
Go into private browsing mode
Use a virtual private network
Use an SSL proxy
For fully “anonymous” browsing, the user needs to use a VPN (Virtual Private Network) which is a software service that encrypts the data sent to and from the internet and routes it through a VPN server in another location, so that websites see the server’s IP address. Most VPN’s do not require extra configuration.
Proxies hide the device’s IP address from websites, but an SSL proxy typically lacks the encryption and other security features offered by VPNs. Proxies also usually require extra configuration.
In private mode, the browser doesn’t store cookies or temporary files, but the browser does send some information to the website, such as the computer’s IP address.
Incognito mode is the same as private browsing mode.
What’s a true statement about markup languages?
Markup languages are not programming languages
Markup languages are not human-readable
Markup languages are only used to program web pages
Markup languages can only be used on one platform
A markup language is not a programming language but a means of making data in a document accessible to a program. A markup language, such as HTML (HyperText Markup Language) or XML (eXtensible Markup Language), defines a series of nested tags that describe the structure and/or meaning of the tag contents.
Human-readable data is encoded as text, and machine-readable data (machine code) is the binary representation. Markup language documents contain text data.
Markup language documents are used by programming languages on different platforms.
Web pages can display HTML files, but in general, markup language documents present data to programs for processing. These programs include web pages and applications, as well as locally installed applications on other platforms.
What is the difference between WPA (Wi-Fi Protected Access) and WPA2 wireless encryption standards?
WPA2 uses Rivest Cipher
WPA2 uses Advanced Encryption Standard
WPA2 uses Temporal key integrity protocol
WPA2 uses captive portals
The main difference between WPA and WPA2 is the use of the AES (Advanced Encryption Standard) cipher for encryption. AES is much stronger than the ciphers used by the other standards, WPA and WEP (Wired Equivalent Privacy).
WEP is an older standard which uses the weak RC4 (Rivest Cipher), and should only be used for encryption if there is an issue of compatibility with legacy devices and software.
WPA uses the same weak RC4 cipher as WEP but adds a mechanism called TKIP (Temporal Key Integrity Protocol) to make it stronger.
A captive portal is a secondary authentication mechanism managed via a browser, when open authentication is required, such as on a public access point.
The person reporting a problem is likely to be the main source of information about it. However, if this is insufficient to successfully troubleshoot, what is a good next step to take?
Use a product knowledge base
Escalate the problem
View log files
Suggest workarounds
If the information provided about the problem is insufficient to successfully troubleshoot, the next step is to consider other sources, such as viewing system, application, or network log files, or monitoring other support requests to identify similar problems.
Once sufficient information is gathered, then it may be necessary to use a product Knowledge Base or a web/Internet search tool to research the symptoms.
If none of the available resources are sufficient to diagnose or resolve the problem, it may be necessary to escalate it.
If one troubleshooting method does not yield results, it may be time to suggest workarounds which can provide a way for the user to continue to work with the system while the problem is being resolved.
Which backup storage type best helps mitigate against critical data loss in the risk of fire or theft?
Locally attached storage
Cloud-based storage backup
Test restore
System backup
Offsite/cloud-based is backing up data over the Internet to cloud-based storage. Keeping offsite copies of data is very important in mitigating against the risk of fire or theft.
Locally attached storage uses hard disks or flash drives attached to a local PC or server. Hard disks or flash drives can be stolen or destroyed.
A system backup is an operating system (OS) backup that makes a copy of the OS and installed applications so that a workstation or server can be recovered without having to manually reinstall software and reconfigure settings.
A test restore is important when using new backup software, to test old backup media, to check a new job, and to carry out random spot checks.
What uses the same physical interface as MiniDP (mini DisplayPort format)
Mini HDMI
THunderbolt
DisplayPort
Micro HDMI
The Thunderbolt interface is primarily used on Apple workstations and laptops. Thunderbolt can be used as a display interface and as a general peripheral interface. In its first two versions, Thunderbolt uses the same physical interface as MiniDP. Thunderbolt ports are distinguished from MiniDP by a lightning bolt icon.
DisplayPort uses a 20-pin connector. The Mini DisplayPort (MiniDP or mDP) is a miniaturized version of DisplayPort developed by Apple.
HDMI uses a proprietary 19-pin connector, as does its miniaturized version, Mini HDMI, frequently used on portable devices, such as camcorders.
Micro HDMI, an even smaller connector than Mini HDMI, also has 19 pins.
When using web search engines, why should privacy considerations affect a user’s decisions?
A user’s web searches prevent companies from using targeted advertisements.
A user’s web history skews sales and marketing trends amongst consumers
A user’s private data can appear in web searches.
A user’s web searches can reveal very valuable information.
Privacy considerations should affect your choice of Internet Service Provider (ISP) and web search engines. Your browsing and search history reveal an enormous amount of very valuable personal information.
If you make something public accidentally, it can be very difficult to stop people from continuing to publish it elsewhere. Public data can be archived and continue to appear in web searches.
Information about individual consumers gleaned from web search and social media histories allows for personalized advertising.
Large data sets, such as web searches and social media histories, can be used to identify trends, and develop products and services to meet changing demands and interests.
Which protocol supports interactive mechanisms GET and POST?
SMTP
IMAP
HTTP
POP3
HTTP (HyperText Transfer Protocol) is used for rendering web pages, and features forms mechanisms GET and POST which allow a user to submit data from the client (user’s device) to the server (where the website is being processed).
POP3 (Post Office Protocol v3) is used for retrieving email messages to the user’s mail client software (such as Microsoft Outlook). With POP3, the messages are usually deleted from the server when they are downloaded.
IMAP (Internet Message Access Protocol) is used for retrieving email messages to the user’s mail client software, allowing the client to manage the mailbox on the server.
SMTP (Simple Mail Transfer Protocol) is used to deliver email messages to the email server of the recipient.
If a password is short and non-complex, what type of attack can it be vulnerable to?
Malware
Man-in-the-middle (MitM)
Distributed Denial of Service (DDoS)
Brute Force
If a password is short (under seven characters) and non-complex (using only letters for instance), a password might be cracked in minutes via brute force.
Denial of Service (DoS) is where an attacker targets the availability of a service. A DoS attack might tamper with a system or overload it. A Distributed Denial of Service (DDoS) uses hosts compromised with bot malware to launch a coordinated attack against a web service.
It is possible to capture cleartext password packets in transit via a Man-in-the-Middle (MitM) attack.
Malware is malicious software threats and tools designed to vandalize or compromise computer systems.
The direct database access method is the best method to run which SQL (Structured Query Language) command?
Update
Grant
Select
Insert
Direct access provides tools for database administrators to run SQL commands. They can run commands, which interact with the data or perform database administration tasks. The GRANT command assigns permissions on database objects to users, so the database access methods for non-administrative users should not run it.
Applications with utility or programmatic access use the UPDATE command to make changes to specific records, without risk to the rest of the database.
Applications with utility or programmatic access use the INSERT command to add new information into the database.
All database access methods use the SELECT command to retrieve data for processing, as well as to run queries/reports.
What is the fastest downlink speed that the typical cable Internet service providers offer to their customers?
100 Mbps
24 Mbps
1.2 Gbps
52 Mbps
Most cable service providers offer downlink Internet connection speeds of up to about 100 Mbps in their premium packages.
Cable based on the DOCSIS (Data Over Cable Service Interface Specification) version 3.0 supports downlink speeds of up to about 1.2 Gbps, but cable service providers do not normally offer that to their customers.
Residential DSL services support downlink speeds of up to 24 Mbps.
VDSL (Very High Bit Rate DSL), which is implemented by fiber optic services as part of the FTTC (Fiber to the Curb) solution, supports downlink speeds of up to 52 Mbps.
A senior manager of a regional office branch needs a payroll report of all staff, to calculate next year’s budget. Which program is NOT useful for that?
Database software
Project management software
Spreadsheet software
Accounting software
Project management software assists with the process of breaking a project into a number of tasks and assigning responsibilities, resources, and timescales to ensure the completion of those tasks. It is not designed for generating payroll reports.
Accounting software is the best way to generate payroll reports. Accounting programs contain ready-made reports which calculate and display payroll data in the most frequently used formats. Reports can also be easily customized to fit most business needs.
Database programmers can use database software to create custom reports from the data stored in the database.
Payroll data can be stored in a spreadsheet, or imported from a database or accounting software into a spreadsheet, and displayed in report format.
Why would a locally installed application store data files in a user folder and not the application folder?
To separate the data layer from the application layer
To be able to uninstall the application without deleting the data files
For faster backups of the data files
To prevent users from modifying application folders
Data files manipulated by the application can be stored on the local disk, usually in a user folder rather than the application folder. Ordinary users should not be able to modify application folders, for security reasons.
Data and application layers are terms used in database application architecture models, to describe the way that the application interacts with the database. Data files used by the application are not in this category.
If the data files are part of the database uninstall process, they get deleted regardless of their location.
Data files can be backed up regardless of their location, with no impact on the speed of the process.
What is the difference between a password and a passphrase?
A passphrase is shorter than a password, but easier to remember
A passphrase is shorter than a password, but more difficult to remember
A passphrase is longer than a password, and easier to remember
A passphrase is longer than a password, but more difficult to remember
A passphrase is a longer password comprising several words. This has the advantages of being more secure and easier to remember.
A passphrase is a longer password comprising several words. While a passphrase is easier to remember than a password, a passphrase is longer than a password.
A passphrase is a longer password comprising several words. While a passphrase is longer than a password, it is easier to remember than a password.
A passphrase is a longer password comprising several words. A passphrase is longer than a password, and easier to remember.
What is an example of using a locally installed application without network access?
Using Microsoft Outlook to check email
Using Apple iTunes to listen to a podcast
Using the Intuit Quicken banking application to pay bills
Using Microsoft Word to write a letter to
A locally installed application does not need network access to run, but the network has to be present if the application makes use of network features. Using Microsoft Word to write a letter does not require network connection.
Checking email requires an Internet connection. If done from an application like Outlook, it needs network connection to download messages from the email server.
Quicken is a personal finance management tool. It does many tasks locally, like budget reports, but it needs Internet connection to send a banking institution the instructions for paying bills.
iTunes is a media library and player. It can play locally stored music files, but needs to be connected to the Internet to play or download a podcast.
A complex software application collects requests from general users for certain sets of data through a form, connects to a Microsoft SQL (Structured Query Language) Server database with ODBC (Open Database Connectivity), submits the criteria for the data query, receives the results, and displays them to the users as a report on the screen. Which combination of database access methods best describes this process?
Direct access and query builder
Manual access and utility access
User interface and programmatic access
Programmatic access and report builder
-User Interface and programmatic access-A GUI (Graphical User Interface) is how software applications allow users access to databases. Programmatic access is when the application interacts with the database through SQL commands. This is the typical combination of database-driven software applications.
Direct access provides tools for database administrators to run SQL commands, while non-technical users can interact closely with the database with the help of query builders.
Like direct access, manual access is for database administrators, and utility access is when an application uses a database in the background without users being aware of its presence.
Report builders have their own basic GUI and utility access to retrieve the data. Complex applications typically use their own custom programming functions for the GUI and programmatic access.
Which document contains the information about how the software vendor will use any data that the software gathers and processes?
Software installation best practices
Software agreement
Software usage best practices
Software instructions
An important aspect of a software agreement is how the software vendor will use, store, and retain any data that the software gathers and processes.
Software instructions are the accompanying documentation of software programs, with instructions for using the program. They also include any special installation instructions or known issues.
Software installation best practices advise the users to read the accompanying documentation to verify software and hardware compatibility with the user’s system, as well as ensuring the presence of a valid agreement or license to install and use the product.
Software usage best practices is not a specific document or part of standard operating procedure. Software instructions usually include recommendations for best practices when using the specific software.
A manager requests to see the information on all of the company’s customers, listed by geographical regions, with the totals of purchases made by each customer. What is the best tool to produce this list?
Query
Report
Input form
Flat file
A report is a means of formatting and summarizing the records returned by a query. Reports are the best tools for presenting complex or large amount of data in customizable ways.
A query allows the user to specify criteria and choose which fields to display in the results, which is more useful than seeing all of the data in the table. However, a query might return a large number of rows and be just as difficult to read as a table.
A flat file does not present data in an organized format or provide calculations of total amounts.
An input form is a means of getting data into a database, or to specify criteria to run a report.
What should a company that’s trying to promote its goods and services have on its name and/or logo to protect it from imitators?
Firewall
Patent
Copyright
Trademark
If a company wants to promote its goods, it will normally trademark its name and/or logo. A trademark must be distinctive within the industry in which the company is selling goods and services.
Copyright is legal protection granted to certain types of work that is typically in the domain of publishing, such as books, films, plays, computer software, games, and artwork.
A patent is legal protection for some kind of invention.
A firewall is used in network security to control how hosts and network applications are accessible to one another. It is used for protecting data, not a company name.
A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company?
Group Use
Single Use
Site license
Concurrent license
A concurrent license means that a set maximum number of users use the software at one time. Companies with users who use the software at different times can get a concurrent license, which costs less than other licenses for the same number of installations.
A site license means that the company can install the software on an agreed number of computers. A site license for 100 computers likely costs more than a concurrent license for 50 users.
Group use has the same provisions as a site license.
A single use license means that only one computer can use the software. 100 single use licenses cost more than a concurrent license for 50 users or a site license for 100 computers.
How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express?
128
10
256
26
ASCII was designed in 1963 using seven bits, which was a significant cost saving over using eight bits. Seven bits of binary can express 128 different values (0 through 127).
Modern systems use eight bits instead of seven, giving rise to extended ASCII which can express 256 values, but the original non-extended ASCII can only express 128 values.
