Practice Test Flashcards

1
Q

A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?

  1. Settings/Devices
  2. Device Drivers

3.Devices and Printers

4.Device Manager

In Windows 10 version 1803 and newer, the location for the basic user-configurable settings for peripheral devices is the Devices page within the Settings app. In Windows 7, Windows 8, and early versions of Windows 10, Devices and Printers is the location for the basic user-configurable settings for peripheral devices attached to the computer.

Device Manager is the page used to perform functions such as updating device drivers or uninstalling devices, not setting a device to be the default.

Device Drivers is not a page in Windows. Drivers are accessed from the Device Manager page.

A

Settings/Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following declarations represents a 2-dimensional array?

declare Animal(9,9) as String

declare Animal(2) as String

declare Animal(1) as String

declare Animal(2,2,2) as String

A

declare Animal(9,9) as String

The Animal(9,9) array is a 2-dimensional array, with up to 10 elements in each dimension (elements in the array are counted from zero). The elements are similar to rows and columns, with the first dimension serving as the row, and the second dimension serving as columns for each row. The Animal(9,9) array can have up to 100 total elements, in 10 rows by 10 columns.

The Animal(1) array is a 1-dimensional array with up to 2 elements.

The Animal(2) array is a 1-dimensional array with up to 3 elements.

The Animal(2,2,2) array is a 3-dimensional array with up to 3 elements in each dimension.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A web application needs to make changes to the contents of a table in a database, in response to a user’s input. What method contains the command to do that?

DCL (Data Control Language)

DDL (Data Definition Language)

XML (eXtensible Markup Language)

DML (Data Manipulation Language)

A

DML (Data Manipulation Language)

DML (Data Manipulation Language) commands refer to SQL (Structured Query Language) commands that access or modify the contents of the database. DML commands include UPDATE, which changes the value of one or more table columns, for a specified set of rows.

DDL (Data Definition Language) commands refer to SQL commands that add to or modify the structure of the database.

DCL (Data Control Language) mainly deals with the rights, permissions, and other controls of the database system, with commands such as GRANT and REVOKE.

XML (eXtensible Markup Language) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the properties of a file “Books/CoverPhoto.js”?

It’s a document file named “Books/CoverPhoto.js”.

It’s an executable file named “CoverPhoto.js” in folder “Books”.

It’s an image file named “CoverPhoto.js” in folder “Books”.

It’s an image file named “Books/CoverPhoto.js”.

A

It’s an executable file named “CoverPhoto.js” in folder “Books”.

An executable file contains program code, and can make changes to the computer system. Executable file extensions include “exe”, “bat”, “cmd”, and “js”. The slash symbol (/) is reserved for listing folders or directories in all operating systems, and the back-slash symbol () is also used for this on some systems.

Image file extensions include “jpg” and “jpeg”, but not “js” which stands for JavaScript code, a script file that runs within an interpreter.

File names cannot contain the reserved symbol “/”, so the entire name is not the file name. “Books” is the folder, and “CoverPhoto.js” is the file.

Document file formats are used by word processing software, with extensions such as “txt”, “rtf”, “doc”, and “docx”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a worm propagates over a network, which of the following is the first action to take, to prevent further infection?

Escalate the problem to a support professional.

Disconnect the network link.

Enable on-access scanning.

Use antivirus software to try to remove the infection.

A

Disconnect the network link.

Malware such as worms propagate over networks. Therefore, one of the first actions should be to disconnect the network link.

If a file is infected with a virus, the antivirus software should detect it and take the appropriate action. You can use antivirus software to try to remove the infection.

After you have determined you cannot clean a file or if the antivirus software does not detect it, and allows the virus to infect the computer, then you should get help by escalating the problem to a support professional.

With on-access scanning, when a file is accessed, the antivirus software scans the file and blocks access if it detects anything suspicious. If a worm propagates, on-access scanning has failed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode?

USB 2.0

USB 3.0

USB 1.1

USB 3.1

A

USB 3.0

The USB 3.0 standard introduced a SuperSpeed mode, which improved the bus bandwidth to 5 Gbps (Gigabits per second) and made the link full duplex, so a device can send and receive at up to 5 Gbps simultaneously. USB 3.x receptacles and connectors often have a blue connector tab or housing to distinguish them.

The data rate for USB 1.1 is 12 Mbps (Megabits per second).

The USB 2.0 (Hi-Speed) standard has a nominal data rate of 480 Mbps. USB 2.0 uses the same connectors as USB 1.1 but a USB 1.1 device plugged into a USB 2.0 port will operate at the lower speed.

USB 3.1 defines a SuperSpeed+ mode with a data rate of 10 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When using web search engines, why should privacy considerations affect a user’s decisions?

A user’s web searches prevent companies from using targeted advertisements.

A user’s web history skews sales and marketing trends amongst consumers

A user’s private data can appear in web searches.

A user’s web searches can reveal very valuable information.

A

A user’s web searches can reveal very valuable information.

Privacy considerations should affect your choice of Internet Service Provider (ISP) and web search engines. Your browsing and search history reveal an enormous amount of very valuable personal information.

If you make something public accidentally, it can be very difficult to stop people from continuing to publish it elsewhere. Public data can be archived and continue to appear in web searches.

Information about individual consumers gleaned from web search and social media histories allows for personalized advertising.

Large data sets, such as web searches and social media histories, can be used to identify trends, and develop products and services to meet changing demands and interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user installs VirtualBox on a Linux OS (Operating System). Which class of hypervisor is it?

Type I, because VirtualBox manages the virtual machine environment

Type II, because VirtualBox is a software application within a host operating system

Type I, because the Linux OS is installed directly on the computer

Type II, because Linux provides the resources for the virtual environment

A

Type II, because VirtualBox is a software application within a host operating system

A type II hypervisor runs as a software application within a host operating system. VirtualBox is a third-party virtualization software which can be installed on host systems including Linux.

For both type I and II hypervisors, the physical machine (or host) provides the resources, such as CPU and memory, for the virtual environment.

Both type I and II hypervisors manage the virtual machine environment and facilitate interaction with the host hardware and network.

The Linux OS is installed directly on the computer, but it serves as the host to the type II hypervisor which is the VirtualBox software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of software is project management software?

Productivity software

Business software

Networking software

Collaboration softwar

A

Business software

Project management involves breaking a project into a number of tasks and assigning responsibilities, resources, and timescales to ensure the completion of those tasks. Specialized business software such as Microsoft Project assists with this process by visualizing task timelines and dependencies, and recording information about task properties and progress.

