Practice Test 1 - Incorrect Flashcards

Correct mistakes from Practice Test 1

1
Q

Jonathan checks out a company laptop to prepare a presentation. As he works on it, he notices that the mouse cursor keeps jumping around the screen, even though he’s not touching the mouse, only the keyboard. What should he try first to fix this problem?

A

✅ Disable the touchpad.

🧠 Some laptops have notoriously sensitive touchpads that will move the cursor when any part of the hand touches the surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

John’s boss wants a computer with an optical drive. Which one of these must the computer have to fulfill that request?

A

✅ Blu-ray Disc

🧠 Like CDs and DVDs, BDs require laser light to view, making them optical media. Don’t be thrown off if the exam doesn’t use the proper name for the technology and only calls it Blu-Ray.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What specific component does a fax machine require to use POTS to send a fax?

A

✅ Modem

🧠 A fax machine can send faxes over the traditional telephone network using a built-in modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Amy needs to connect a wired Ethernet printer to her office network. What does she need to accomplish this task? (Choose two)

🫥 SSID of the network
🫥 Username and password for the printer
🫥 IP address
🫥 Subnet mask
🫥 FTP port number

A

✅ IP address
✅ Subnet mask

🧠 Amy needs to give the printer a valid IP address and subnet mask to make the printer available on the network. A subnet mask is a value used in the TCP/IP settings to divide the IP address of a host into its component parts: network ID and host ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does pressing the reset button on a SOHO router accomplish?

A

✅ Changes the admin password to factory default

🧠 Changes the admin password to factory default. The reset button enables you to deal with a misconfigured SOHO router by changing configurations to the default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alberto argues that most offices have at least one device these days that’s both an input and output device. Jane laughs and points out two. Which devices might she have pointed out? (Choose two)
🫥 Fax machine
🫥 LCD Monitor
🫥 Multifunction printer
🫥 Microphone
🫥 Scanner

A

✅ Fax machine
✅ Multifunction printer

🧠 More properly called multifunction devices (MFDs), these combine several technologies into a single device, such as printer, scanner, fax machine, and copier. Printers and copiers are output devices. Scanners are input devices. Fax machines are both input and output devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Thieves broke into the Bayland Widgets corporate office and stole laptops that likely had company secrets. Aside from bemoaning the loss of the hardware, though, the company IT manager isn’t worried about data theft because she implemented which policy?

A

✅ Requiring full disk encryption

🧠 That’s right. Lock every one of those hard drives down so a thief can’t get access to any data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After upgrading his video card, Simon gifted his old card to his friend, Barek, so that he could upgrade too. Simon suggested that Barek should update his video card drivers. Of the following options, which two would compel Barek to upgrade drivers?

A

✅ To fix an error message
✅ To add new features

🧠 To fix an error message. Error messages range from problems with games to resolution issues. An updated driver can often fix such things.
🧠 To add new features. Early drivers for video cards might not unlock all the potential for that card. Updated drivers can help optimize video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which code example correctly references the Name property for the third element in an array named Cities?

  • $Cities[2].Name
  • Cities2.Name
  • Cities3.Name
  • $Cities[4].Name
A

$Cities[2].Name

🧠 The specific programming language syntax will vary from one language to another, but this syntax is the best answer; this syntax works in Microsoft PowerShell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is happening in the following code snippet?

Set-Variable -Name hourly_wage -Value 17.99 -Option ReadOnly

A

✅ A constant is being declared.

🧠 In Microsoft PowerShell, the –Option ReadOnly parameter creates a constant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between NoSQL databases and SQL databases?

A

✅ Can have different types of data stored in each row.
✅ Are schema-less.

🧠 Schema-less means there is no strict definition on what type of data will be stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your company’s cloud-hosted web site will use a database to store product documentation. The web server will be deployed on a different network than the database server, which will be in its own data tier. Employees working on-premises will create and update product document PDF files, which will be available through the web site. Which strategy best meets the needs of this scenario?

A

✅ Place a writeable replica on-premises.
✅ Place a read replica in the cloud-based data tier.