While the English language has 26 letters, ASCII contains much more, including 2 sets of the English alphabet (uppercase and lowercase), 10 digits (0 to 9), and special characters.
Decimal notation contains 10 values (0 to 9), which is included in ASCII, as are letters (uppercase and lowercase) and special characters.
An office building is using a Wi-Fi access point. The computer used to configure the access point’s device options is located on the other side of the building. What does a technician need to make it work?
Move the access point closer to the computer
A longer cable to connect the computer to the access point
Move the computer closer to the access point
IP address of the web configuration page
Some devices are not connected to the computer via a peripheral port but accessed over a network. The device vendor provides an IP (Internet Protocol) address to open a web configuration page in a browser, where the device options can be set.
It is possible to have a cable that runs through an entire building, installed in ways that keep it from being a safety hazard. With wireless networking, it is no longer necessary to have such elaborate, and often costly, ways of connecting devices.
Moving the computer closer to the access point is not always feasible.
Moving the access point closer to the computer is not necessary. Considerations for access point placement are different from those for computer placement.
If the password policy for a company requires a user to authenticate with a smart card certification as well as with a PIN, what is this type of authentication?
A software token
Single-factor authentication
Single sign-on (SSO)
Multifactor
Multifactor authentication is strong and combines the use of authentication schemes that work on the basis of something you know, something you have, or something you are.
Single Sign-On (SSO) means that a user only has to authenticate to a system once to gain access to its resources. The disadvantage is that compromising the account also compromises multiple services.
Single-factor authentication systems can easily be compromised: a password could be written down or shared, a smart card lost or stolen, and a biometric system could be subject to high error rates.
A software token is an example of an authentication factor of something you have and is generated by an application and stored on the user’s device as a cookie.
An older digital camera without wireless networking support is malfunctioning, so the photos need to be backed up to the computer. Which port on the computer can the camera owner use?
HDMI
Black 3.5mm jack
USB
Pink 3.5mm jack
A digital camera stores images on a flash memory-based card. There are a number of ways to transfer the images stored on the card from the camera to the computer, including connecting the camera to a USB port, which mounts the camera storage as a Windows drive and the pictures can be copied or moved using Explorer.
HDMI (High Definition Multimedia Interface) is for graphic displays such as a monitor. Even though digital cameras have screens, in this case they are used for data input, not output.
3.5mm jacks are used to connect audio. The pink jack is for the microphone (audio input).
The black 3.5mm jack is for rear speakers in a surround sound system (audio out).
What’s a true statement about compiled programming languages?
Compiled programming languages are not as efficient at runtime as interpreted languages.
Compiled programming languages are not human-readable.
Compiled programming languages have to transform the code to an executable binary.
Compiled programming languages only work on one platform.
The code in a compiled programming language needs to transform to an executable binary before it can run. This is the process of compiling, which converts the source code into machine code. The CPU (Central Processing Unit) can only process machine code.
A compiled program can run on multiple platforms, as long as the source code recompiles for each platform.
Compiled programs generally run quickly, compared to interpreted code.
Human-readable data is encoded as text, and machine-readable data (machine code) is the binary representation. The source code of compiled programming languages is human-readable, and the compiled executable binary is machine-readable.
A workstation experiences slowdowns while running Microsoft Word. The program does not respond to attempts to close it, therefore the user executes the Task Manager utility to quit the program. What does this fall under?
Process management
device management
Disk management
Service management
The application code executes programs in memory as a process, which is the main unit governing a program and managing the memory resources allocated to it by the OS (Operating System). Killing the program, or ending the task, can be done in the Task Manager utility under the Processes tab.
Disk management refers to operations such as formatting drives and partitioning disks, which allow a single disk to be divided into multiple drives.
Device management is for adapters and peripheral components, not application programs.
A service is a Windows process that does not require any sort of user interaction and thus runs in the background (without a window). Microsoft Word is not a service.
A home office with 3 networks uses devices, which include 2 desktops, 4 laptops, 5 smartphones, 3 tablets, and a wireless printer. What device switches the communications between the wired and wireless networks in this office?
Router
Access point
Switch
Modem
An access point creates a Wi-Fi wireless network between computers and mobile devices equipped with suitable adapters, and also switches communications between the wired and wireless networks.
A switch connects four or eight computers together in an Ethernet LAN (Local Area Network) using RJ-45 network ports and twisted-pair cabling.
A modem connects the wired and wireless network clients to the Internet via a WAN (Wide Area Network) link, by transmitting frames across the WAN link.
A router connects the wired and wireless network clients to the Internet via a WAN link, by forwarding packets between the local network and the Internet.
What is the advantage of using DSL (Digital Subscriber Line) over fiber optic in a SOHO (Small Office Home Office)?
DSL supports faster uplink speeds
DSL cables perform better over long distances
DSL supports faster downlink speeds
DSL is more easily available to individual homes
DSL works over an ordinary telephone line, providing the line is of sufficient quality. Providing a fiber cable all the way to customer premises requires substantial investment by the telecom providers and is not widely available.
Residential DSL services support uplink speeds of up to 1.4 Mbps. Fiber optic services use VDSL (Very High Bit Rate DSL) which supports an uplink of up to 16 Mbps.
Residential DSL services support downlink speeds of up to 24 Mbps. VDSL supports a downlink of up to 52 Mbps.
Fiber optic cables perform much better than DSL over long distances and are not affected by noise in the way that affects electrical signals over copper cable.
What are the four functions which represent most of the ways that data moves through a computer system?
Input, output, processing, storage
Addition, subtraction, division, multiplication
Automation, replication, optimization, recovery
Typing, editing, copyrighting, printing,
Computers operate through these four functions: input (the intake of information into the system), output (the presentation of information to the user), processing (the manipulation of information into a new form), and storage (the preservation of information for later use).
Typing, editing, copying, and printing are functions related to documents, which is a small part of what computer systems are used for.
Addition, subtraction, division, and multiplication are arithmetic functions. Computer systems have much greater capabilities beyond these basic operations.
Automation, replication, optimization, and recovery are functions of data management, not the entire functionality of a computer system.
A guest at a friend’s home needs to use the friend’s computer for a few hours to browse the Internet and send out some emails. The browser has many extensions and plug-ins which slow down page loading. What should the guest do with the add-ons?
Uninstall
Block
Disable
Remove
The guest is borrowing the computer, so the action needs to be unintrusive. Disabling the add-ons is something that can be reversed quickly, by enabling them once the guest is done using the computer.
Removing the add-ons means that the guest should add them back later, in case the friend who owns the computer needs them. The guest needs to remember these add-ons, because removing them clears them out of the browser’s settings. Disabling them leaves them in the system, and enabling them again is very easy.
Removing the add-ons means uninstalling them, which is not the best course of action.
Some browsers have settings to block the installation of new add-ons. It will not affect already installed add-ons.
What storage technology do SSDs (Solid State Drives) use?
Magnetic tape
Flash memory
Optical drive
Spinning disk
SSDs (Solid State Drives) are designed to replicate or supplement the function of the hard drive. Solid state storage uses a type of non-volatile memory technology called flash memory.
HDD (Hard Disk Drives) host data that is encoded magnetically on specially coated glass or plastic platters accessed by drive heads. The platters are spun at very high speeds, giving rise to the term “spinning disk” drive.
A tape drive is a data storage device that reads and writes data on a magnetic tape. Magnetic tape data storage is typically used for offline, archival data storage.
Disc-based storage formats for consumer multimedia (music and video) are called “optical” drives because a laser is used to read data from the discs.
When a user has multiple passwords for different services, which of the following can help prevent the user from having to remember all of these passwords or from using the same password for each service?
The IT department resetting passwords
Reusing passwords across multiple sites
A short password history
Password managers
Various hardware and software password managers or “fillers” can store passwords for multiple accounts. Users only have to remember one “master” password and prevent the use of the same password for different services.
Reusing a password for different services prevents the user from having to remember different passwords but it is unsecure; your security becomes dependent on the security of other (unknown) organizations.
A system may keep a history of previously used passwords and prevent the user from choosing the same one again but not from writing down the passwords.
If a note containing a password is lost, the IT department should be informed to reset the password quickly. This will not stop users from writing down passwords.
In addition to making a copy of an entire database, a program can invoke the SQL (Structured Query Language) BACKUP command to work at which level?
Record
Field
Application
Table
Most database management systems provide stored procedures that invoke the BACKUP and RESTORE commands at a database or table level.
The BACKUP command does not work at the field level. If some fields need to have a backup without the entire table, the administrator can make another version of the table with just those fields, and use the BACKUP command on the new table.
The BACKUP command does not work at the record level. If some records need to have a backup without the entire table, the administrator can make another version of the table with just those records, and use the BACKUP command on the new table.
Applications are collections of programming code, and not part of a database.
When does this pseudocode execute the print command?
If i == 0 AND i != 0 Then
print “Yes”
End If
When i is not equal to 0
Never
When i is equal to 0
Always
With the AND operator, both conditions must be true at the same time. In this example, the first condition of “i is equal to 0”, and the second condition of “i is not equal to 0”, cannot be true at the same time, so the branch sequence never executes.
If the operator was OR, then the whole statement would be true at all times, since i is always either equal to, or not equal to, 0.
If this example had only the first condition, then the branch sequence would execute when i is equal to 0.
If this example had only the second condition, then the branch sequence would execute when i is not equal to 0.
A web browser is an example of productivity software. What type of software is an email client?
Productivity software
Collaboration software
Open source software
Business software
With collaboration software, multiple users can work together on the same file or project. Email software allows users to compose, send, and receive messages from others, and is considered to be collaboration software.
Productivity software refers to applications that help users complete typical office tasks. A web browser can be used for information and research, and is considered to be productivity software.
Specialized business software is designed to assist with a particular business process or consumer demand, not general office functions and tasks covered by productivity software.
Open source software makes the program code used to design it available to the public. There are open source email clients, as well as those with proprietary code.
A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?
Settings/Devices
Device drivers
Device manager
Devices and printers
In Windows 10 version 1803 and newer, the location for the basic user-configurable settings for peripheral devices is the Devices page within the Settings app.
In Windows 7, Windows 8, and early versions of Windows 10, Devices and Printers is the location for the basic user-configurable settings for peripheral devices attached to the computer.
Device Manager is the page used to perform functions such as updating device drivers or uninstalling devices, not setting a device to be the default.
Device Drivers is not a page in Windows. Drivers are accessed from the Device Manager page.
What type of programming language has the fastest execution time?
Markup
Scripting
Scripted
Compiled
Compiling converts the source code into machine code, which is strings of ones and zeros for the CPU to process. This conversion takes place prior to the execution of the program, resulting in fast execution time compared to interpreted code.
Scripting languages are interpreted languages, which means that the programs run within the context of an interpreter. The interpreter’s process adds to the overhead of running the program, resulting in slower execution time than compiled programs.
Scripted languages are interpreted languages, and they have the same execution process as scripting languages.
A markup language is not a programming language but a means of making data in a document accessible to a program.
What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?
1600
6400
800
100
SDRAM has a 64-bit data bus, meaning that in each clock cycle, 64 bits of information can be delivered to the CPU. If the bus is running at 100 MHz, the bandwidth available to the memory controller is 100*64 or 6400 megabits per second. To calculate the bandwidth in MBps, this number is divided by 8 and equals 800 MBps.
The calculation is 6400 Mbps (megabits per second), which needs to be divided by 8 to determine MBps (megabytes per second).
100 MHz is the speed at which the bus is running, not the available bandwidth in MBps.
1600 would be the correct answer if the question was about DDR SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory).
Convert the decimal number 35 into binary notation.
100011
100101
1000001
11111
Binary numbers can be calculated from right to left, with each position being worth twice the previous one. 100011 is 1 * 1 + 1 * 2 + 0 * 4 + 0 * 8 + 0 * 16 + 1 * 32 = 35.
11111 is 1 * 1 + 1 * 2 + 1 * 4 + 1 * 8 + 1 * 16 = 31. Alternately, it can be calculated as 100000 - 1, or 32 - 1 = 31.
100101 is 1 * 1 + 0 * 2 + 1 * 4 + 0 * 8 + 0 * 16 + 1 * 32 = 37.
1000001 is 1 * 1 + 0 * 2 + 0 * 4 + 0 * 8 + 0 * 16 + 0 * 32 + 1 * 64 = 65.
Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?
Black box
Parking assist
Sat-nav
In-vehicle entertainment
IoT for motor vehicles include embedded systems for in-vehicle entertainment, which share major elements with IoT home automation’s streaming media. Their function is to play content stored on a storage device through smart speakers and screens.
Embedded in-vehicle sat-nav (Satellite Navigation) uses GPS (Global Positioning Systems) to identify the vehicle’s precise location. There is no need for this in IoT home automation.
Some vehicles are now fitted with a “black box”, which is an event data recorder that can log the car’s telemetry (acceleration, braking, and position). There is no need for this in IoT home automation.
There are now sophisticated systems to control the vehicle on behalf of the driver, including automatic collision detection and avoidance, and parking assist.
What does bps measure?
Throughput rate
Processing speed
Display resolution
HDD performance
When data is transferred between components in the computer or between computers over a network, the throughput rate that a connection can sustain is measured in bits per second (bps).
The speed at which a computer’s processors work (processing speed) is measured in units of time called Hertz (Hz). 1 Hz represents one cycle per second.
The display resolution of a computer monitor or display device is measured in pixels.
Hard Disk Drive (HDD) performance is partially determined by the speed at which the disks can spin, measured in revolutions per minute (RPM).
Which of the following encrypts data in motion?
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Folder-level encryption
Whole disk encryption
Database encryption
With data in transit (or data in motion), data can be protected by a transport encryption protocol, such as Secure Sockets Layer (SSL)/Transport Layer Security (TLS).