Productivity software refers to applications that help users complete typical office tasks. Project management is a more complex task with many functions, and requires specialized business software.

Collaboration software means that multiple users can work together on the same file or project. Working on a project is very different from managing a project, and requires different type of software.

Networking software is for administrators to deploy, manage, and monitor a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the end result of the iterative process of establishing and testing a theory while troubleshooting?

Resolve the problem.

Establish a root cause for the problem.

Identify the person responsible for creating the problem.

Ensure that the problem is never repeated.

A

Establish a root cause for the problem.

The end result of the iterative process of establishing and testing a theory (establish a theory, test it, if it doesn’t work, establish another theory) is to establish a root cause for the problem.

The iterative process of establishing and testing a theory is the combination of Steps 3 and 4 of CompTIA’s troubleshooting model. Resolving the problem is part of Step 6: implement the solution or escalate as necessary.

Ensuring that the problem is never repeated is part of Step 7: verify full system functionality and, if applicable, implement preventive measures.

Many technical problems are not caused by a specific person, but by events and circumstances, such as power or equipment failure, hardware or software malfunction, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following uses MHz (Megahertz) to measure their speed?

Older PC bus interfaces

Bluetooth

Wireless technologies

Modern computer processors

A

Older PC bus interfaces

MHz stands for Megahertz, which is 1 million (1,000,000) cycles per second. Older PC bus interfaces work at this slower signaling speed.

Modern computer processors work at much faster speeds of at least 1 GHz (Gigahertz) which is 1 billion (1,000,000,000) cycles per second. The first 1 GHz processors for consumer computers were released in the year 2000.

Wi-Fi (wireless networking) most commonly uses the 2.4 GHz and 5 GHz radio frequencies to provide wireless high-speed Internet and network connections.

To communicate between devices, Bluetooth sends signals over a 2.4 GHz radio frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of language has working with datasets as its primary purpose?

Assembly

Markup

Query

Compiled

A

Query

Code written in a query language, such as SQL (Structured Query Language), is designed to retrieve specific records from a dataset.

An assembly language is any low-level programming language, designed to perform many functions.

A markup language is a means of making data in a document accessible to a program, via a series of nested tags that describe the structure and/or meaning of the tag contents. A markup document represents a dataset, and the program that reads it is the one that works with it.

Compiled languages can perform any programming task, including working with datasets, usually via a markup document or embedded queries. That is a small part of their designed functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does this pseudocode declare?
declare MinutesPerHour as Number = 60

A primary key

A constant

An array

A variable

A

A constant

A constant is a specific identifier that contains a value that does not change within the program. In this example, the value of MinutesPerHour is always 60 and will not change.

A variable contains a value that can change during the execution of the program. There is no reason to ever change the MinutesPerHour identifier after its declaration.

An array is a type of identifier that can reference multiple values; it’s a set of elements. MinutesPerHour is a single identifier.

A primary key is an element of a database, not a pseudocode identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A table in a relational database receives imported data from a text document. In what format does the table store the new data?

In a semi-structured way

As key/value pairs

In a structured way

In an unstructured way

A

In a structured way

Relational databases store information in a structured way, regardless of how that data gets into the database. This structure provides easy access to the information, along with flexibility over which data to access.

Unstructured data is information that does not have a pre-defined data model or is not organized in a pre-defined manner. Unstructured data provides no rigid formatting of the data, but when a relational database imports unstructured data, it becomes structured data within the database.

Semi-structured databases lack the structure of formal database architecture, but they have metadata: associated information helps identify the raw unstructured data.

A key/value pair database is a means of storing the properties of objects without predetermining the fields used to define an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which backup storage type best helps mitigate against critical data loss in the risk of fire or theft?

System backup

Cloud-based storage backup

Locally attached storage

Test restore

A

Cloud-based storage backup

Offsite/cloud-based is backing up data over the Internet to cloud-based storage. Keeping offsite copies of data is very important in mitigating against the risk of fire or theft.

Locally attached storage uses hard disks or flash drives attached to a local PC or server. Hard disks or flash drives can be stolen or destroyed.

A system backup is an operating system (OS) backup that makes a copy of the OS and installed applications so that a workstation or server can be recovered without having to manually reinstall software and reconfigure settings.

A test restore is important when using new backup software, to test old backup media, to check a new job, and to carry out random spot checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?

100

6400

800

1600

A

800

SDRAM has a 64-bit data bus, meaning that in each clock cycle, 64 bits of information can be delivered to the CPU. If the bus is running at 100 MHz, the bandwidth available to the memory controller is 100*64 or 6400 megabits per second. To calculate the bandwidth in MBps, this number is divided by 8 and equals 800 MBps.

The calculation is 6400 Mbps (megabits per second), which needs to be divided by 8 to determine MBps (megabytes per second).

100 MHz is the speed at which the bus is running, not the available bandwidth in MBps.

1600 would be the correct answer if the question was about DDR SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?

Device Manager

Command Prompt

Programs and Features

Driver Manager

A

Driver Manager

There is no page or window called “Driver Manager”. Drivers are installed for specific devices, and can be managed from the Device Manager page.

A good way to uninstall a driver is by uninstalling the software package used to install the driver in the first place, on the Programs and Features page from Control Panel.

A user can locate the device and uninstall it on the Device Manager page. Uninstalling the device usually comes with the option to uninstall the related drivers as well.

A user can delete drivers using command-line syntax from the Command Prompt window.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user runs Microsoft Edge on a Windows 10 desktop. For more secure browsing, the user tries to disable scripting, but cannot deactivate it. What should the user do?

Install a script blocker add-on.

Refrain from using Microsoft Edge.

Continue browsing with enabled scripting.

Switch to a different operating system.

A

Install a script blocker add-on.

Script blocker add-ons prevent unauthorized websites from running JavaScript, and provide control over which websites are allowed to run scripts. Browsers that do not allow the user to disable scripts can have add-ons.

If Microsoft Edge is the user’s preferred browser, then using a different browser is not as desirable as installing a script blocker add-on, and continuing to use the preferred browser.

If there was a good reason for the user to decide to disable scripting, then keeping it enabled is not the ideal solution.

Switching to a different operating system is a complicated process that takes a lot of time to do, while installing a script blocker add-on can take less than a minute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express?

10

256

128

26

A

128

ASCII was designed in 1963 using seven bits, which was a significant cost saving over using eight bits. Seven bits of binary can express 128 different values (0 through 127).