🧠 Place a writable replica on-premises. Employees working here can insert product documentation to the database.
🧠 Place read replicas in the cloud-based data tier. Updated product documentation from on-premises will be replicated to the read replica.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Art browses to a secure web site (with HTTPS and a little lock on display), and his browser, Microsoft Edge, reports a “mixed content” warning. What does this mean?

A

✅ The web page displays both secure and nonsecure content.

🧠 Accessing a web page that shows both secure and nonsecure content will trigger a mixed content warning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Steve’s ancient SOHO router only offers WEP encryption, which he knows offers minimal security. Short of buying a new router, how can Steve make his Wi-Fi network more secure?

A

✅ Enable MAC address filtering.
✅ Disable SSID broadcast.

🧠 Filtering access by MAC addresses adds security to a wireless network. A MAC address is a unique 48-bit address assigned to each network card. Disabling broadcast of the SSID (the network name) makes it harder for someone to find the network. It doesn’t in reality add much security, but it has been touted as a security feature for years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why should a business back up data?

A

✅ To ensure data availability

🧠 A big IT industry push is to ensure high availability of all data and other essential resources. Backing up data helps make that happen whether the data consists of individual files or an entire operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you best cover your web browsing tracks?

A

✅ Clear History
✅ Remove Cookies

🧠 Expunging all past information pretty much will stop the tracking of past information.

17
Q

Which of the following is a six-step framework used by software developers to create and maintain software solutions?

🫥 SLA
🫥 GPS
🫥 SDLC
🫥 SaaS

A

✅ SDLC

🧠 The software development life cycle is a structured framework consisting of the following phases: Requirement Analysis & Planning, Design, Coding, Testing, Deployment, and Maintenance.

18
Q

You are creating a database management script. The script contains the use east_region; select * from employees; command. What does this do? Choose the best answer.

🫥 Select all rows from the employees table in the east_region database.
🫥 Select all fields from the employees table in the east_region database.
🫥 Select all rows from the east_region table in the employees database.
🫥 Select all fields from the east_region table in the employees database.

A

✅ Select all fields from the employees table in the east_region database.

🧠 The provided code is a SQL query that interacts with a relational database, specifically focusing on a database or schema named “east_region.” Let’s break it down:

  1. use east_region;: This statement is used to switch to the specified database or schema named “east_region.” In a relational database management system (RDBMS) like MySQL, PostgreSQL, or SQL Server, databases are used to organize and manage collections of tables, views, and other database objects.
    📝 The USE statement is commonly used in database systems to select a specific database, making it the current or active database for subsequent queries.
  2. select * from employees;: This is a SQL query that retrieves all columns (* indicates all columns) from the “employees” table within the “east_region” database.
    📝 The SELECT statement is used to query the database and retrieve data. In this case, it fetches all records from the “employees” table.
    📝 The FROM clause specifies the table from which to retrieve data, in this case, the “employees” table.

So, when these two statements are executed together, the code switches to the “east_region” database and retrieves all records from the “employees” table within that database.

Note: The specifics of how database management systems handle these statements may vary slightly between systems, but the general principles remain the same.

19
Q

Performance for a custom applications that queries a large database degrades during peak usage. What should you do to address the problem? (Choose two.)
🫥 Scale out
🫥 Scale up
🫥 Scale vertically
🫥 Scale horizontally

A

✅ Scale out
✅ Scale horizontally

🧠 Scale out, Scale horizontally. These are techniques used to accommodate an increased database load by adding machines. This can be manual or automated.

20
Q

Every time Joey plugs his laptop into the company network, people report that they can see his laptop in the Network portion of File Explorer. How best can Joey stop this from happening?

🫥 Remove all shared folders from his system.
🫥 Give his shared folders administrative access.
🫥 Disable file and print sharing.
🫥 Disable the NIC in Device Manager.

A

✅ Disable file and print sharing.

🧠 Disable file and print sharing to prevent his laptop from showing in the Network portion of File Explorer.