With data at rest in persistent storage media, it is usually possible to encrypt data using techniques such as whole disk encryption.
With data at rest in persistent storage media, it is usually possible to encrypt data using techniques such as database encryption.
With data at rest in persistent storage media, it is usually possible to encrypt data using techniques such as file- or folder-level encryption.
If a system goes down, which of these will NOT help recover from data loss due to a natural disaster?
Restoring the date from file backups
Implementing a Redundant Array of Independent Risks (RAID)
Replication between data centers
Syncing the data
Redundant Array of Independent Disks (RAID) is not a substitute for backups. A disaster, such as a fire, that destroys the whole array will result in total data loss without a backup.
To guard against data loss from a natural disaster, you must consider implementing service and data replication between multiple data centers.
If a system goes down, if a component or system is not available, redundancy means that the service can failover to the backup either seamlessly or with minimum interruption. Data can either be restored from backup or by switching over to another system, to which data has been replicated.
To guard against data loss from a natural disaster, data should be synchronized between servers and between sites.
Which of the following helps protect against dangerous unsolicited email file attachment threats?
Using anti-malware
Disabling unused features
Locking the computer with a physical lock
Removing unwanted/unnecessary software
Performing regular system updates and using anti-malware software will protect against many malicious file attachment threats. Unsolicited file attachments should be confirmed with the sender first.
Any features, services, or network protocols that are not used should be disabled to reduce the attack surface of a network device or OS for applications that are already installed on the device.
New computers ship with a large amount of pre-installed software, often referred to as bloatware. These applications should be removed if they are not going to be used.
Most device exploits depend on the attacker having physical access to the unit. However, some vulnerabilities, such as unsolicited email file attachments, can be exploited over a network link.
Why do laptops use a heat spreader instead of heatsinks in their cooling system?
Heatsinks are bulky object with a lot of height
Heatsinks are too expensive and reserved for high-end systems
Heatsinks require a lot of extra electricity to run
Heatsinks are filled with liquid and not conducive to laptop mobility
Heatsinks are bulky objects with a lot of height, and cannot be used in computers with thin cases. Computers with thin cases, such as laptops, use a heat spreader, which is less bulky than other cooling systems.
Heatsinks are not more expensive than heat spreaders, and are used in many types of computers, including budget models.
A heatsink is a passive cooling device. Passive cooling means that it does not require extra energy (electricity) to work.
A heatsink is a block of metal with fins, and not a liquid-based cooling system.
What is a true statement about interpreters and interpreted programming languages?
Interpreted programming languages can run on any platform
An interpreter converts machine code into a human readable format
Interpreted programming languages only run on one platform
An interpreter converts the program into machine code at runtime
With interpreted languages, the program does not need to compile prior to running. It runs within the context of an interpreter, which is a computer program that directly executes instructions written in an interpreted programming language. Interpreter code is usually in a lower-level language than the programs that they interpret, for better performance.
The tools which convert machine code into a human-readable format are called disassemblers or decompilers, not interpreters.
Interpreted programming languages can run on platforms for which there is an interpreter.
Interpreted programming languages can run on a variety of platforms, as long as there is a corresponding interpreter.
A user’s Windows 8 laptop has the latest version of the Safari browser. The user tries to use a web application and receives a message that the browser does not support all features. What is the best course of action?
Upgrade to the Windows 10 operating system to see if it works there.
Wait until the next version of Safari comes out, in the hope that it will be fully supported.
Find a different web application that performs the same functions.
Install the browser which is fully supported by the application.
While the mainstream browsers are more standards-based than they used to be, compatibility problems can still arise. Computers may need to have more than one browser installed, in case a web application is not fully supported by the preferred browser.
Finding another web application that performs the same functions is not always possible, nor is it necessary. Running the preferred web application from a different browser that’s fully supported is much simpler.
Waiting until the next version of the preferred browser comes out can take months, and there is no guarantee of added compatibility with web applications.
Upgrading to the Windows 10 operating system takes extra work, include a learning curve for new features, and requires re-installation of many programs.
Which term refers to technologies that help ensure data is available in the event of hardware failure?
Data exfiltration
Access control system
Fault tolerance
Data capture
Temporary loss of access to data can lead to high costs for an organization, such as a banking institution not having access to financial transactions. Technologies that enable them to ensure their data is available in the event of one or several failures of hardware or software components within their infrastructure are referred to as fault tolerance.
Data capture refers to collection of data points from many different sources as part of data analytics.
Access control system is a way to control access to stored data, using methods such as user or group-based permission assignments and usage restrictions (read-only vs. edit).
Data exfiltration is when an attacker removes data from a network without authorization.
Which notation is a more efficient method to express large numbers?
Octal
Decimal
Hexadecimal
Binary
With hexadecimal notation system, 16 numbers can be expressed using a single digit from 0 to F, resulting in fewer digits for large numbers.
Binary notation system uses 2 values: 0 and 1, which works well with computers to represent the off/on states of transistors but uses many digits to represent large numbers.
Octal notation system uses digits from 0 to 7. Octal was widely used in legacy computing platforms but is not as efficient for expressing large numbers as hexadecimal notation.
Decimal notation system, the most commonly used numbering system, uses a single digit from 0 to 9. It is not as efficient for expressing large numbers as hexadecimal notation.
A Customer object has a field called EmailAddress. Other programs need to have frequent access to this field. What is the best way to set up this field?
As an array of variables across all programs
As its own object
As a property of the customer object
As an attribute of the customer object
Object properties represent a way of accessing a field publicly, instead of the overhead of using methods. Properties allow external code to ask the object to show or change the value of one of its fields.
Object attributes are private variables which other programs
cannot access directly. An object needs to have a method which allows another part of the program to access a field, adding extra overhead to the process.
Setting up the EmailAddress field as its own object adds unnecessary overhead and duplication of information. It is much easier to set it up as a property of the Customer object.
An array of variables is an inefficient way to store data, compared to objects.
An access point is set up in a small home office. What is the best setting for the SSID (Service Set ID)?
Something unique to the network but without personal information
Something that cannot be cracked by password-guessing software
The address where the access point is located
The default name set up by the vendor of the device
SSID is the name for the WLAN (Wireless Local Area Network). It is what devices will connect to, so it should be unique to the network, to avoid confusion with nearby networks, but not contain sensitive or personal information.
It is a good idea to change the SSID from its default setting, usually the device vendor’s name, to something related to the network.
SSID is visible to other wireless devices, so it is not advisable to set it to anything that identifies someone personally, or to the physical address of the device.
SSID is not the password used to configure the device or connect to the network, so there is no need to make it secure like a password.
What does this pseudocode declare?
declare MinutesPerHour as Number = 60
A variable
A primary key
A constant
An array
A constant is a specific identifier that contains a value that does not change within the program. In this example, the value of MinutesPerHour is always 60 and will not change.
A variable contains a value that can change during the execution of the program. There is no reason to ever change the MinutesPerHour identifier after its declaration.
An array is a type of identifier that can reference multiple values; it’s a set of elements. MinutesPerHour is a single identifier.
A primary key is an element of a database, not a pseudocode identifier.
An attacker captures password packets to figure out a user’s password to gain access to a host on a corporate network, and masquerades as that user. Which of the following is a threat to integrity that describes this attack?
Wiretapping
Snooping
Social Engineering
Impersonation
Impersonation is an attack where a person will attempt to figure out a password or other credentials to gain access to a host. An obvious way to perform an impersonation attack is to capture password packets in transit and work out which bit is the password.
Snooping is a confidentiality concern and is any attempt to get access to information on a host or storage device (data at rest) that you are not authorized to view.
Eavesdropping/wiretapping/sniffing is a confidentiality concern and is essentially snooping on data or telephone conversations as they pass over the network.
Social engineering is a confidentiality concern and refers to getting users to reveal confidential and personally identifiable information.
What is an example of an output device?
Digital camera
Loudspeaker
Keyboard
Optical disk
In a computer system, data is shown or played to the user through an output device, such as a monitor, printer, or loudspeaker system.
User input is when the computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, digital cameras, and microphones.
Video input devices, such as digital cameras or camcorders, webcams, image or fingerprint scanners, and barcode readers, are used to digitize images or video into the computer.
Optical disc is a storage device, to which data may be written for future use.
What is the basic unit of computer data?
Byte
KB
Bit
MB
The basic unit of computer data is the binary digit or bit, which can represent two values (zero or one). Computer memory and file sizes in Windows are measured in multiples of bits.
A byte is a collection of eight bits, which can store a single ASCII character, such as letters, numbers, and symbols.
KB stands for KiloByte, which is 1000 bytes in the context of storage capacity. Small files are often measured in KB.
MB stands for MegaByte which is 1,000,000 bytes or 1000 KB in the context of storage capacity. Many files are measured in MB.
Which of the following represents the largest amount of storage capacity?
5PB
3000000 GB
25000000000 MB
10000 TB
Storage capacity is typically calculated using decimal measurements (base 10), so 10,000 TB (TeraBytes) equals 10 PB or 10,000,000 GB or 10,000,000,000 MB. It is larger than the other choices in this list.
3,000,000 GB (GigaBytes) equals 3 PB or 3,000 TB or 3,000,000,000 MB. It is not as large as 10,000 TB.
2,500,000,000 MB (MegaBytes) equals 2.5 PB or 2,500 TB or 2,500,000 GB. It is the smallest amount in this list.
5 PB (PetaBytes) equals 5,000 TB or 5,000,000 GB or 5,000,000,000 MB. It is not as large as 10,000 TB. It is
A table contains information about the company’s customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What does this table need, to make sure that the Email field contains the symbols “@” and “.”?
A primary key
A foreign key
A constraint
Data persistence
Constraints restrict the data which goes into a table, by placing conditions on a given field. A constraint can make sure that a field conforms to the format of a valid email address.
A primary key is a type of constraint, in the way that it ensures the uniqueness of the field within the table. It is not the type of constraint that restricts the format of the Email field.
A foreign key is the field in a table which references a primary key in another table.
Data persistence refers to storing data when the application that uses the data terminates.
What is NOT one of the features of an application virtualization software such as Citrix XenApp, which installs on a network server instead of individual workstations?
The data can be made more secure
The application can be used on multiple operating systems without being developed as a cross platform application
The data files are easier to back up
Users can use the application without a network connection
-Users can use the application without a network connection-Application virtualization software is installed and executed on a network server. Client workstations access the application using a remote terminal or viewer, with a local network connection to the server.
Locating the application and its data files on a server is easier to secure. Security is implemented in one location, the server, instead of each workstation running a locally installed application.
Having the all of the application’s data files on one server is easier to back up, than having local installations and corresponding sets of data files.
Application virtualization software allows applications to run in environments that do not suit the native application, meaning that they can run from different operating systems without being developed as a cross-platform application.
Which of the following will NOT help a network administrator avoid service unavailability due to one or more disks failing?
Network Redundancy
Redundant array of independent disks (RAID)
Contingency plan
Fault tolerance
Network redundancy provides fault tolerance to the connections to the network, if a network adapter fails, but will not avoid unavailable service if one or more disks fail.
Combining hard disks into an array of disks can help to avoid service unavailability due to one or more disks failing. A Redundant Array of Independent Disks (RAID) offers a variety of fault tolerant solutions.
To help protect against losing access to a computer system when a component fails, you must implement fault tolerance. Fault tolerant systems are those that contain additional components to help avoid single points of failure.
Vulnerabilities in critical workflows and resources can be mitigated by creating contingency plans and resources that allow the system to be resilient to failures and unexpected outages.
How can a user belong to a group account and inherit security permissions in a workgroup?
Using additional group accounts associated with a domain
Adding the user’s account as a guest account
Through privileges allocated to the groups
By directly assigning the user to security policies
A user can belong to one or more group accounts and inherit security permissions through privileges allocated to the groups.
User accounts can be assigned directly to security policies, but if there are a large number of users, this can be difficult to manage.
In a Windows workgroup, the only group accounts are Computer Administrators and Standard Users. The use of additional group accounts is associated more with domain networks.
The guest account is disabled by default but should not generally be used. If the guest account is enabled, anyone can use the computer without needing to enter a password.
Which type of data uses whole disk encryption?
Data at rest
Data transmitted over a network
An email
A web page via Hypertext Transfer Protocol Secure (HTTPS)
Data at rest means that the data is in some sort of persistent storage media. In this state, it is usually possible to encrypt the data using techniques such as whole disk encryption.
HTTPS (Hypertext Transfer Protocol Secure) web pages are considered data in transit which is protected by a transport encryption protocol.
Data transmitted over a network is considered data in transit (or data in motion), such as communicating with a web page via HTTPS (Hypertext Transfer Protocol Secure), and is protected by a transport encryption protocol.
Sending an email is considered data in transit (or data in motion) and is transmitted over a network, which is protected by a transport encryption protocol.
A user needs to back up a 6 GB (GigaByte) video file from a Windows desktop to a new 64 GB flash drive. An error message warns that the file cannot copy over to the flash drive, due to file size limitations. What does the user need to do?
Reformat the flash drive into HFS
Reformat the flash drive into NTFS
Reformat the flash drive into FAT32
Increase the size of the flash drive’s partition
FAT32 (File Allocation Table, 32-bit version) is used for formatting removable drives and disks, by default, as it provides the best compatibility between different types of computers and devices. FAT32 allows for maximum file size of 4 GB, so the drive needs to be reformatted into NTFS (New Technology File System) which allows file sizes of up to 16 ExaBytes.
The flash drive is already formatted as FAT32 by default.
HFS (Hierarchical File System) is used for Apple Mac computers, so a flash drive using this format does not work with Windows systems.
FAT32 allows a maximum partition size of 32 GB, but each file can only be 4 GB, so increasing the size of partitions will not help.
Why is it important to protect computer data?