Modern systems use eight bits instead of seven, giving rise to extended ASCII which can express 256 values, but the original non-extended ASCII can only express 128 values.

While the English language has 26 letters, ASCII contains much more, including 2 sets of the English alphabet (uppercase and lowercase), 10 digits (0 to 9), and special characters.

Decimal notation contains 10 values (0 to 9), which is included in ASCII, as are letters (uppercase and lowercase) and special characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an example of a cloud hosted application?

Microsoft Excel

Adobe Photoshop

Google mail

Windows Media Player

A

Google mail

Google mail, or Gmail, is a cloud hosted application which is accessed from a web browser. There are locally installed applications, such as Microsoft Outlook, which can access the data (by downloading emails into the client) but all data is stored on the server.

Microsoft Excel is a locally installed application for working with spreadsheets.

Adobe Photoshop is a locally installed graphics editor, with a bundled suite of image-processing software applications.

Windows Media Player is a locally installed media library application, used for playing audio and video, as well as viewing images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A program is a sequence of what?

Functions

Instructions

Flow charts

Attributes

A

Instructions

A program is a sequence of instructions which the computer performs. The sequence can consist of just one instruction, such as the popular example “print ‘Hello World’”, or thousands, even millions of instructions in a single program.

Functions are elements of programs, and can be something that the programmer creates, or internal system functions. But a program is not a sequence of functions.

A graphical flow chart helps to visualize the program sequence and understand the processes. It’s a tool that programmers use, not a component of a program.

An attribute is a term of OOP (Object-Oriented Programming) to define objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is true regarding a 32-bit vs. a 64-bit CPU (Central Processing Unit)?

A 64-bit CPU can run a 32-bit OS.

A 32-bit CPU can run a 64-bit OS.

All smartphones use a 32-bit CPU.

All tablets use a 64-bit CPU.

A

A 64-bit CPU can run a 32-bit OS.

A 64-bit CPU can run a 64-bit or 32-bit OS. 32-bit systems are limited to addressing 4 Gigabytes of system memory, whereas 64-bit systems can address 256 Terabytes (or more), meaning that 64-bit systems run more efficiently, since memory blocks are more easily allocated. They support 64-bit instructions, so they process more data at once than 32-bit systems.

64-bit applications include 64-bit instructions that will not be recognized by a 32-bit processor, so a 32-bit CPU cannot run 64-bit software, only 32-bit.

Not all smartphones use 32-bit CPU. 64-bit CPU dominates the premium sector, while 32-bit is still prevalent on budget and midrange models.

Like smartphones, premium tablets mostly use 64-bit CPU, and budget and midrange models usually run 32-bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What’s a true statement about the assembly language?

Assembly languages are not programming languages.

Only specialists use assembly code.

Each assembly language can run on any platform.

Assembly code is not human-readable.

A

Only specialists use assembly code

An assembly language is any low-level programming language in which there is a very strong correspondence between the program’s statements and the architecture’s machine code instructions. Assembly code is very difficult to follow and is only really used by specialists trying to solve a very particular problem with an application.

The assembly language represents machine code in human-readable text.

Assembly languages are the first generation of programming languages. They rate at slightly higher level than machine code.

An assembly language is typically specific to a particular hardware architecture. Different assembly languages can run on different platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A laptop built a year ago is likely to have which CPU (Central Processing Unit)?

16-bit

128-bit

64-bit

32-bit

A

64-bit

Most modern workstations and laptops use 64-bit CPUs.

Some budget laptop models might come with a 32-bit chip, though this is increasingly unusual.

16-bit CPUs were used several decades ago and were replaced by 32-bit CPUs. The first 32-bit CPU was introduced in 1985.

There are currently no mainstream general-purpose processors built to operate on 128-bit technology. Most modern CPUs feature Single-Instruction Multiple-Data (SIMD) instruction sets where 128-bit vector registers are used to store several smaller numbers, such as four 32-bit floating-point numbers. In other words, 128-bit processing is emulated with 32-bit or 64-bit architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following exposes a user to a Man-in-the-Middle (MitM) attack?

Plain text

A cryptographic hash

Cipher text

Encryption

A

Plain text

Plain text is also known as clear text and is an unencrypted message. To secure transmissions from eavesdropping, sniffing and MitM attacks, data should be encrypted.

Cipher text is an encrypted document or message that can travel across a public network, such as the Internet, and remain private.

With encryption, even if an eavesdropper could intercept and examine the data packets, the content would be unreadable.

Cryptographic hashing is a type of encryption that can be used to prove that a message has not been tampered with and for secure storage of data where the original meaning does not have to be recovered (e.g., passwords).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A table contains information about the company’s customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What’s the best way to set up a primary key for this table?

Use the Email field as the primary key.

Create a new field called Id.

Use the Phone field as the primary key.

Use the combination of the First Name and Last Name fields as the primary key.

A

Create a new field called Id.

A primary key is a unique identifier of every record in the table. When there is no natural key, the custom is to create a new field, which can be a sequential number, or a free-form field which rejects duplicates.

The Phone field might not be unique. For example, two customers might share a phone number. Also, the Phone field could be empty, and a primary key needs to have a value.

Similar to the Phone field, the Email field might not be unique, or it could be empty.

The combination of the First Name and Last Name fields has a higher chance of being non-empty than the Phone and the Email fields, but there is no guarantee of uniqueness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An attacker captures password packets to figure out a user’s password to gain access to a host on a corporate network, and masquerades as that user. Which of the following is a threat to integrity that describes this attack?

Snooping

Wiretapping

Impersonation

Social engineering

A

Impersonation

Impersonation is an attack where a person will attempt to figure out a password or other credentials to gain access to a host. An obvious way to perform an impersonation attack is to capture password packets in transit and work out which bit is the password.

Snooping is a confidentiality concern and is any attempt to get access to information on a host or storage device (data at rest) that you are not authorized to view.

Eavesdropping/wiretapping/sniffing is a confidentiality concern and is essentially snooping on data or telephone conversations as they pass over the network.

Social engineering is a confidentiality concern and refers to getting users to reveal confidential and personally identifiable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Data encryption, firewalls, and backups are examples of what?

Security controls

Intellectual property

Data capture

Data breach

A

Security controls

Security controls are designed to prevent, deter, detect, and/or recover from attempts to view or modify data without authorization. Typical examples of security controls include backups, access control, data encryption, and firewalls.

Data breach is when private data is exposed publicly without authorization. Preventing data breach is one of the reasons for having security controls in place.

Data capture refers to collection of data points from many different sources as part of data analytics.

Intellectual property refers to information assets, such as patents, which need to be protected from theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A systems administrator is installing a new wireless access point (AP). During installation, the administrator should make sure to complete which of the following?

Change the SSID to something that helps identify the administrator.

Enable all services on the wireless AP.

Store a hardcopy of a complex password of at least 12 characters.

Change the default password.

A

Change the default password.

You must always change the default password (typically “default,” “password,” or “admin”) for any new device to prevent unauthorized access to it.

It is best practice not to enable services you do not need, especially on a multifunction device such as a wireless access point.

You must choose a strong password that cannot be cracked by password-guessing software. Use a long, memorable phrase of at least 12 characters. However, to maintain confidentiality, you should never write down a password.

It is a good idea to change the SSID from the default to something unique to your network. Remember that the SSID is easily visible to other wireless devices, so do not use one that identifies you personally or your address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What’s a true statement about variables?

A variable can have any data type that the programming language supports.

A program has to declare all variables before using them.

Each procedure must assign an initial value, when declaring variables.

A variable contains a value that must change during the execution of the program.

A

A variable can have any data type that the programming language supports.

A variable is used in a program to access a program element. Its value can be a text string, a number, or any other data type if the programming language supports it.

It’s good practice to declare all variables in a program before using them, but not all programming languages require it. It is often possible to use undeclared variables, although this can make code harder to read and more prone to errors.

A variable contains a value that can change during the execution of the program, but it can also remain unchanged.

Variables can have initial value assignments, but it is not mandatory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which is a true statement about a GPU (Graphics Processing Unit)?

GPU uses analog signals.

Computers used primarily for gaming require a GPU in place of a CPU.

GPU works with the CPU to handle complex high-resolution images.

GPU must be on its own graphics card.

A

GPU works with the CPU to handle complex high-resolution images.

The GPU is a dedicated processor for display functions. It works with the CPU to handle complex high-resolution images.

Every computer needs a CPU. While the GPU can perform some functions that the CPU cannot, the GPU does not replace the CPU.

CPUs are located on the motherboard in a special mount. GPUs may be part of the CPU or come on a plug-in expansion card.

Early GPUs generated analog signals for Cathode Ray Tube (CRT) monitors but plugged into the motherboard and communicated with the CPU using digital signals.

31
Q

What should a company that’s trying to promote its goods and services have on its name and/or logo to protect it from imitators?

Firewall

Patent

Copyright

Trademark

A

Trademark

If a company wants to promote its goods, it will normally trademark its name and/or logo. A trademark must be distinctive within the industry in which the company is selling goods and services.

Copyright is legal protection granted to certain types of work that is typically in the domain of publishing, such as books, films, plays, computer software, games, and artwork.

A patent is legal protection for some kind of invention.

A firewall is used in network security to control how hosts and network applications are accessible to one another. It is used for protecting data, not a company name.

32
Q

If a password is short and non-complex, what type of attack can it be vulnerable to?

Man-in-the-Middle (MitM)

Brute force

Distributed Denial of Service (DDoS)

Malware

A

Brute force

If a password is short (under seven characters) and non-complex (using only letters for instance), a password might be cracked in minutes via brute force.

Denial of Service (DoS) is where an attacker targets the availability of a service. A DoS attack might tamper with a system or overload it. A Distributed Denial of Service (DDoS) uses hosts compromised with bot malware to launch a coordinated attack against a web service.

It is possible to capture cleartext password packets in transit via a Man-in-the-Middle (MitM) attack.

Malware is malicious software threats and tools designed to vandalize or compromise computer systems.

33
Q

What’s a true statement about compiled programming languages?

Compiled programming languages only work on one platform.

Compiled programming languages are not human-readable.

Compiled programming languages have to transform the code to an executable binary.

Compiled programming languages are not as efficient at runtime as interpreted languages.

A

Compiled programming languages have to transform the code to an executable binary.

The code in a compiled programming language needs to transform to an executable binary before it can run. This is the process of compiling, which converts the source code into machine code. The CPU (Central Processing Unit) can only process machine code.

A compiled program can run on multiple platforms, as long as the source code recompiles for each platform.

Compiled programs generally run quickly, compared to interpreted code.

Human-readable data is encoded as text, and machine-readable data (machine code) is the binary representation. The source code of compiled programming languages is human-readable, and the compiled executable binary is machine-readable.

34
Q

Which of the following represents the largest amount of storage capacity?

10000 TB

5 PB

2500000000 MB

3000000 GB

A

10000 TB

Storage capacity is typically calculated using decimal measurements (base 10), so 10,000 TB (TeraBytes) equals 10 PB or 10,000,000 GB or 10,000,000,000 MB. It is larger than the other choices in this list.

3,000,000 GB (GigaBytes) equals 3 PB or 3,000 TB or 3,000,000,000 MB. It is not as large as 10,000 TB.

2,500,000,000 MB (MegaBytes) equals 2.5 PB or 2,500 TB or 2,500,000 GB. It is the smallest amount in this list.

5 PB (PetaBytes) equals 5,000 TB or 5,000,000 GB or 5,000,000,000 MB. It is not as large as 10,000 TB.

35
Q

What is a proper example of a string definition?

“We're so happy to see you!’

“The sales person said to the customer: “Have a nice day!” and smiled.”

“It is polite to say "Thank you"”

‘It’s going to be a great day.’

A

“It is polite to say "Thank you"”

When single or double quotes can be used to delimit a string, the quotes are not part of the string itself. To use a quote character within a string, an escape character () is used. Embedding "Thank you" into the rest of the string is the proper way of defining it.

The quoted portion needs to have an escape character () preceding each quote character: "Have a nice day!", for the string to be processed correctly.

The apostrophe (single quote) needs to have an escape character () preceding it: ‘It's going to be a great day.’

The delimiter needs to be consistent: if it starts with a double quote, it needs to end with a double quote.

36
Q

Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID?

NFC

NID

NAS

NIC

A

NFC

Near Field Communications (NFC) is a peer-to-peer version of RFID; that is, an NFC device can work as both tag and reader to exchange information with other NFC devices.

Network Interface Card (NIC) provides the Ethernet port in the computer to connect it to a network.

A Network Attached Storage (NAS) appliance is one or more hard drives housed in an enclosure with basic server firmware, usually running some form of Linux.