Computer data is not intended to be shared
Computer data is difficult to collect
Computer data is an asset
Computer data is confidential
For individuals or organizations, computer data can be considered an asset, which is something of commercial value, and therefore needs to be protected.
Computer data may or may not be confidential, depending on its contents or circumstances. Regardless of whether a specific set of data is confidential or not, it is likely of value to its owner.
The degree of difficulty to collect a specific set of data can range widely and does not necessarily correlate to its value.
Much of computer data is intended to be shared, at the discretion of its owner. The owner of the data needs to be the one who decides when, how, and at what cost (if any) to share the data.
A package-delivery service is working with address information, which contains a house number and a street name. What is the best data type to use for the house number?
Integer
Float
String
Char
Whether the house number is part of the address field together with the street name, or its own field, it’s best to use the string data type. Besides being able to easily link the house number with the street name, house numbers can contain non-numeric characters such as “123 A” or “5555 1/2”.
Even if the house number contains only digits, there will need to be conversions into string for much of the processing.
For non-integer examples of house numbers such as “5555 1/2”, storing it as “5555.5” would make no sense, so the float data type is not appropriate.
Most house numbers contain more than one digit, so storing them as a char data type does not work.
A user installs a software application for free, and it displays a 30-day countdown until the user must register it and receive additional features. What type of license is this?
Subscription model
Open source
Shareware
Freeware
Shareware is software that is free of charge for a limited period, usually for the purpose of evaluation. After this period, the user must register it to continue using it, usually for a fee. Often there are extra features and support available after registration.
With subscription-based licensing, organizations pay a per-user monthly fee to get access to the software. In this model, regular upgrades are part of the subscription.
Freeware is software that is available for free, without time limits. There are usually restrictions for its use, such as no redistribution or resale.
Open source is software that makes the program code available, so that other programmers can investigate the program and make it more stable and useful.
What’s the difference between scripted and scripting languages?
Scripting languages are for configuring an operating system
Scripting languiages have to transform the code to an executable binary
Scripting languages have to transform the code to an executable binary
Scripting languages only run on one platform
Scripted languages are general purpose interpreted programming languages such as JavaScript or Perl. Scripting languages support the automation and configuration of a particular operating system, i.e., the Windows Command Prompt, Windows PowerShell, or Linux Bash.
Both scripted and scripting languages are interpreted languages, which means that the program does not need to compile prior to running.
Scripted and scripting languages run within the context of an interpreter, a computer program that directly executes instructions written in an interpreted programming language.
Scripted and scripting languages can run on platforms for which there is an interpreter, with each scripting language geared toward a particular operating system.
What is the last step in CompTIA’s troubleshooting model?
Verify full system functionality
Implement preventive measures
Document lessons learned, actions, and outcomes
Establish a plan of action to resolve the problem
All the way through the troubleshooting steps, it is important that information about the problem, tests performed, and attempted resolutions are recorded. That way, when a problem is resolved, a complete record exists documenting the symptoms, possible causes investigated, and the ultimate resolution. The last of the 8 steps in CompTIA’s troubleshooting model is to document findings/lessons learned, actions, and outcomes.
Step 7 in CompTIA’s troubleshooting model is to verify full system functionality and, if applicable, implement preventive measures.
Part of step 7 in CompTIA’s troubleshooting model is to implement preventive measures.
Step 5 in CompTIA’s troubleshooting model is to establish a plan of action to resolve the problem and identify potential effects.
A database administrator needs to extend a table with another column. What method contains the command to do that?
DDL (data definition language)
XML (eXtensible Markup Language)
DCL (Data Control Language)
DML (Data manipulation language)
DDL (Data Definition Language) commands refer to SQL (Structured Query Language) commands that add to or modify the structure of the database. DDL commands include ALTER TABLE, to add columns to a table.
DML (Data Manipulation Language) commands refer to SQL commands that access or modify the contents of the database.
DCL (Data Control Language) mainly deals with the rights, permissions, and other controls of the database system, with commands such as GRANT and REVOKE.
XML (eXtensible Markup Language) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
What is a downside to digital products?
Digital products have high distribution costs
Digital products are of low quality
Digital products are limited to software and computer games
Digital products are easy to copy and steal
The downside to digital products is that they are quite easy to copy and steal. Various copy protection systems have been invented to try to enforce “pay-per-use” for digital products.
A digital product is one that is sold or distributed as binary computer data. Examples of digital products include software, computer games, ebooks, music tracks, streaming video, video downloads, and so on.
Digital products typically have low manufacturing and distribution costs.
With the huge strides in modern technology and lowered costs of high-capacity computer systems, the quality of many digital products has become extremely high, e.g., a home-theater system with streaming movies.
A user installs VirtualBox on a Linux OS (Operating System). Which class of hypervisor is it?
Type 1, becuase the Linux OS is installed directly on the computer
Type 1, because VirtualBox manages the virtual machine environment
Type 2, because VirtualBox is a software application within a host operating system
Type 2, because Linux provides the resources for the virtual environment
A type II hypervisor runs as a software application within a host operating system. VirtualBox is a third-party virtualization software which can be installed on host systems including Linux.
For both type I and II hypervisors, the physical machine (or host) provides the resources, such as CPU and memory, for the virtual environment.
Both type I and II hypervisors manage the virtual machine environment and facilitate interaction with the host hardware and network.
The Linux OS is installed directly on the computer, but it serves as the host to the type II hypervisor which is the VirtualBox software.
What is the difference between DropBox and OneDrive?
OneDrive is a cloud based storage solution
Dropbox can be operated with a smartphone app
Dropbosx i built into the Windows os
Onedrive is built into the windows OS
OneDrive is a cloud storage client that is built into the Windows 10 OS (Operating System), and can be accessed via File Explorer. There is also OneDrive for Business, for users to store, sync, and share work files in the cloud.
Both OneDrive and DropBox are cloud-based storage solutions.
DropBox is not built into the Windows OS; it is an online file hosting service that offers cloud storage, file synchronization, personal cloud, and client software.
Both OneDrive and DropBox can be operated with an app for the smartphone or tablet.
What type of language is the most difficult to follow?
Compiled
Markup
QUery
Assembly
An assembly language is any low-level programming language in which there is a very strong correspondence between the program’s statements and the architecture’s machine code instructions. Assembly code is very difficult to follow and is only really used by specialists trying to solve a very particular problem with an application.
A markup language consists primarily of nested tags, which have very few rules, so they can be very programmer-friendly and easy to follow.
Compiled programming languages range from low-level to high-level, but even the lowest level is easier to follow than assembly languages.
Query languages represent a more structured form of the English language, and are very easy to follow.
A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?
Write a company policy and procedure for escorting visitors
Train staff to identify Personally Identifiable Information (PII)
Install data monitoring solutions
Implement an Aceptable Use policy
If there is a company policy saying that visitors to the workplace must be escorted at all times, the organization needs to create written policies and procedures to help staff understand and fulfill their responsibilities and follow best practices.
While the rise in consciousness of identity theft as a serious crime and growing threat is important, it deals with the handling of personal or sensitive data appropriately.
An Acceptable Use Policy, or Fair Use Policy, sets out what someone is allowed to use a particular service or resource for.
Monitoring data means analyzing data communications to measure an employee’s productivity.
A systems engineer wants to control access to critical data. Which of the following describes a security concern regarding storing and transferring data without authorization?
Integrity
Social Engineering
Availability
Confidentiality
Integrity means that the data being stored and transferred has not been altered without authorization. Threats to integrity include Man-in-the-Middle (MitM), replay, and impersonation attacks.
Confidentiality means that information is only revealed to authorized people. This can be compromised in snooping, eavesdropping/wiretapping, and social engineering/dumpster diving attacks.
Availability means keeping a service running so that authorized users can access and process data whenever necessary. Availability is often threatened by accidents and oversights as well as active attacks.
Social engineering refers to means of getting users to reveal confidential information or obtaining unauthorized physical access to a resource.
What does a database dump contain?
A hard disk with an exact copy of the database
A formatted report of the contents of all tables
SQL statements which can recreate all tables
A flat file with full contents of all tables
A database dump is a copy of the database or table schema along with the records in the form of SQL (Structured Query Language) statements, which another database can use to create the tables and import the information.
Flat files with full contents of all tables are backups, not dumps. Dumps contain SQL statements to recreate the schema and data.
Formatted reports of table contents are not very useful for backup and restore purposes.
A hard disk with an exact copy of the database is a full backup, not a dump.
Which wireless Internet service does a computer use when it connects by tethering?
Wi-fi
Radio frequency
Satellite
Cellular radio
Tethering is when a cell phone, which uses cellular radio service, shares its Internet connection with a computer that has no other means of Internet access.
A computer that needs to connect to the Internet by tethering to a cell phone has no other means of Internet access, such as wi-fi.
Radio Frequency is a means of provisioning a wireless local network using Wi-Fi standard equipment. While this isn’t a means of Internet service provision in itself, it is a means for a client to connect to a wireless router offering Internet access.
A computer that needs to connect to the Internet by tethering to a cell phone has no other means of Internet access, such as a satellite link.`
What’s a true statement about query languages?
Querry languages code does not need to be compiled
Query language code is not human readable
Query language code is the most complex code
Query languages can only be used on one platform
Code written in a query language, such as SQL (Structured Query Language), is designed to retrieve specific records from a dataset. The code does not need to be compiled.
Query languages can be used on many platforms. Query languages typically work together with other programming languages, which process the data retrieved by the queries.
The basic structure of query languages has a smaller set of commands than most programming languages. There are advanced components and extended vocabularies in some query languages, but the basic set of commands is sufficient for most operations.
Human-readable data is encoded as text, and machine-readable data (machine code) is the binary representation. Query languages represent a more structured form of the English language.
Which of the following types of authentication, if compromised, could potentially impact multiple services?
Multifactor authentication
Single sign-on
Two factor authentication
Single factor authenticatioon
Single Sign-On (SSO) means that a user only has to authenticate to a system once to gain access to all its resources. The disadvantage is that compromising the account also compromises multiple services.
Single-factor authentication systems can quite easily be compromised: a password could be written down or shared, a smart card could be lost or stolen, and a biometric system could be subject to high error rates.
An authentication product is considered “strong” if it combines the use of more than one authentication data type. This is called multifactor authentication.
Two-factor authentication combines something like a smart card or biometric mechanism with “something you know,” such as a password or PIN.
Which of the following is NOT true about critical data when configuring file backups?
Replication allows critical data backup, which protects from accidental deletion of a record
Critical data might include Personally Identifiable Information (PII)
Critical data can store within a settings file located within a database
Critical data does not always store in files within a user or shared folder
Replication doesn’t protect you from errors such as accidentally deleting a record. If the error is accepted as a valid transaction, it will be propagated amongst all the replicas at the next scheduled replication interval.
When configuring backups, you need to understand that not all critical data may be stored in files within a user folder or shared folder.
When configuring backups, critical data could be stored in a settings file outside of the normal data areas or be located within a database or message store.
When configuring backups, you have to consider that critical data might include confidential, proprietary, and/or personal information.
How is binary notation expressed?
A single digit in a range from 0 to 1 is used. This number represents an on or off state. Each column is worth two times the column to its right. This is also known as base 2.
Each single digit is assigned ten values ranging from 0-9 whereby each column is ten times more than the digit to its right. This is also known as base 10.
Each single digit is assigned one of 16 different possible values ranging from 0–F. Letter designators are assigned to 10-15 (a-f respectively).
Text or graphics are used to add emphasis to your code.
When converting to binary you must understand that each column can have one of only two values: 0 or 1. Just as with decimal format, you add from right to left. The first column is the far right one; each column has a value two times that of the column to the right. So, as you look at each column, the values go 8 | 4 | 2 | 1. For example, the binary value for 10 is 1010.
Base 10, or decimal notation, assigns each single digit one of ten different possible values.
When you assign each digit one of 16 different possible values, you are using hexadecimal notation.
The use of graphics to add emphasis to your code is called secondary notation.
Convert the decimal number 10 into binary notation.
1010
111
1234
1
When converting to binary, you must understand that each column can only have two values, 0 and 1. Just as with decimal format, you add from right to left. The first column is the far right one, and each column has a value two times the value of the column to the right. So, as you look at each column, the values go 8 | 4 | 2 | 1. The binary value for 10 is 1010.
1111 is 15 if you notice every column has a 1, which means 1 + 2 + 4 + 8 = 15.
1234 is not written in binary.
1 is actually 1 in binary.
What is the most common character set used for coding to represent text in computers?
American Standard Code for Information Interchange (ASCII)
Unicode
Xerox Character Code
Devanagari
ASCII code represents text in computers, telecommunications equipment, and other devices. Most modern character-encoding schemes are based on ASCII, although they support many additional characters.
Unicode is the standard maintained by the Unicode Consortium, and as of June 2018 the most recent version is Unicode 11.0.
Xerox Character Code Standard (XCCS) is a historical 16-bit character encoding that was created by Xerox in 1980 for the exchange of information between elements of the Xerox Network Systems Architecture.
Devanagari is a South Asian writing system used by many languages, including Hindi, Konkani, Marathi, Nepali, Sanskrit, Sherpa, and Sindhi. It is not a coding language.
How do computers differentiate binary data and map it to letters, numbers, and symbols?
A character set maps letters, numbers, and symbols to binary values
The computer can’t differentiate binary data
Letters, numbers, and symbols can be read by a computer without any translation
A computer uses a dictation program to translate letters and symbols into understandable binary code
A character set is a collection of characters that might be used by multiple languages. A character set translates letters, numbers, and symbols into binary values that the computer can understand, much like the service an interpreter provides for a foreign dignitary.
Computers are able to differentiate binary data through character sets.
Letters, numbers, and symbols can’t be read by a computer without a character set in place for translation.