Network Interface Device (NID) is a device that serves as the demarcation point between the carrier’s local loop and the customer’s on-premises wiring.

37
Q

What is available in software installer packages to select specific feature sets or modules within the software package?

Advanced options

Add-ons and plugins
Advanced installation

Additional features

A

Advanced options

Most software installer packages offer a choice between a default installation and a custom (or advanced options) installation. A custom installation allows the user to choose specific settings, such as where to install the software and what icons or startup/autorun options to configure, as well as the selection of specific feature sets or modules within the software package.

Advanced installation can refer to an installation using advanced options, although it is not a widely used term.

Additional features may be part of the advanced options during software installation.

Add-ons and plugins are software components that add a specific feature to an existing computer program. They may be part of the advanced options during installation.

38
Q

What does the motherboard determine about a desktop computer?

Width and height

Lifespan

Upgrade potential

Price

A

Upgrade potential

The motherboard determines the upgrade potential of the computer. A component incompatible with the motherboard, due to physical size or being of more modern technology, cannot be installed.

The motherboard is a fairly small size compared to a typical desktop computer. Additional components determine the computer’s overall physical size.

The lifespan of a computer is determined by many factors, including the workload placed on it and the care given to it. Computers with very outdated technology can remain in workable condition for a very long time.

The price of the computer depends on all of its parts. A motherboard can have many slots for components which are unfilled to keep the price low.

39
Q

What indicates that a website has a highly trusted certificate?

Padlock icon in front of address bar

Green padlock icon in front of address bar

Green address bar with no icon

URL starting with “https”

A

Green padlock icon in front of address bar

If the website has a certificate that’s valid and trusted, a padlock icon is shown. If the certificate is highly trusted, the address bar (with the padlock) is green. Website owners have to go through a more rigorous identity validation procedure for a high assurance certificate.

A padlock icon in front of the address bar indicates that a certificate is valid and trusted, but not at the highest level.

Without a padlock icon, the color of the address bar has no special meaning.

HTTPS (Hypertext Transfer Protocol Secure) encrypts and decrypts user page requests as well as the pages that are returned by the Web server. It is not an indication of a valid and trusted certificate.

40
Q

The information layer of data analytics requires software to perform which function?

Data collection

Meaningful reporting

Data storage

Data correlation

A

Data correlation

Data analytics (relationship of data to information) can be thought of in terms of data, information, and insights layers. The information layer requires software to perform data correlation, which means analyzing the whole data set and finding connections and links between data points.

The data layer is the raw values collected by the system, with the help of data capture and collection functions.

As well as collecting the data, it must be stored and secured, which is where data storage comes in.

To inform human decision making at the insights layer, the information identified by the analytics system must be presented in ways that humans can analyze and interpret. This is done through meaningful reporting.

41
Q

What kind of computer firmware provides support for mouse operation at boot?

UEFI

CMOS

DOS

BIOS

A

UEFI

Newer motherboards use UEFI (Unified Extensible Firmware Interface), a firmware which provides support for 64-bit CPU operation at boot, as well as a full GUI and mouse operation at boot.

BIOS (Basic Input/Output System) is firmware which provides industry standard program code to get the essential components of the PC running. It does not provide support for mouse operation at boot.

CMOS (Complementary Metal-Oxide Semiconductor) is a semiconductor chip inside computers that stores information, such as the system time and date, but is now obsolete.

DOS (Disk Operating System) is not firmware; it is an operating system that runs from a hard disk drive.

42
Q

The direct database access method is the best method to run which SQL (Structured Query Language) command?
SELECT

INSERT

GRANT

UPDATE

A

GRANT

Direct access provides tools for database administrators to run SQL commands. They can run commands, which interact with the data or perform database administration tasks. The GRANT command assigns permissions on database objects to users, so the database access methods for non-administrative users should not run it.

Applications with utility or programmatic access use the UPDATE command to make changes to specific records, without risk to the rest of the database.

Applications with utility or programmatic access use the INSERT command to add new information into the database.

All database access methods use the SELECT command to retrieve data for processing, as well as to run queries/reports.

43
Q

Why is scalability an important consideration when choosing to use a database instead of a flat file?

Nonscalable systems have strict limits for the number of users they can support.

Nonscalable systems increase their costs at the same rate as the number of users that they support.

Nonscalable systems have strict limits for the amount of data they can support.

Nonscalable systems can only exchange data with other nonscalable systems.

A

Nonscalable systems increase their costs at the same rate as the number of users that they support.

Scalability means being able to expand usage without increasing costs at the same rate. For example, in a nonscalable system, doubling the number of users would also double the costs of the system.

Nonscalable systems do not have limits for the number of users they can support, other than trying to not incur the high costs of having many users.

Nonscalable systems do not have limits for the amount of data they can support. Some systems have more efficient processes to work with large amounts of data than other systems, but even if inefficiently, they can still support it.

Data exchange can happen between different types of systems.

44
Q

Which numbers does this pseudocode display?
declare i as Number = 10
Do While i > 0
If i < 7 Then
i = i - 1
End If
print i
i = i - 1
Loop

9, 8, 7, 6, 5, 4, 3, 2, 1, 0

9, 7, 5, 3, 1

10, 9, 8, 7, 6, 5, 4, 3, 2, 1

10, 9, 8, 7, 5, 3, 1

A

10, 9, 8, 7, 5, 3, 1

This pseudocode loops backwards from 10, decreasing the value of i inside the loop. Until i is less than 7, it decreases by 1, after that it decreases by 1 twice per loop (once inside the branch, and once outside the branch).

If the pseudocode did not include the branch, then every number from 10 to 1 would be printed.

If the pseudocode did not include the branch, and the print command followed the command to decrease i, then every number from 9 to 0 would be printed.

If the branch condition was always true (for example, “if i <= 10”) then only the odd numbers from 9 to 1 would be printed.

45
Q

What is the maximum transfer rate for the Firewire standard which uses 6-pin “alpha” connectors and cabling?
ANSWER

1 Gbps

600 Mbps

400 Mbps

800 Mbps

A

400 Mbps

Firewire was based on IEEE 1394, which is an interface standard for a serial bus for high-speed communications and isochronous real-time data transfer. Firewire was used on some Apple Mac computers; it was a competitor to USB (Universal Serial Bus) but never received mainstream support amongst PC vendors. The Firewire 400 standard uses 6-pin “alpha” connectors and cabling, with the maximum transfer rate of 400 Mbps (Megabits per second).

There is no Firewire standard with a maximum transfer rate of 600 Mbps.

The Firewire 800 standard uses 9-pin (“beta”) connectors and cabling, and supports transfer rates up to 800 Mbps.

There is no Firewire standard which supports transfer rates up to 1 Gbps (Gigabits per second).

46
Q

Which file system feature uses a change log?

Encryption

Journaling

Compression

Permissions

A

Journaling

With journaling, the file system tracks changes or intended changes in a log, so if a power outage interrupts a write operation, the journal is used to recover the data or restore the file system to good working order (consistent state).

With encryption, files can only be opened when there is access to the encryption key, protecting the data on the drive if the disk is stolen and installed in another computer system.

File systems with permissions feature use an ACL (Access Control List) for each file or folder, to determine which user accounts are given read, write, or control access.

File systems with compression feature can automatically reduce the amount of disk space taken up by a file.

47
Q

An older digital camera without wireless networking support is malfunctioning, so the photos need to be backed up to the computer. Which port on the computer can the camera owner use?

Pink 3.5mm jack

USB

HDMI

Black 3.5mm jack

A

USB

memory-based card. There are a number of ways to transfer the images stored on the card from the camera to the computer, including connecting the camera to a USB port, which mounts the camera storage as a Windows drive and the pictures can be copied or moved using Explorer.

HDMI (High Definition Multimedia Interface) is for graphic displays such as a monitor. Even though digital cameras have screens, in this case they are used for data input, not output.

3.5mm jacks are used to connect audio. The pink jack is for the microphone (audio input).

The black 3.5mm jack is for rear speakers in a surround sound system (audio out).

48
Q

What is the fastest downlink speed that the typical cable Internet service providers offer to their customers?

1.2 Gbps

24 Mbps

52 Mbps

100 Mbps

A

100 Mbps

Most cable service providers offer downlink Internet connection speeds of up to about 100 Mbps in their premium packages.

Cable based on the DOCSIS (Data Over Cable Service Interface Specification) version 3.0 supports downlink speeds of up to about 1.2 Gbps, but cable service providers do not normally offer that to their customers.

Residential DSL services support downlink speeds of up to 24 Mbps.

VDSL (Very High Bit Rate DSL), which is implemented by fiber optic services as part of the FTTC (Fiber to the Curb) solution, supports downlink speeds of up to 52 Mbps.

49
Q

What is an example of “processing” in a computer system?

Data is entered by the user through a scanner.

Data is written to memory and manipulated by the CPU.

Data is displayed on the monitor and printed out on paper.

Data is written to hard disk for later retrieval.

A

Data is written to memory and manipulated by the CPU.

Processing is when the data is written to memory and manipulated by the CPU, acting on instructions from the operating system and applications software.

Storage is when the data is written to different types of storage devices, such as hard disks or optical discs.

Input is when the computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, cameras, and microphones.

Output is when the processed data is shown to the user through an output device, such as a monitor or a printer.

50
Q

A file contains information about the company’s customers. The information includes Name, Address, Phone, and Email for each customer. What’s the best way to convert this file into a database?

Create a database called Customers, with fields called Name, Address, Phone, and Email.

Create a table called Customers, with records called Name, Address, Phone, and Email.

Create a database called Customers, with tables called Name, Address, Phone, and Email.

Create a table called Customers, with fields called Name, Address, Phone, and Email.

A

Create a table called Customers, with fields called Name, Address, Phone, and Email.

A database consists of tables of information, organized into columns and rows. Each row represents a separate record in the database, and each column represents a single field within a record. Name, Address, Phone, and Email are fields for each customer, and the collection of these fields is a table.

Name, Address, Phone, and Email do not need to be individual tables. They are all part of a record for each customer.

Name, Address, Phone, and Email are not records, they are fields, or columns in the table. A record is one set of information about a customer.

Fields make up a table, and tables make up a database.

51
Q

Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command?

DROP

INSERT

SELECT

DELETE

A

DROP

DML commands refer to SQL commands that access or modify the contents of the database. The DROP command deletes (drops) a table or the entire database, and is a DDL (Data Definition Language) command, which modifies the structure of the database.

DML commands include DELETE, which deletes records from a table, and therefore modifies the contents of the database.

DML commands include INSERT, which adds a new row into a table, and therefore modifies the contents of the database.

DML commands include SELECT, which is the first building block of a query to retrieve data from a database.

52
Q

How does an object store its attributes?

As private variables

As comments

As a vector

As public variables

A

As private variables

Attributes are values and data types that define the object. The object stores the attributes as fields or private variables.

Other programs cannot access or change the attributes of an object directly, the way that they can with public variables.

Most programming languages support container types called vectors that can grow or shrink in size as elements are added or removed. Vectors are specialized types with their own rules and limitations, and objects do not use them to store their attributes.

Programmers use comments in code to assist with maintaining it, not for attributes of objects.

52
Q

What problem is Windows’ UAC (User Account Control) designed to solve?

Inadequate account authentication

Too many guest accounts

Too many administrative accounts

Elevated privileges

A

Elevated privileges

Least privilege” means that users receive permissions required to perform tasks and no more. Early versions of Windows led to the problem of “elevated privileges”, where all users were given administrative privileges, as otherwise it was difficult to perform typical administrative tasks. UAC was created to solve this problem.

The “Guest” account, used in Windows 7 and 8.1, is a standard, local user account, with very limited permissions. There is typically one such account, but having many of them is not a problem.

UAC enables users to perform common tasks as non-administrators and as administrators without having to switch users. The number of administrative accounts is not relevant to this feature.

Inadequate account authentication is not part of UAC functionality.

53
Q

An employer fires an end-user for hijacking another employee’s user account. Which of the following does NOT provide non-repudiation to the employer?

A signature

Video surveillance

A receipt

A guest user account

A

A guest user account

The guest account is disabled by default but should not generally be used. If the guest account is enabled, anyone can use the computer without needing to enter a password, and therefore could not be used to provide non-repudiation.

Issuing a token or receipt with respect to some product or service is proof that a user requested that product, and that it was delivered in a timely manner.

Surveillance cameras can record who goes in or out of a particular area.

A physical or digital signature can prove that the user was an author of a document (they cannot deny writing it).

54
Q

What is an advantage of the float data type compared to the integer data type?

The float data type consumes less storage.

The float data type is not limited to whole numbers.

The float data type is a more natural way of expressing numbers in computing systems.

The float data type requires less processing time for arithmetic operations.

A

The float data type requires less processing time for arithmetic operations.