A computer can use dictation programs as input devices for the handicapped but not for translating letters, numbers, or symbols into binary values.
What are the two common ways of presenting character set data?
ASCII and Unicode are the most common character sets used to present data
There is no need to provide a standardized character set when programming a computer
UCS-2 and UTF-8 are the most common character sets used to present data
Xerox Character Code and the Western Standard Character Set are the most common character sets used to present data
American Standard Code for Information Interchange (ASCII) and Unicode are the most common character sets used to present data when programming computers.
Computers need character sets to translate letters, numbers, and symbols into binary values. Character sets are necessary when programming computers.
UCS-2 and UTF-8 are both legacy character sets and are no longer in use.
The Xerox Character Code is a legacy character set from the 1980s. It is no longer widely used. The Western Standard Character Set never existed—it is a fabricated standard.
What is the decimal number 75 in hexadecimal notation?
4B
0100 1011
7x10e1 + 5x10e0
0x5c
4B is how you would write 75 in hexadecimal notation. Hexadecimal notation is often indicated using 0x to precede the hexadecimal digits, so you may also see this written as 0x4b. For hexadecimal, you only need 16 and 1 (75 divided by 16 is 4 remainder of 11, which is represented as “B” in hexadecimal).
0100 1011 is how you would write 75 in binary notation.
7x10e1 + 5x10e0 is how you would write 75 in decimal notation.
5C is how you would write 92 in hexadecimal notation, not 75. (92 divided by 16 = 5 with a remainder of 12, which is represented as “C” in hexadecimal.)
Websites tend to use what Unicode standard?
UTF-8
UCS-2
Xerox Character Code
UTF-16
UTF-8 is used by over 91 percent of websites throughout the world.
UCS-2 is obsolete because it is limited to the basic multilingual plane (BMP). Many Unicode characters are beyond the reach of UCS-2. It is the precursor to UTF-16 and is not used for websites.
The Xerox Character Code is also obsolete and is not used for websites.
UTF-16 is used internally by systems such as Windows and Java and by JavaScript, and often for plain text and for word-processing data files on Windows. It is rarely used for files on Unix/Linux or macOS. It never gained popularity on the web, where UTF-8 is dominant.
What type of notation is used in common math?
Decimal Notation
Binary Notation
Hexadecimal Notation
Secondary Notation
The numbers 0-9 represent decimal notation. It is the basic math notation that we typically use, where every digit has the possibility to represent ten numbers or ten times the number to its right.
On and off representation is characteristic of binary notation where there are only two digits represented. Binary notation allows the computer to determine whether something is on or off because an “on” is represented with a “1” and an “off” is represented with a “0.”
Hexadecimal notation gives you the ability to assign more than ten values to a column (up to 15), with alpha characters (a-f) used for 10-15. Hexadecimal notation allows you to represent large numbers.
Secondary notation, like italic and bold characters, is used in programming to bring attention to the code to make it easier to detect important information.
Which notation system presents the largest numbers using the fewest digits?
Hexadecimal
Decimal
Binary
Kilobyte
The notational system that presents the largest numbers using the fewest digits is hexadecimal. With hexadecimal notation, each digit can store 16 bits of information. Because of this efficiency, hexadecimal is ideal for handling large values. Hexadecimal is also referred to as base 16.
In a decimal system, a single digit stores four bits of information. Decimal is also referred to as base 10.
In binary notation, a single digit stores only one bit of information. Binary is also referred to as base 2.
A kilobyte is a unit of measure and not a notational system.
When should you use hexadecimal notation?
To express large numbers
When you want to represent an on or off state
When you want to represent numbers between 0 and 9
When you want to add emphasis to your code
Hexadecimal notation gives you the ability to assign more than ten values to a column (up to 15), with alpha characters (a-f) used for 10-15. Hexadecimal notation allows you to represent large numbers.
On and off representation is characteristic of binary notation where there are only two digits represented. Binary notation allows the computer to determine whether something is on or off because an “on” is represented with a “1” and an “off” is represented with a “0.”
The numbers 0-9 represent decimal notation. It is the basic math notation that use, where every digit has the possibility to represent ten numbers or ten times the number to its right.
Secondary notation, like italic and bold characters, is used in programming to bring attention to the code to make it easier to detect important information.
How is decimal notation expressed?
Each single digit is assigned one of ten values ranging from 0-9 whereby each column is ten times more than the digit to its right. This is also known as base 10.
A single digit in a range from 0 to 1 is used; these digits represent on and off states. Each column is worth two times the column to its right. This is also known as base 2.
Each single digit is assigned one of 16 different possible values ranging from 0–F. Letter designators are assigned to 10-15 (a-f respectively).
Using text or graphics to add emphasis to your code is an example of decimal notation.
The numbers 0-9 represent decimal notation. It is the basic math notation that we use, where every digit has the possibility to represent ten numbers or ten times the number to its right.
On and off representation is characteristic of binary notation where there are only two digits represented. Binary notation allows the computer to determine whether something is on or off because an “on” is represented with a “1” and an “off” is represented with a “0.”
Hexadecimal notation gives you the ability to assign more than ten values to a column (16 total values where 0 is the first value up to 15). Alpha characters (a-f) are used for 10-15. Hexadecimal notation allows you to represent large numbers.
Secondary notation, like italic and bold characters, is used in programming to bring attention to the code to make it easier to detect important information.
Which of the following is the correct syntax of using an escape character to include a quote character in a string definition?
“John said \’Hello World\’ then left again.”
“John said ‘\Hello World’\ then left again.”
“John said \Hello World\ then left again.”
“John said “Hello World” then left again.”
When single or double quotes are used to delimit a string, then quotes are not part of the string itself. To represent a quote character within a string, you must use an escape character. In this example, the backslash () is used as an escape character preceding the single quotation (‘).
The escape character must precede the quote character. The inner portion ‘\Hello World’\ is incorrect because the escape characters follow the quotes.
Double backslash (\) inserts a literal backslash into the string, which is not what this string requires.
Without escape characters, the statement “John said “Hello World” then left again.” is interpreted as two strings: “John said ” and “then left again.”
How much storage space is consumed by the Boolean data type?
A single bit
Between 1 and 8 bytes
Between 4 and 8 bytes
A single byte
Boolean values are a special numeric data type which indicate that something is either TRUE or FALSE, represented with a binary 1 or 0, and consume only a single bit of storage space.
The data type that consumes between 1 and 8 bytes of storage is an integer. The wide range is due to variances in system architectures (32-bit vs 64-bit) and the integer itself (short vs long).
The data type the consumes between 4 and 8 bytes of storage is the floating point number. The range is due to the differences in the floating point number (standard float vs a double).
The data type that consumes a single byte of storage is the character.
How much storage space is consumed by the integer data type?
Between 1 and 8 bytes
A single bit
Between 4 and 8 bytes
A single byte
An integer is a whole number with a range of storage formats (short or long, signed or unsigned). It consumes between 1 and 8 bytes of storage, depending on the format, as well as the system architecture (32-bit or 64-bit).
The data type that consumes a single bit of storage is a Boolean value.
The data type the consumes between 4 and 8 bytes of storage is the floating point number. The range is due to differences in the floating point number (standard float vs a double).
The data type that consumes a single byte of storage is the character.
Which of the following data types can NOT store the number 3?
Boolean
Integer
Float
Char
A Boolean is a special numeric data type that indicates something is either TRUE or FALSE. Boolean values are stored using a single bit with 1 representing true and 0 representing false. Of the data types listed, a Boolean value is the only one that cannot contain the number 3.
An integer is the ideal data type to store the number 3. When stored as an integer, mathematical operations can be performed on the number.
A floating point number can also store the number 3; however, it will likely include the decimal point resulting in 3.0.
A character, or char, can also store the number 3. A char can store a single letter of the alphabet, number, or symbol; however, numbers stored as a char cannot have mathematical operations performed on it.
What limitation is placed on a number when it is entered as a character data type?
You cannot perform mathematical operations on it
It cannot enumerate information while coding
There are no limitations on a number entered as a character data type
A number cannot be entered as a character data tyoe
Data types specify the type of information (such as number, string, picture, date) that can be stored in a column or a variable. Numbers can be used as a character data type, but when you write code and set a number as a character value other than a numeric one then that number cannot be used to compute mathematical operations.
The ability to set numbers as a character data type allows flexibility and the ability to enumerate your information while coding.
There are many limitations on character data types.
A number can be entered as a character data type.
How is the amount of storage that can be used by a string limited?
There is no limitation to the amount of storage used by a string
A string is limited to two storage units
Strings require defined storage limitations
A string doesn’t take up any storage
There are no storage limitations for a string. However, best practice policies can be put in place to standardize how a string is written and how much space it takes up.
It would be impractical to limit a string to only two storage units.
Strings don’t require defined storage limitations. As stated before, best practice policies can define limitations for standardization purposes.
Every data type takes up storage, whether it is a number, string, picture, or date. Even if the item contained only one bit of information, that bit would require storage space.
How much storage space is consumed by the floating point number data type?
Between 4 and 8 bytes
A single bit
Between 1 and 8 bytes
A single byte
A floating point number represents decimal fractions, such as 4.0, 26.4, or 5.62. This data type consumes between 4 and 8 bytes of storage, due to differences in the represented precision, i.e., a standard float is a single precision (32 bit) floating point data type, and a double is a double precision (64 bit) floating point data type.
The data type that consumes a single bit of storage is a Boolean value.
The data type that consumes between 1 and 8 bytes of storage is an integer. The wide range is due to variances in system architectures (32-bit vs 64-bit) and the integer itself (short vs long).
The data type that consumes a single byte of storage is the character.
What fundamental data type is used to support decimal fractions such as 4.1, 26.4, and 5.62?
Floating point numbers or just “float”
Whole numbers that are in base 10
Boolean numbers that indicate whether something is true or false
Irrational numbers
Floating point numbers or “floats” contain decimal points. In general, floating point numbers are represented approximately to a fixed number of significant digits and scaled using an exponent in some fixed base; the base for the scaling is normally 2, 10, or 16.
Whole numbers are used for integer notation, as in standard math.
Boolean numbers are characteristic of binary notation. This is especially important for computers because Boolean numbers can represent on or off states.
Irrational numbers cannot be used for floating point numbers.
How are integers represented?
Whole numbers that are in base 10, such as 5,21, or 65536
Boolean numbers that indicate whether something is TRUE or FALSE
Floating point numbers with decimal points and fractions
Irrational numbers that cannot be written as a simple fraction
Integers are represented using whole numbers, as in standard mathematical notation. For example, the numbers 5, 21, and 65536 are integers.
Boolean numbers are characteristic of binary notation, but they do not represent integers.
Floating point numbers contain decimal points and fractions, but do not represent integers.
Integers cannot be irrational numbers.
How much storage space is consumed by the character data type?
A single byte
A single bit of storage
Between 1 and 8 bytes
Between 4 and 8 bytes
A character data type is a single textual character that consumes one byte of storage space. It can store a letter of the alphabet, a symbol, or a number, i.e., b, B, 7, $, or 1.
The data type that consumes a single bit of storage is a Boolean value.
The data type that consumes between 1 and 8 bytes of storage is an integer. The range is due to variances in system architectures (32-bit vs 64-bit) and the integer itself (short vs long).
The data type the consumes between 4 and 8 bytes of storage is the floating point number. The range is due to differences in the floating point number (standard float vs a double).
What special numeric data type indicates that something is either TRUE or FALSE?
Boolean values
Irrational numbers
Whole numbers
Floating point numbers
Boolean numbers are characteristic of binary notation where a choice of either on or off (0 or 1) needs to be made. This is especiall1y important for computers because Boolean numbers can represent on or off states.
Irrational numbers are not used in binary notation. This is especially important for computers because Boolean numbers can represent on or off states.
Whole numbers are used for integer notation, as in standard math. Whole numbers, with the exception of 0 and 1, are not used in binary notation.
Floating point numbers contain a decimal point. In general, floating point numbers are represented approximately to a fixed number of significant digits (the significand) and scaled using an exponent in some fixed base; the base for the scaling is normally 2, 10, or 16.
The value “CompTIA” is a representation of which data type?
String
Boolean
Character
Integer
The value “CompTIA” is a representation of the string data type. A string is a collection of text characters.
Booleans are special numeric data types that indicate a value is either TRUE or FALSE using either a 1 or a 0. In this example, “CompTIA” is composed of several characters forming a string, not a TRUE or FALSE value.
Characters (or chars) are single textual values that are one alphabet, symbol or numerical character in length. The value “CompTIA” is a string composed of seven character values.
Integers are only numerical. The value “CompTIA” is not numerical and is therefore not an integer.
Why is it important to understand the different data types that a computer program can use?
The data type determines what sort of operations can be performed
A computer program can only process only one data type
Computer programs process language just as we do. There is no need to convert into a data type that computers understand
A computer can process specific data without a program
Data types are required to convert our language into one that a computer can understand, and they determine what sort of operations can be performed.
Computers can process more than one data type; they are not limited.
Computers do not process language as we do. Our language has to be converted into a data type that computers understand.
A program is necessary for the computer to process specific data.
How does a computer receive data entered by a user?
Through the use of peripheral devices, such as mice and keyboards
Through the use of the internet
Through interfaces such as a printer or computer screen
Through data written directly to memory
A computer receives data from a user via input, which is defined as the way a human interfaces with a computer through a peripheral device such as a keyboard, mouse, camera, or other such device.
The Internet is not a way for a user to input data, but rather an application that a computer runs.
Printers and computer screens are typically output devices, not input devices.
Users do not tend to write data to memory directly. The user requires input devices, which then enable processing through the CPU, therefore creating output.
How does a user receive information from a computer?