The float data type can support decimal fractions, as opposed to integers which are whole numbers.

The float data type does not consume less storage than an integer. An integer data type consumes 1 to 8 bytes of computer storage, while a float consumes between 4 and 8 bytes of storage.

Floating-point operations are slower than integer operations of the same data size, requiring more processing time for arithmetic operations.

An integer exists inside the computer as a true binary value, while a floating-point number needs additional steps to be expressed in binary format for the computer to accurately store its value.

55
Q

What is the main cause of memory leaks?

Operating system upgrades

Outdated software

Programming errors

Damaged memory chip

A

Programming errors

Memory leaks refer to Windows memory loss, caused by a program or an app. This occurs when an application does not release memory when it’s done with it, eventually causing a system slowdown.

If the software that is outdated and no longer supported has proper memory management in the code, then it would not cause more leaks than current but badly written programs.

Damaged memory chips cause problems, but memory leaks refer specifically to memory losses due to software programs incorrectly managing memory allocation.

Upgrading the operating system can be a cause of memory leaks, with an increase in memory usage by the new drivers. Operating system upgrades are done less frequently than everyday use of programs that cause leaks.

56
Q

Which document contains the information about how the software vendor will use any data that the software gathers and processes?

Software instructions

Software installation best practices

Software usage best practices

Software agreement

A

Software agreement

An important aspect of a software agreement is how the software vendor will use, store, and retain any data that the software gathers and processes.

Software instructions are the accompanying documentation of software programs, with instructions for using the program. They also include any special installation instructions or known issues.

Software installation best practices advise the users to read the accompanying documentation to verify software and hardware compatibility with the user’s system, as well as ensuring the presence of a valid agreement or license to install and use the product.

Software usage best practices is not a specific document or part of standard operating procedure. Software instructions usually include recommendations for best practices when using the specific software.

57
Q

What is an example of an output device?

Optical disc

Loudspeaker

Keyboard

Digital camera

A

Loudspeaker

In a computer system, data is shown or played to the user through an output device, such as a monitor, printer, or loudspeaker system.

User input is when the computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, digital cameras, and microphones.

Video input devices, such as digital cameras or camcorders, webcams, image or fingerprint scanners, and barcode readers, are used to digitize images or video into the computer.

Optical disc is a storage device, to which data may be written for future use.

58
Q

How can a user belong to a group account and inherit security permissions in a workgroup?

Using additional group accounts associated with a domain

Adding the user’s account as a guest account

By directly assigning the user to security policies

Through privileges allocated to the groups

A

Through privileges allocated to the groups

A user can belong to one or more group accounts and inherit security permissions through privileges allocated to the groups.

User accounts can be assigned directly to security policies, but if there are a large number of users, this can be difficult to manage.

In a Windows workgroup, the only group accounts are Computer Administrators and Standard Users. The use of additional group accounts is associated more with domain networks.

The guest account is disabled by default but should not generally be used. If the guest account is enabled, anyone can use the computer without needing to enter a password.

59
Q

Which notation is a more efficient method to express large numbers?

Hexadecimal

Binary

Decimal

Octal

A

Hexadecimal

With hexadecimal notation system, 16 numbers can be expressed using a single digit from 0 to F, resulting in fewer digits for large numbers.

Binary notation system uses 2 values: 0 and 1, which works well with computers to represent the off/on states of transistors but uses many digits to represent large numbers.

Octal notation system uses digits from 0 to 7. Octal was widely used in legacy computing platforms but is not as efficient for expressing large numbers as hexadecimal notation.

Decimal notation system, the most commonly used numbering system, uses a single digit from 0 to 9. It is not as efficient for expressing large numbers as hexadecimal notation.

60
Q

Convert the binary number 1000000 into decimal notation.

128

32

64

40

A

64

61
Q

After a network administrator restores data from a backup due to a system outage, what is the first step before allowing user access to the data?

Add more data.

Verify user’s access to data is working normally.

Ensure the integrity of the data.

Restrict the number of users who access the data.

A

Ensure the integrity of the data.

If a system goes down, data can be restored from backup or by switching over to another system to which data has been replicated. It is vital that the integrity of the data be checked before user access is re-enabled.

If the data is corrupt or the database system is not working properly, trying to add more data to it could result in more severe problems.

After ensuring the data’s integrity, you should restore access to the data and try to restrict the number of users initially, so that the system can be monitored.

After ensuring the data’s integrity, you should restore access to the data and try to verify that user’s access to the data is working normally.

62
Q

The accountant of a small company uses a database application to maintain the list of vendors, their services, and their invoices to the company. The application uses Microsoft Access for the database layer, with the front-end interface layer in Visual Basic, to work with the data and to generate custom reports. What is the application architecture of this system, which resides on the accountant’s desktop computer?

N-tier

Three-tier

Two-tier

One-tier

A

One-tier

If the application front-end, processing logic, and the database engine are hosted on the same computer, the application architecture is described as one-tier or standalone. The accountant’s desktop computer hosts both back-end and front-end layers, making it a standalone application.

A two-tier client-server application separates the database engine, or backend/data layer, from the presentation and application layers. If this system used a remote server to host the data, then it would be a two-tier application.

In a three-tier application, the presentation and application layers are also split, making the entire system more complex.

An n-tier application architecture can be used to mean either a two-tier or three-tier application, or an application with more complex architecture, like having separate access control.

63
Q

What is the difference between DropBox and OneDrive?

OneDrive is a cloud-based storage solution.

DropBox is built into the Windows OS.

DropBox can be operated with a smartphone app.

OneDrive is built into the Windows OS.

A

OneDrive is built into the Windows OS.

OneDrive is a cloud storage client that is built into the Windows 10 OS (Operating System), and can be accessed via File Explorer. There is also OneDrive for Business, for users to store, sync, and share work files in the cloud.

Both OneDrive and DropBox are cloud-based storage solutions.

DropBox is not built into the Windows OS; it is an online file hosting service that offers cloud storage, file synchronization, personal cloud, and client software.

Both OneDrive and DropBox can be operated with an app for the smartphone or tablet.

64
Q

Which of the following will NOT help prevent the attachment of portable personally owned devices, such as smartphones and Universal Serial Buses (USBs)?

Data loss prevention solutions

Network access control

Endpoint security

Requiring a fob

A

Requiring a fob

The most widely implemented way to authenticate a user, based on something they have, is the smart card or Universal Serial Bus (USB) fob, which contains a chip with authentication data, such as a digital certificate.