Data is shown or displayed to the user through an output device
information is interfaced using the keyboard
The data is transferred via the internet
The data is stored on a hard drive or flash drive
A user receives information from a computer via output, which is how a computer displays the information that it has processed. This is usually displayed through a peripheral device that produces an image or sound, such as a monitor, printer, or speaker.
Interfacing with a keyboard is an example of input, not output.
The Internet is an application, and still requires the use of an output to send the information to a user.
A hard drive or flash drive does store data, but this data is not transferred to the user without the use of an output.
Why do computers save or write data to a storage device?
Data running on system memory is only preserved while the computer is powered up.
A given instruction or piece of data is stored in memory to keep track of it.
Due to recent technological advances, a computer no longer needs to use memory to save data.
A CPU needs a cache to save memory.
Memory is also known as primary storage, primary memory, main storage, internal storage, main memory, or Random Access Memory (RAM); these terms are used interchangeably by computer experts. Memory is the part of the computer that holds data and instructions for processing regardless of whether the computer is on or off.
Keeping track of where a given instruction or piece of data is stored is a part of the address register. Registers are not a part of memory; rather they are special additional storage locations that offer the advantage of speed. Registers work under the direction of the control unit to accept, hold, and transfer instructions or data and perform arithmetic or logical comparisons at high speed.
A computer must write to memory to save data; otherwise, it would be lost when the power is turned off.
Caches enable the CPU to work on simple or common activities quickly, but they still need other memory functions.
How is computer data defined?
Information shared in an IT system using nothing more complicated that the binary digits 1 and 0
Information presented as unprocessed facts and figures without any added interpretation or analysis
Information transferred between people either through speaking or writing, using words in a structured and convectional way
Information that references something else in design or origin
Computer data is information processed or stored by a computer using nothing more complicated than the binary digits 1 and 0. This information may be in the form of text documents, images, audio clips, software programs, or other types of data. Computer data may be processed by the computer’s CPU and is stored in files and folders on the computer’s hard disk.
Information presented as unprocessed facts and figures without any added interpretation or analysis is considered raw data.
Information transferred between people either through speaking or writing, using words in a structured and conventional way, is language.
Information that references something else in design or origin is referential data.
What three elements are required for a computer to perform useful tasks?
Hardware, software, and the computer user
Keyboard, printer, and software
The computer programmer, the user, and the technician
Hardware, monitor, computer user
The task model requires that you have three things: hardware to do the work, software to tell the hardware what to do, and the computer user to interface with the computer.
The task model does require software and hardware (such as keyboards and printers), but a computer user is also needed.
Programmers tend to write the software and technicians tend to fix both hardware and software. They are not part of the task model.
The task model does require a computer user and hardware (including a monitor), but software is also needed.
What are peripheral devices?
The parts of a computer system that are not contained within the case
All of the parts of the computer that are contained within the case
The parts of the computer that reside on the motherboard
The parts of the computer that reside within the monitor
A peripheral device is generally defined as any auxiliary device, such as a computer mouse or keyboard, that connects to and works with the computer in some way. Other examples of peripherals are image scanners, tape drives, microphones, loudspeakers, webcams, and digital cameras.
The parts within the case are usually considered the integrated circuits of the computer.
The motherboard, CPU, graphics card, and other integrated circuits within the case are not peripherals.
The monitor itself is a peripheral device, but not the parts within it, and this is not the only type of peripheral device that exists.
What is the difference between hardware and software?
Software refers to a collection of data or computer instructions that tell the computer how to work. Hardware is the set of physical components that make up the system and perform the work.
Hardware is the term used to refer to the computer instructions that tell the computer how to work. Software is the equipment that performs the work.
There isn’t really a difference between software and hardware; they are interchangeable terms.
In simple terms, software does all the work and hardware acts as the brain.
Software refers to a collection of data or computer instructions that tell the computer how to work. The physical hardware (the computer) actually performs the work. Computer hardware and software require each other, and neither can be realistically used on its own.
Software tells the computer how to work and hardware is the equipment that performs the work. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page are both considered computer hardware. The operating system that your computer is running on is considered software.
There is a clear difference between hardware and software.
In simple terms, software acts as the brain and hardware does all the work.
When a computer writes data to memory and manipulates that data, the computer is said to be doing what?
The computer is using the CPU to act on intructions from the operating system and application software
The computer is sending output to a monitor or printer
A computer cannot write data to memory
The CPU is operating independently from the user without input or instructions from the operating system or application software
The computer does its primary work in a part of the machine we cannot see, a control center that converts data input to information output. The central processing unit (CPU), is a highly complex, extensive set of electronic circuitries that executes stored program instructions from the operating system and application software. All computers, large and small, must have a central processing unit.
Output is the process whereby a computer displays the information that it processed.
A computer writes data to memory because it would otherwise be temporary.
A computer depends on input from a user to process information for an output.
What is the most common use for peripheral devices in a computer?
To enter information as input or deliver to the user as output
To generate the graphics that show up on the monitor
To process the input information and prepare it for output
To store information within the computer case, to be used later
A peripheral device is any auxiliary device that connects to and works with the computer in some way. Most common uses are for entering information as input (i.e. a keyboard or a mouse) and delivering it to the user as output (i.e. monitors, printers, or speakers).
The computer components that generate the graphics are integrated graphics processors on the motherboard or graphics cards. Add-on graphics cards can be considered to be peripheral devices, as they are not essential to the function of a computer, but they are not as commonly added to a computer as a keyboard is.
Processing the input information and preparing it for output is the function of the CPU and other devices within the integrated circuits, which are all essential components and not peripheral devices.
There are peripheral storage devices, such as thumb drives and external hard drives, but storage that is contained within the computer case is part of the computer essentials and not a peripheral device.
What systems use a Central Processing Unit (CPU) and memory?
All types of computers
Servers only
Desktops only
Laptops only
A Central Processing Unit (CPU) and memory are used by all types of computers, including servers, desktops, and laptops. The CPU retrieves each instruction or data file from memory and processes it. Afterward, the CPU writes the results back to memory and directs other components to perform actions.
Servers are computers that use a CPU and system memory, as are desktops and laptops.
Desktops are computers that use a CPU and system memory, as are servers and laptops.
Laptops are computers that use a CPU and system memory, as are servers and desktops.
What do you call an action through which someone uses, makes, sells, or imports your invention without your permission?
Patent infringement
An intellectual property crime
Copyright infringement
A technocrime
Patent infringement occurs when someone uses, makes, sells, or imports your patented invention without your permission.
An intellectual property crime is one in which you can prove that an idea was originally yours even though you may not have placed a copyright or patent on it.
Copyright infringement happens when somebody reproduces your copyrighted property or distributes unauthorized copies of works either online or by manufacturing and distributing infringing CDs or DVDs.
Technocrime is the term used by law enforcement agencies to denote criminal activity that uses (computer) technology not as a tool to commit a crime, but as the subject of the crime itself.
Which of these is NOT an example of security controls?
Audits and inventories
Access controls
Backups
High availability
Audits and inventories are important activities for measuring accountability within your organization, but they are not specific security controls.
Access controls are security controls that limit the use of a computing device to an authorized person, such as its owner. Access control on workstation operating systems is usually enforced by the restrictions of user accounts.
Backups are security controls that ensure business integrity and continuity in the event of a data loss. Having a backup enables you to restore your data when needed.
High availability is a preventive security control that ensures users always have access to their data. When a system is regularly non-functioning, information availability is affected, significantly impacting users.
Which of these is NOT a positive trait of a digital product in regard to the value assigned to information and data?
Digital sales through peer-to-peer transactions make it easier to sell information without the oversight of an institutional set of rules.
A digital product is one that is sold or distributed as binary computer data.
Digital products typically have low manufacturing and distribution costs.
The ability to sell information via hosting has increased the availability and accessibility of information even though infrastructure costs can be high.
Uncontrolled peer-to-peer transactions make it easier to sell information without the oversight of an institutional set of rules. This is how the online black market was created with the development of underground economies like Silk Road.
One of the key traits of data in terms of value in information stems from that fact that a digital product is one that is sold or distributed as binary computer data.
Due to technical advancements, digital products typically have low manufacturing and distribution costs.
The ability to sell information via hosting has increased the availability and accessibility of information even though infrastructure costs can be high.
Which of the following is a disadvantage of a semi-structured data warehouse for storing information?
The traditional relational data model has a popular and ready-made query language, SQL.
A programmer can serialize objects via a lightweight library.
Support for nested or hierarchical data often simplifies data models representing complex relationships between entities.
Support for lists of objects simplifies data models by avoiding the messy translations of lists into a relational data model.
The traditional way of storing data in a relational database actually creates a disadvantage for semi-structured data models. The popularity and ease with which the ready-made query language is written keeps people from migrating to new systems.
Programmers who place objects from their application into a database do not need to worry about object-relational impedance mismatch, but can often serialize objects via a lightweight library.
Support for nested or hierarchical data often simplifies data models representing complex relationships between entities.
Support for lists of objects simplifies data models by avoiding messy the translations of lists into a relational data model.
How do you protect an idea or invention without actually creating an example of it?
You can patent it
You can copyright it
You can trademark it
You can send a copy to yourself
A patent allows you to protect an idea or invention without even having to create it.
A copyright is an automatic legal protection granted to certain types of work, but before a copyright can be applied the work must have been created and a sample has to be shown.
A trademark is a protection applied to a name and/or logo so that a company can promote its goods without someone else taking their name and/or logo.
The practice of sending a copy of your own work to yourself is sometimes called a “poor man’s copyright.” It does not guarantee protection.
When does data become information?
When it is applied to some purpose and adds timely value for the recipient
When it is presented as unprocessed facts and figures without any added interpretation or analysis
It does not matter when data is applied and turned into information.
Data does not have to be readily available to be useful.
Data becomes information when it is applied to some purpose and adds value for the recipient. For example, a set of raw sales figures is data. For the sales manager tasked with deciding the future focus of a sales drive, the raw data needs to be processed into a sales report. It is the sales report that provides information.
Data that is presented unprocessed, without any added interpretation or analysis, is considered “raw data.”
Data that arrives after you have made your decision is of no value.
Data must be readily available for processing into information.
What is a copyright used for?
It is a legal protection granted to certain types of work that gives its holder the right to control the use of the work, including rights of publication, distribution, or sale.
It is the protection of a name or logo that a company can use to promote its goods.
It protects an idea or invention without the need to put it into practice or create it.
It protects an idea when you send a copy of your own work to yourself.
A copyright is an automatic legal protection granted to certain types of work, indicating that the copyright holder owns the right to control the use of the work, including rights of publication, distribution, or sale.
A trademark is a protection applied to a name and/or logo so that a company can promote its goods without someone else taking their name and/or logo.
A patent allows you to protect an idea or invention without even having to create it.
The practice of sending a copy of your own work to yourself is sometimes called a “poor man’s copyright.” There is no provision in copyright law regarding any such type of protection, and it is not a substitute for registration.
What is data correlation?
The process of analyzing the whole data set and finding connections and links between data points
The process of capturing and collecting data and information
The presentation of information in a meaningful output
The raw data itself
Data correlation is the analysis of the whole data set to find connections and links between data points. The ability of software to perform data correlation without much human intervention is greatly boosted by the development of Artificial Intelligence (AI) and machine learning systems.
Data capture and the collection of information is done prior to data correlation.
The presentation of information in a meaningful output is the outcome of data correlation.
The raw data is the data collected during the data capture phase.
In Information Technology (IT) terminology, what is ROSI and how do you calculate it?
Return on Security Investment; to calculate ROSI, you perform risk assessments to work out how much the loss of data would cost your organization and how likely it is that data loss might occur when an attacker removes data from your network without authorization.
Return on Spending Index; to calculate ROSI, divide your revenue by spending to find the return.
Reporting of Safety Information; to calculate ROSI, you must compare your company’s safety performance against a national or stage average to come up with the incident rate.
Radio signaling protocol; ROSI is the calculated use of abbreviation or slang over radio communications.
In IT terminology, ROSI refers to Return on Security Investment. To determine ROSI, we simply subtract what we expect to lose in a year (ALE) from the annual cost of intrusion. T is the cost of the intrusion detection tool. E is the dollar savings gained by stopping any number of intrusions through the introduction of an intrusion detection tool. R is the cost per year to recover from any number of intrusions. (R - E) + T = ALE and R - (ALE) = ROSI.
ROSI does also stand for Return on Spending Index, but this is a marketing tool and not an IT term.
ROSI does also stand for Report of Safety Information, but this is an OSHA safety report and not an IT term.
ROSI is a signal protocol for radio communication, but this is not an IT term.
Which of the following statements about the protection of data is true?
Data can be considered an asset and as such it has commercial value.
Data cannot be protected because it has no material substance.
Nobody can take data or information without you knowing.
If you run a small business, you are not vulnerable to hackers because they go after big corporations.
For organizations, and even for individuals, computer data can be considered an asset. An asset is something of commercial value. Therefore, it is important that you take the steps necessary to protect this asset.
Regardless of whether or not data has a material substance, it still has value and it certainly isn’t free (unless released as free for use).
Without protection, anybody can take data without your knowledge. You may want to invest in private clouds. They are a bit more expensive, but they tend to have more stringent safety measures and fewer points of entry for hackers.
To assume that hackers only go after big corporations is a fallacy. The truth is that over 70% of cyberattacks are made against businesses that employ fewer than 100 people.
What is a data breach?
When your network exposes private data publicly, whether or not the data is actively stolen
When your anti-virus software blocks a hacker from accessing your data
When the technician accesses your computer with remote desktop software
When your network is attacked by a denial of service attack and all of your cloud information is inaccessible
A data breach is an incident that involves the unauthorized or illegal viewing, access, or retrieval of data by an individual, application, or service. It is designed to steal and/or publish data to an unsecured or illegal location.
If your anti-virus software picks up an attack and informs you that it was blocked, then you are relatively safe from a data breach.
If a technician accesses your computer using remote desktop software to assist you, they are not committing a data breach.
If your network is attacked by a denial of service attack and you are unable to access your cloud data, then it is an issue of availability and not necessarily a data breach.
What is used to protect a name or logo?
A trademark protects a unique element such as a company name or logo.
A copyright of the name and logo will allow you to maintain the right to control and use them.
A patent will protect a name or logo.
Sending a copy of your own name or logo to yourself will protect it.
A trademark protects a name and/or logo so that a company can promote its goods without someone else taking their name or logo.
A copyright gives its owner the rights of publication, distribution, or sale, but is not used to protect names and/or logos.
A patent allows you to protect an idea or invention without even having to create it.
The practice of sending a copy of your own work to yourself is sometimes called a “poor man’s copyright.” There is no provision in copyright law regarding any such type of protection, and it is not a substitute for registration.
What is the first step needed to begin a data-driven business decision?
Set-up of a data capture and collection system
Correlation of data
Meaningful reporting
Business decisions should not be data driven
There are three systems associated with the data-driven business decision: data collection, data correlation, and meaningful reporting. It all starts with data collection. This is the step in which you collect all the data before analysis is done (often referred to as raw data).
While data correlation is a part of the data-driven business decision process, it does not necessarily have to be set up at the beginning. In fact, you cannot begin correlating data until you have that data.
Meaningful and understandable reporting is the necessary endpoint of the process.
Every business decision should be data driven.
What activities must one perform to make data-driven business decisions?
Capture data, correlate the data, and convert it into meaningful reports
Capture data and share with the interested parties
Know what you are doing, where you are going, and how you are going to get there.
Transfer authority to the computer, allow it to analyze your problem, and trust that it will do the right thing
To make data-driven business decisions you must capture data, correlate it, and convert that data into meaningful reports.
Data without correlation or meaningful reporting remains “raw data” and cannot be used to make a data-driven business decision.
While it may sound like a good marketing phrase, data-driven business decisions do not require you to know “what you are doing, where you are going, and how you are going to get there.”
The authority to make the decision ultimately lies with the person making the decision, often the CEO. A data-driven business decision provides a meaningful report that allows the CEO to make an informed decision.
What is a data exfiltration?
A security breach that occurs when an individual’s or organization’s data is illegally copied with or without their knowledge
A security breach in which a hacker has attached malicious code to a program and attacked your computer, eliminating your data
A security breach in which a hacker makes software that looks legitimate but can take control of your computer
A security breach in which a hacker hides a damaging image or file inside an image, causing damage to your computer
Data exfiltration occurs when an intentional data breach has been conducted and information is illegally copied out of your organization without your approval.
Malicious code usually comes in the form of a virus and is an infiltration rather than an exfiltration.
When a hacker uses software that looks legitimate but it takes over your computer, it is called a Trojan Horse or Trojan Virus. This is a type of virus, though it can result in an exfiltration of data without your knowledge.
Hiding something within an image with the intent of damaging a computer is a type of viral attack called steganography.
How is intellectual property protected?
Intellectual property can be protected through trademarks, copyrights, and patents.
Only physical property can be protected by trademarks, copyrights, and patents.
Intellectual property needs to be registered with the manufacturer to be protected.
Intellectual property cannot be protected because it has no substance.
Intellectual property consists of items you have created that are unique and that provide you with an economic benefit. It includes inventions, designs, original works of authorship, and trade secrets. How you protect your intellectual property depends on what types of intellectual property you have. It can be protected through trademarks, copyrights, and patents.
Intellectual property doesn’t have to be physical property to be protected—an idea can be protected as well.
A warranty needs to be registered with the manufacturer, but this is related to items you purchase, not intellectual property.
Intellectual property may be protected even if it does not have substance.
What invention was created to try to enforce copyright protection on digital products?
Digital Rights Management (DRM) systems
There are currently no inventions that have been created to enforce this
The Digital Protection Enforcement (DPE) system
A privacy screen protector for mobile devices
Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works. “Pay-per-use” policies were meant to prevent intellectual property from being copied freely, just as physical locks are needed to prevent personal property from being stolen.
There are actually many different types of DRMs in place to enforce copyright protection for digital products, specifically music, movies, and video games.
Digital Protection Enforcement systems (DPE) are not actual access-control technologies.
Although a privacy screen protector may prevent wandering eyes from seeing intellectual property, it will not enforce copyright protections.
What is an example of a digital product?
A video download
A computer case
Documentation that supports computer software
A computer monitor
A digital product is one that is sold or distributed as binary computer data. Digital products typically have low manufacturing and distribution costs, though hosted products can have substantial infrastructure costs. Examples of digital products include software, computer games, eBooks, music tracks, streaming video, and video downloads.
A computer case is an example of physical hardware.
Software support documentation is used to assist you in loading, running, and troubleshooting a program. It is not considered a digital product.
A computer monitor is an example of an output peripheral device.
What is used in lieu of a copyright to protect a name or logo?
A trademark
A patent
A trade secret law
A business plan
A trademark allows a company to protect a distinctive name and/or logo so the company can promote its goods.
A patent allows you to protect an idea or invention without even having to create it.
A trade secret law does not protect a name or logo; it can, however protect any formula, pattern, device, or compilation of information that is used in one’s business and that gives one an opportunity to obtain an advantage over competitors who do not know or use it.
A business plan can help you develop your path toward success, but it does not protect your name or logo without a copyright.
Why is meaningful reporting an important factor of data-driven business decisions?
It allows a human to analyze and interpret the information
It ensures you collected all the raw data
It correlates and attempts to find a connection and link between data points
Data-driven business decisions dont require meaninful reprots
To inform human decision making at the insights layer, the information identified by the analytics system must be presented in ways that humans can analyze and interpret.
While it is important to collect all of the raw data and information prior to data correlation, the meaningful report is not intended to confirm this process.
Data correlation is the analysis of the whole data set to find connections and links between data points.
Data-driven business decisions need meaningful reports. They are the product of the whole process.
Which is NOT a reason cybersecurity is important?
The effectiveness of defense methods is decreasing
The number of threats is increasing
The severity of attacks is increasing
Risks will continue to be a concern in the future
Cybersecurity is important because the numbers of threats are rising, the severity of attacks is increasing, and the future outlook indicates that cybersecurity risk will continue to be a concern. The effectiveness of defense methods is not decreasing.
The number of cybersecurity attacks is increasing every year. From a total cost of $445 billion in 2014, the cost of cybercrimes reached $600 billion in 2017.
In addition to more attacks, the severity of attacks is also on the rise.
Risks will continue to be a concern in the future, and many companies recognize that cybersecurity is an area worthy of commitment and are taking preventative action against threats.
What do you call an action through which someone uses, makes, sells, or imports your invention without your permission?
Patent infringement
An intellectual property crime
Copyright infringement
A tenchocrime
Patent infringement occurs when someone uses, makes, sells, or imports your patented invention without your permission.
An intellectual property crime is one in which you can prove that an idea was originally yours even though you may not have placed a copyright or patent on it.
Copyright infringement happens when somebody reproduces your copyrighted property or distributes unauthorized copies of works either online or by manufacturing and distributing infringing CDs or DVDs.
Technocrime is the term used by law enforcement agencies to denote criminal activity that uses (computer) technology not as a tool to commit a crime, but as the subject of the crime itself.
Which of these is NOT an example of security controls?
Audits and inventories
Access controls
Backups
High availability
Audits and inventories are important activities for measuring accountability within your organization, but they are not specific security controls.
Access controls are security controls that limit the use of a computing device to an authorized person, such as its owner. Access control on workstation operating systems is usually enforced by the restrictions of user accounts.
Backups are security controls that ensure business integrity and continuity in the event of a data loss. Having a backup enables you to restore your data when needed.
High availability is a preventive security control that ensures users always have access to their data. When a system is regularly non-functioning, information availability is affected, significantly impacting users.
Which of these is NOT a positive trait of a digital product in regard to the value assigned to information and data?
Digital sales through peer-to-peer transactions make it easier to sell information without the oversight of an institutional set of rules.
A digital product is one that is sold or distributed as binary computer data.
Digital products typically have low manufacturing and distribution costs.
The ability to sell information via hosting has increased the availability and accessibility of information even though infrastructure costs can be high.
Uncontrolled peer-to-peer transactions make it easier to sell information without the oversight of an institutional set of rules. This is how the online black market was created with the development of underground economies like Silk Road.
One of the key traits of data in terms of value in information stems from that fact that a digital product is one that is sold or distributed as binary computer data.
Due to technical advancements, digital products typically have low manufacturing and distribution costs.
The ability to sell information via hosting has increased the availability and accessibility of information even though infrastructure costs can be high.
Which of the following is a disadvantage of a semi-structured data warehouse for storing information?
The traditional relational data model has a popular and ready-made query language, SQL.
A programmer can serialize objects via a lightweight library.
Support for nested or hierarchical data often simplifies data models representing complex relationships between entities.
Support for lists of objects simplifies data models by avoiding the messy translations of lists into a relational data model.
The traditional way of storing data in a relational database actually creates a disadvantage for semi-structured data models. The popularity and ease with which the ready-made query language is written keeps people from migrating to new systems.
Programmers who place objects from their application into a database do not need to worry about object-relational impedance mismatch, but can often serialize objects via a lightweight library.
Support for nested or hierarchical data often simplifies data models representing complex relationships between entities.
Support for lists of objects simplifies data models by avoiding messy the translations of lists into a relational data model.
How do you protect an idea or invention without actually creating an example of it?
You can patent it
You can copyright it
You can trademark it
You can send a copy to yourself
A patent allows you to protect an idea or invention without even having to create it.
A copyright is an automatic legal protection granted to certain types of work, but before a copyright can be applied the work must have been created and a sample has to be shown.
A trademark is a protection applied to a name and/or logo so that a company can promote its goods without someone else taking their name and/or logo.
The practice of sending a copy of your own work to yourself is sometimes called a “poor man’s copyright.” It does not guarantee protection.
When does data become information?
When it is applied to some purpose and adds timely value for the recipient
When it is presented as unprocessed facts and figures without any added interpretation or analysis
It does not matter when data is applied and turned into information
Data does not have to be readily available to be useful
Data becomes information when it is applied to some purpose and adds value for the recipient. For example, a set of raw sales figures is data. For the sales manager tasked with deciding the future focus of a sales drive, the raw data needs to be processed into a sales report. It is the sales report that provides information.
Data that is presented unprocessed, without any added interpretation or analysis, is considered “raw data.”
Data that arrives after you have made your decision is of no value.
Data must be readily available for processing into information.
What is a copyright used for?
It is a legal protection granted to certain types of work that gives its holder the right to control the use of the work, including rights of publication, distribution, or sale.
It is the protection of a name or logo that a company can use to promote its goods.
It protects an idea or invention without the need to put it into practice or create it.
It protects an idea when you send a copy of your own work to yourself.
A copyright is an automatic legal protection granted to certain types of work, indicating that the copyright holder owns the right to control the use of the work, including rights of publication, distribution, or sale.
A trademark is a protection applied to a name and/or logo so that a company can promote its goods without someone else taking their name and/or logo.
A patent allows you to protect an idea or invention without even having to create it.
The practice of sending a copy of your own work to yourself is sometimes called a “poor man’s copyright.” There is no provision in copyright law regarding any such type of protection, and it is not a substitute for registration.
What is data correlation?
The process of analyzing the whole data set and finding connections and links between data points
The process of capturing and collecting data and information
The presentation of information in a meaninful ouput
The raw data itself
Data correlation is the analysis of the whole data set to find connections and links between data points. The ability of software to perform data correlation without much human intervention is greatly boosted by the development of Artificial Intelligence (AI) and machine learning systems.
Data capture and the collection of information is done prior to data correlation.
The presentation of information in a meaningful output is the outcome of data correlation.
The raw data is the data collected during the data capture phase.
In Information Technology (IT) terminology, what is ROSI and how do you calculate it?
Return on Security Investment; to calculate ROSI, you perform risk assessments to work out how much the loss of data would cost your organization and how likely it is that data loss might occur when an attacker removes data from your network without authorization.
Return on Spending Index; to calculate ROSI, divide your revenue by spending to find the return.
Reporting of Safety Information; to calculate ROSI, you must compare your company’s safety performance against a national or stage average to come up with the incident rate.
Radio signaling protocol; ROSI is the calculated use of abbreviation or slang over radio communications.
In IT terminology, ROSI refers to Return on Security Investment. To determine ROSI, we simply subtract what we expect to lose in a year (ALE) from the annual cost of intrusion. T is the cost of the intrusion detection tool. E is the dollar savings gained by stopping any number of intrusions through the introduction of an intrusion detection tool. R is the cost per year to recover from any number of intrusions. (R - E) + T = ALE and R - (ALE) = ROSI.
ROSI does also stand for Return on Spending Index, but this is a marketing tool and not an IT term.
ROSI does also stand for Report of Safety Information, but this is an OSHA safety report and not an IT term.
ROSI is a signal protocol for radio communication, but this is not an IT term.
Which of the following statements about the protection of data is true?
Data can be considered an asset and as such it has commercial value.
Data cannot be protected because it has no material substance.
Nobody can take data or information without you knowing.
If you run a small business, you are not vulnerable to hackers because they go after big corporations.
For organizations, and even for individuals, computer data can be considered an asset. An asset is something of commercial value. Therefore, it is important that you take the steps necessary to protect this asset.
Regardless of whether or not data has a material substance, it still has value and it certainly isn’t free (unless released as free for use).
Without protection, anybody can take data without your knowledge. You may want to invest in private clouds. They are a bit more expensive, but they tend to have more stringent safety measures and fewer points of entry for hackers.