Network access control is one way of preventing the attachment of portable devices, such as smartphones and USB sticks to corporate networks.

Endpoint security is one way of preventing the attachment of portable devices, such as smartphones and USB sticks to corporate networks.

Data loss prevention solutions are one way of preventing the attachment of portable devices, such as smartphones and USB sticks to corporate networks.

65
Q

Which of the following poses a higher risk to ensuring business continuity?

Service and data replication

Real-time synchronization

A converged network

Syncing data between servers

A

A converged network

A network carrying both voice and data is said to be converged. There is also a greater vulnerability to Denial of Service (DoS) (without redundancy the network is a single point of failure for both voice and data traffic) and eavesdropping on voice communications.

To increase site redundancy, you must consider implementing service and data replication between multiple data centers.

To increase site redundancy, you can synchronize data between servers and potentially between sites.

To increase site redundancy, you can implement replication which might be real-time or bundled into batches for periodic synchronization.

66
Q

What is the Microsoft Edge web browser?

Application software

System utility

Command-line interface

Operating system

A

Application software

Application software consists of programs that allow users to perform different tasks, such as web browsing, checking email, and word processing.

Operating system provides interfaces between the hardware, application programs, and the user. It handles many of the basic system functions, such as interaction with the system hardware and input/output. Web browsing is not a basic system function, but a complex application program.

A command-line interface, also referred to as a “shell”, is a way for the user to interact with the computer. Modern operating systems have a graphical shell in addition to the command line shell.

System utilities are used to support the computer infrastructure, such as cleaning the registry or checking for memory failures.

67
Q

Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?

Parking assist

Sat-nav

In-vehicle entertainment

Black box

A

In-vehicle entertainment

IoT for motor vehicles include embedded systems for in-vehicle entertainment, which share major elements with IoT home automation’s streaming media. Their function is to play content stored on a storage device through smart speakers and screens.

Embedded in-vehicle sat-nav (Satellite Navigation) uses GPS (Global Positioning Systems) to identify the vehicle’s precise location. There is no need for this in IoT home automation.

Some vehicles are now fitted with a “black box”, which is an event data recorder that can log the car’s telemetry (acceleration, braking, and position). There is no need for this in IoT home automation.

There are now sophisticated systems to control the vehicle on behalf of the driver, including automatic collision detection and avoidance, and parking assist.

68
Q

Which of the following is NOT true about critical data when configuring file backups?

Critical data might include Personally Identifiable Information (PII).

Critical data does not always store in files within a user or shared folder.

Critical data can store within a settings file located within a database.

Replication allows critical data backup, which protects from accidental deletion of a record.

A

Replication allows critical data backup, which protects from accidental deletion of a record.

Replication doesn’t protect you from errors such as accidentally deleting a record. If the error is accepted as a valid transaction, it will be propagated amongst all the replicas at the next scheduled replication interval.

When configuring backups, you need to understand that not all critical data may be stored in files within a user folder or shared folder.

When configuring backups, critical data could be stored in a settings file outside of the normal data areas or be located within a database or message store.

When configuring backups, you have to consider that critical data might include confidential, proprietary, and/or personal information.

69
Q

Which of the following ways best defeats social engineering?

Allowing access to network resources by using innocuous data

Making sure employees directly observe other users type passwords

By establishing enough trust with end-users so they will reveal secure information

Training end-users how to identify and report suspicious activity on the network or workstation

A

Training end-users how to identify and report suspicious activity on the network or workstation

Social engineering is best defeated by training users to recognize and respond to social engineering attacks. Users should understand what constitutes secure information and know in what circumstances, if any, it should be revealed to other people.

Shoulder surfing is a social engineering attack that involves stealing a password or PIN, or other secure information, by watching the user type it.

Being convincing or establishing trust is a social engineering trick that usually depends on the attacker obtaining privileged information about the organization.

Often, malicious people can start to gain access to your network resources through the use of seemingly innocuous data

70
Q

What is the difference between a password and a passphrase?

A passphrase is longer than a password, and easier to remember.

A passphrase is shorter than a password, but more difficult to remember.

A passphrase is shorter than a password, but easier to remember.

A passphrase is longer than a password, but more difficult to remember.

A

A passphrase is longer than a password, and easier to remember.

A passphrase is a longer password comprising several words. This has the advantages of being more secure and easier to remember.

A passphrase is a longer password comprising several words. While a passphrase is easier to remember than a password, a passphrase is longer than a password.

A passphrase is a longer password comprising several words. While a passphrase is longer than a password, it is easier to remember than a password.

A passphrase is a longer password comprising several words. A passphrase is longer than a password, and easier to remember

71
Q

What does a database dump contain?

SQL statements which can recreate all tables

A formatted report of the contents of all tables

A flat file with full contents of all tables

A hard disk with an exact copy of the database

A

SQL statements which can recreate all tables

A database dump is a copy of the database or table schema along with the records in the form of SQL (Structured Query Language) statements, which another database can use to create the tables and import the information.

Flat files with full contents of all tables are backups, not dumps. Dumps contain SQL statements to recreate the schema and data.

Formatted reports of table contents are not very useful for backup and restore purposes.

A hard disk with an exact copy of the database is a full backup, not a dump.

72
Q

Which protocol supports interactive mechanisms GET and POST?

POP3

SMTP

IMAP

HTTP

A

HTTP

HTTP (HyperText Transfer Protocol) is used for rendering web pages, and features forms mechanisms GET and POST which allow a user to submit data from the client (user’s device) to the server (where the website is being processed).

POP3 (Post Office Protocol v3) is used for retrieving email messages to the user’s mail client software (such as Microsoft Outlook). With POP3, the messages are usually deleted from the server when they are downloaded.

IMAP (Internet Message Access Protocol) is used for retrieving email messages to the user’s mail client software, allowing the client to manage the mailbox on the server.

SMTP (Simple Mail Transfer Protocol) is used to deliver email messages to the email server of the recipient.

73
Q

Which of the following is an example of an optical drive?

DDR

SSD

DVD

HDD

A

DVD

DVD (Digital Video Disc) is a storage format for consumer multimedia, such as music and video, and referred to as an “optical” drive because a laser is used to read data from the discs.

HDD (Hard Disk Drive) is a mass storage device that uses spinning disk technology.

SSD (Solid State Drive) is designed to replicate or supplement the function of the HDD, with flash memory technology.

DDR, short for DDR SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory) is a volatile type of storage featuring “double pumped” data transfers.