To assume that hackers only go after big corporations is a fallacy. The truth is that over 70% of cyberattacks are made against businesses that employ fewer than 100 people.
What is a data breach?
When your network exposes private data publicly, whether or not the data is actively stolen
When your anti-virus software blocks a hacker from accessing your data
When the technician accesses your computer with remote desktop software
When your network is attacked by a denial of service attack and all of your cloud information is inaccessible
A data breach is an incident that involves the unauthorized or illegal viewing, access, or retrieval of data by an individual, application, or service. It is designed to steal and/or publish data to an unsecured or illegal location.
If your anti-virus software picks up an attack and informs you that it was blocked, then you are relatively safe from a data breach.
If a technician accesses your computer using remote desktop software to assist you, they are not committing a data breach.
If your network is attacked by a denial of service attack and you are unable to access your cloud data, then it is an issue of availability and not necessarily a data breach.
What is used to protect a name or logo?
A trademark protects a unique element such as a company name or logo.
A copyright of the name and logo will allow you to maintain the right to control and use them.
A patent will protect a name or logo.
Sending a copy of your own name or logo to yourself will protect it.
A trademark protects a name and/or logo so that a company can promote its goods without someone else taking their name or logo.
A copyright gives its owner the rights of publication, distribution, or sale, but is not used to protect names and/or logos.
A patent allows you to protect an idea or invention without even having to create it.
The practice of sending a copy of your own work to yourself is sometimes called a “poor man’s copyright.” There is no provision in copyright law regarding any such type of protection, and it is not a substitute for registration.
What is the first step needed to begin a data-driven business decision?
Set-up of a data capture and collection system
Correlation of data
Meaningful reporting
Business decisions should not be data driven
There are three systems associated with the data-driven business decision: data collection, data correlation, and meaningful reporting. It all starts with data collection. This is the step in which you collect all the data before analysis is done (often referred to as raw data).
While data correlation is a part of the data-driven business decision process, it does not necessarily have to be set up at the beginning. In fact, you cannot begin correlating data until you have that data.
Meaningful and understandable reporting is the necessary endpoint of the process.
Every business decision should be data driven.
What activities must one perform to make data-driven business decisions?
Capture data, correlate the data, and convert it into meaningful reports
Capture data and share with the interested parties
Know what you are doing, where you are going, and how you are going to get there.
Transfer authority to the computer, allow it to analyze your problem, and trust that it will do the right thing
To make data-driven business decisions you must capture data, correlate it, and convert that data into meaningful reports.
Data without correlation or meaningful reporting remains “raw data” and cannot be used to make a data-driven business decision.
While it may sound like a good marketing phrase, data-driven business decisions do not require you to know “what you are doing, where you are going, and how you are going to get there.”
The authority to make the decision ultimately lies with the person making the decision, often the CEO. A data-driven business decision provides a meaningful report that allows the CEO to make an informed decision.
What is a data exfiltration?
A security breach that occurs when an individual’s or organization’s data is illegally copied with or without their knowledge
A security breach in which a hacker has attached malicious code to a program and attacked your computer, eliminating your data
A security breach in which a hacker makes software that looks legitimate but can take control of your computer
A security breach in which a hacker hides a damaging image or file inside an image, causing damage to your computer
Data exfiltration occurs when an intentional data breach has been conducted and information is illegally copied out of your organization without your approval.
Malicious code usually comes in the form of a virus and is an infiltration rather than an exfiltration.
When a hacker uses software that looks legitimate but it takes over your computer, it is called a Trojan Horse or Trojan Virus. This is a type of virus, though it can result in an exfiltration of data without your knowledge.
Hiding something within an image with the intent of damaging a computer is a type of viral attack called steganography.
How is intellectual property protected?
Intellectual property can be protected through trademarks, copyrights, and patents.
Only physical property can be protected by trademarks, copyrights, and patents.
Intellectual property needs to be registered with the manufacturer to be protected.
Intellectual property cannot be protected because it has no substance.
Intellectual property consists of items you have created that are unique and that provide you with an economic benefit. It includes inventions, designs, original works of authorship, and trade secrets. How you protect your intellectual property depends on what types of intellectual property you have. It can be protected through trademarks, copyrights, and patents.
Intellectual property doesn’t have to be physical property to be protected—an idea can be protected as well.
A warranty needs to be registered with the manufacturer, but this is related to items you purchase, not intellectual property.
Intellectual property may be protected even if it does not have substance.
What invention was created to try to enforce copyright protection on digital products?
Digital Rights Management (DRM) systems
There are currently no inventions that have been created to enforce this
The Digital Protection Enforcement (DPE) system
A privacy screen protector for mobile devices
Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works. “Pay-per-use” policies were meant to prevent intellectual property from being copied freely, just as physical locks are needed to prevent personal property from being stolen.
There are actually many different types of DRMs in place to enforce copyright protection for digital products, specifically music, movies, and video games.
Digital Protection Enforcement systems (DPE) are not actual access-control technologies.
Although a privacy screen protector may prevent wandering eyes from seeing intellectual property, it will not enforce copyright protections.
What is an example of a digital product?
A video download
A computer case
Documentation that supports computer software
A computer monitor
A digital product is one that is sold or distributed as binary computer data. Digital products typically have low manufacturing and distribution costs, though hosted products can have substantial infrastructure costs. Examples of digital products include software, computer games, eBooks, music tracks, streaming video, and video downloads.
A computer case is an example of physical hardware.
Software support documentation is used to assist you in loading, running, and troubleshooting a program. It is not considered a digital product.
A computer monitor is an example of an output peripheral device.
What is used in lieu of a copyright to protect a name or logo?
A trademark
A patent
A trade secret law
A business plan
A trademark allows a company to protect a distinctive name and/or logo so the company can promote its goods.
A patent allows you to protect an idea or invention without even having to create it.
A trade secret law does not protect a name or logo; it can, however protect any formula, pattern, device, or compilation of information that is used in one’s business and that gives one an opportunity to obtain an advantage over competitors who do not know or use it.
A business plan can help you develop your path toward success, but it does not protect your name or logo without a copyright.
Why is meaningful reporting an important factor of data-driven business decisions?
It allows a human to analyze and interpret the information.
It ensures you collected all the raw data.
It correlates and attempts to find a connection and link between data points.
Data-driven business decisions don’t require meaningful reports.
To inform human decision making at the insights layer, the information identified by the analytics system must be presented in ways that humans can analyze and interpret.
While it is important to collect all of the raw data and information prior to data correlation, the meaningful report is not intended to confirm this process.
Data correlation is the analysis of the whole data set to find connections and links between data points.
Data-driven business decisions need meaningful reports. They are the product of the whole process.
Which is NOT a reason cybersecurity is important?
The effectiveness of defense methods is decreasing.
The number of threats is increasing.
The severity of attacks is increasing.
Risks will continue to be a concern in the future.
Cybersecurity is important because the numbers of threats are rising, the severity of attacks is increasing, and the future outlook indicates that cybersecurity risk will continue to be a concern. The effectiveness of defense methods is not decreasing.
The number of cybersecurity attacks is increasing every year. From a total cost of $445 billion in 2014, the cost of cybercrimes reached $600 billion in 2017.
In addition to more attacks, the severity of attacks is also on the rise.
Risks will continue to be a concern in the future, and many companies recognize that cybersecurity is an area worthy of commitment and are taking preventative action against threats.
Small files are often measured in what unit?
Kilobyte (KB), or 1000 bytes
Kbps, or 1000 bits per second
A binary digit/bit, 0 or 1
A byte, which is eight bits
The Kilobyte (KB) is used to represent 1000 bytes and is used for small files and older computer files.
Kbps, or 1000 bits per second, is not a measurement of the size of a file but of the speed at which data is transferred between devices on the bus.
One bit takes one storage location in memory. It is the smallest unit of data storage.
A collection of eight bits is called a byte. It is used to store a single character. The capacity of the memory or the storage is expressed in terms of bytes.
Small files are often measured in what unit?
Kilobyte (KB), or 1000 bytes
Kbps, or 1000 bits per second
A binary digit/bit, 0 or 1
A byte, which is eight bits
The Kilobyte (KB) is used to represent 1000 bytes and is used for small files and older computer files.
Kbps, or 1000 bits per second, is not a measurement of the size of a file but of the speed at which data is transferred between devices on the bus.
One bit takes one storage location in memory. It is the smallest unit of data storage.
A collection of eight bits is called a byte. It is used to store a single character. The capacity of the memory or the storage is expressed in terms of bytes.
Older computer peripheral interfaces and slow network links are measured in what type of throughput unit?
Kbps, or 1000 bits per second
Gigabyte (GB), or 1000 x 1000 x 1000 bytes
Gbps, or 1,000,000,000 bits per second
Megabyte (MB), or 1000 x 1000 bytes
Slow network links and older legacy computers measure their throughput in Kbps.
The Gigabyte is not a throughput unit of measurement. It is commonly used to represent disk capacity.
Gbps is used as a measurement of throughput speed, but it is not used to refer to slow network links or older legacy computers. The latest PC bus standards and networks use Gbps as the standard for throughput speed.
A Megabyte is not a throughput rate. It is a unit of storage representing 1000 x 1000 bytes, and is commonly used to measure medium to large files.
What is the first multiple of a bit?
The byte, which represents eight bits
The binary digit or bit, which can represent two values (0 or 1)
The Kilobyte (KB), which is 1000 bytes
The Megabyte (MB), which is 1000 x 1000 bytes
A collection of eight bits is called a byte. It is used to store a single character. The capacity of memory or storage is expressed in terms of bytes.
A computer works with binary digits. These digits are in the form of 0s and 1s. A binary digit is called a bit. One bit takes one storage location in memory. It is the smallest unit of data storage and not a multiple at all.
The Kilobyte represents 1000 bytes, so it is not the smallest multiple.
The Megabyte represents 1000 x 1000 bytes, so it is not the smallest multiple either.
Modern Central Processing Units (CPUs) and bus types plus fiber optic network equipment work at what signal speed?
Gigahertz (GHz) or 1000 million cycles per second
Petabyte 1000 TB
Megabyte (MB) 1000 x 1000 bytes
Megahertz (MHz) or 1 million cycles per second
Gigahertz (GHz) or 1000 million cycles per second
Unselected
Petabyte 1000 TB
Unselected
Megabyte (MB) 1000 x 1000 bytes
Unselected
Megahertz (MHz) or 1 million cycles per second
Older bus interfaces and many types of network interfaces work at what signal speed?
MHz, or 1 million cycles per second
Kbps, or 1,000 bits per second
GB, or 1000 x 1000 x 1000 bytes
Gbps, or 1,000,000,000 bits per second
MHz, or 1 million cycles per second
Unselected
Kbps, or 1,000 bits per second
Unselected
GB, or 1000 x 1000 x 1000 bytes
Unselected
Gbps, or 1,000,000,000 bits per second
Newer hard disks and other large storage networks can be measured in what unit?
Terabyte, or 1000 GB
The bit, which represents two values (0 or 1)
Megahertz (MHz), or 1 million cycles per second
Mbps, or 1,000,000 bits per second
A Terabyte represents 1000 GB and it is the unit of measure for newer hard disks and other large storage networks.
A bit is a unit of measurement for capacity, but it is the smallest unit and can’t be used for large storage networks or newer hard drives.
Megahertz is not a unit of measurement for storage. It is a measurement of the frequency at which you transmit data or the speed at which the hard drive spins to process data.
Mbps does not represent disk capacity, but is a representation of speed.
What unit is used to measure large storage network and cloud systems?
Petabyte, or 1000 TB
Megabyte (MB), or 1000 x 1000 bytes
Megahertz (MHz), or 1 million cycles per second
Mbps, or 1,000,000 bits per second
The Petabyte is currently the largest storage capacity unit of measurement. It represents 1000 Terabytes and is used for large storage networks and cloud storage.
A Megabyte represents 1000 x 1000 bytes and is used to measure medium to large files.
Megahertz is not a unit of measurement for storage. It is a measurement of the frequency at which you transmit data or the speed at which the hard drive spins to process data.
Mbps is not a measurement of storage. It is commonly used for wireless networks and residential internet links as a measurement of throughput speed.
What is the basic unit of computer data?
The binary digit or bit, which can represent two values (0 or 1)
The byte is the first multiple of the bit and it represents eight bits.
The Gigabyte (GB), which is 1000 x 1000 x 1000 bytes
The Megabyte (MB) which is 1000 x 1000 bytes
A computer works with binary digits. These digits are in the form of 0s and 1s. A binary digit is called a bit. One bit takes one storage location in memory. It is the smallest unit of data storage.
A collection of eight bits is called a byte. It is used to store a single character. The capacity of the memory or storage is expressed in terms of bytes.
A Gigabyte is 1000 x 1000 x 1000 bytes and is therefore not the most basic unit of computer data.
A Megabyte is 1000 x 1000 bytes, and like a Gigabyte it is too big to be the most basic unit of computer data.
What throughput capacity is found in major telecommunications links between data centers, cities, and countries?
Tbps, or 1,000,000,000,000 bits per second
Kbps, or 1000 bits per second
Mbps, or 1,000,000 bits per second
Gbps, or 1,000,000,000 bits per second
Major telecommunications links between data centers, cities, and countries are measured in Tbps, or 1,000,000,000,000 bits per second.
Slow network links and older legacy computers measure their throughput in Kbps, or 1000 bits per second. This measurement is too small for major telecommunications links.
Wireless networks and residential internet links typically use Mbps, or 1,000,000 bps, as a throughput speed. This measurement is too small for major telecommunications links.
The latest PC bus standards and networks can support Gbps, or 1,000,000,000 bits per second as a throughput speed. This measurement is too small for major telecommunications links.