Practice Test Flashcards

1
Q

What is an example of a company prioritizing the recovery of customer data before operational
data in a disaster recovery exercise?

A

Prioritization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you need to verify whether a particular application is installed on your new company-issued
macOS computer, which search tool should you use?

A

Spotlight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the MOST possible to be regarded as private personal information that
needs to be kept confidential?

A

Medical records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

After setting up a new computer and personalizing it, Beth attempts to activate the operating
system and realizes that the computer is not linked to the internet. What steps should she take
next?

A

Check the Ethernet cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of encryption would provide the highest level of protection for a laptop computer in
case it gets stolen, among the following options?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these features must a computer possess to fulfill the request of James’ boss for a
computer with an optical drive?

A

DVD-ROM drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When Evan bought a software program on eBay, it arrived shrink-wrapped and installed without
any issues. However, when he attempted to activate the program, it failed. What could be the
reason for activation failure?

A

Counterfeit program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where is the most suitable location to store data that is required to produce several reports
analyzing information from sales, inventory, marketing, and compensation data?

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following security issues can compromise confidentiality?

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the recommended action that Stephen should take to prevent unauthorized changes
while configuring his new wireless router?

A

Change the administrator password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following actions was taken when an administrator provided authorization for a
user to access data within a database?

A

Data definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What measures can Alma take to increase her safety when using one of the computers at a
public library?

A

Log out of any website when she finishes, Use strong passwords, Select No when prompted to save password at websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How could Cynthia explain ransomware to her boss?

A

Ransomware is a type of malicious software that infects a computer system and restricts access to its files
and data, typically by encrypting them. The attacker then demands payment in exchange for a decryption
key to restore access to the a!ected data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of architecture is being used by an application that only requires a workstation to
operate, as installed by a company?

A

One-tier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is an instance of which of the following concepts, where new applicants are required to
provide a scan of their retinas to address any potential legal issues regarding their application in
the future?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

As the person responsible for selecting and purchasing computer equipment for the small
company he works for, Piere needs to decide on the operating system for a new graphics
workstation for their recently added graphics designer. Which operating system would be MOST
suitable for this purpose?

A

macOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In order to verify whether port 3389 is open for remote desktop on a PC, which of the following
options should the user choose to perform this task?

A

Host firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

After Katherine made a passing comment about Jill’s new computer having both permanent and
temporary data storage components, Jill wants to know what the short-term data storage
component is, given that she is aware that the hard drive stores data for a long period?

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which programming concept is represented by the ability of a boss object to jump, as created
by a game developer during game development?

A

Attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What security measures would be most e!ective in addressing a worm infection in a network,
from the options provided below?

A

Update the malware definitions, Quarantine the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which device is the most responsive when it comes to disk reads and writes?

A

Solid State Drive (SSD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of these programming languages are generally considered to be interpreted rather than
compiled?

A

Python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Suppose Benedict’s employer has tasked him with procuring productivity software upgrades
for three personnel at Luther Corp. Which particular software should he purchase?

A

Word-processing programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Stan, the receptionist at Bayland Widgets Corporation, has been using an older Windows
computer that has been functioning well for over three years. However, the computer has recently
started shutting down unexpectedly. What is the probable cause of this issue?

A

Dust accumulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What data type should you choose for a variable that stores information about whether a
customer is eligible for a discount if you are building an application that will handle orders from a
website?

A

Boolean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The web development team receives report from the marketing department on inconsistent
values in a recently launched form. What is the MOST probable cause of this issue?

A

Client-side scripting has been deactivated on some clients visiting the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following best practices would be MOST beneficial for a web developer to
implement in order to prevent brute-force attacks on a new web application?

A

Password lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which programming structure would you use to run a statement repeatedly for a total of 100
times?

A

WHILE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following actions would be the MOSTe!ective in enhancing the signal strength of
a wireless access point that has recently been installed and is not as strong as expected?

A

Ensure sources of EMI are removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which type of application architecture did the employee employ when generating a report on a
student information system by utilizing spreadsheet software and connecting to a remote
database to extract the necessary data for the report?

A

Client-server application

31
Q

Suppose Penny makes use of a company laptop to create a presentation and notes that the
mouse pointer keeps moving across the computer screen even when she is not operating the
mouse. What initial measure should she take to troubleshoot and fix the problem?

A

Check Mouse options in the Control Panel.

32
Q

What is the sign that a computer has been infected with adware?

A

Pop-up ads appearing frequently and unexpectedly

33
Q

What would be the MOST probable solution to a problem where a user reports low resolution on
the display after a technician has replaced the video card, and the operating system prevents the
user from increasing it?

A

Install new video drivers

34
Q

What is the best approach to meet the needs of a scenario where a company’s cloud-hosted
website uses a database to store product documentation, with the web server and database server
on di!erent networks and employees creating and updating product documents that are available
through the website?

A

Place a writable replica in the cloud-based data tier, Place a readable replica on-premises

35
Q

What file system should you select when configuring a second disk in your Windows computer,
if you require encryption and compression support during formatting?

36
Q

What technology provides the fastest data transfer rate and the shortest delay, among the
options listed below?

37
Q

If a programmer is developing a program that relies on user input to make decisions and has
opted to use a branching statement, what would be the MOST appropriate command for the
programmer to use?

A

IF statement

38
Q

Which device is a user most likely to configure to allow inbound connectivity on a home
network for chat functions on a gaming console?

A

Wireless router

39
Q

What can a programmer modify using DML?

39
Q

What type of license is it when a company purchases a software program with an End User
License Agreement (EULA) stating that the software can be installed on an unlimited number of
computers, but restricts usage to only four concurrent users?

A

Concurrent license

40
Q

What is the MOST suitable type of Internet service to be used for Ann, the president of a
company, who needs assistance in choosing appropriate Internet connectivity for her remote
home with no connectivity to existing infrastructure?

41
Q

What would be used to send messages utilizing the SMTP protocol among the following
options?

A

Email software

42
Q

Which of the following terms is most closely associated with evaluating the disk performance of
a database?

43
Q

Which option is the MOST suitable approach for handling a lengthy list of products stored in an
array variable in your software code?

A

Loop through the array

44
Q

What type of network security involves analyzing deviations from historical connection patterns
and identifying new threats in order to implement e!ective mitigation responses?

A

Behavior security

45
Q

Which statement provides the most accurate description of a kilobyte?

A

A kilobyte is a measurement of storage (e.g 100KB)

46
Q

What should be the next troubleshooting step for a technician after they have confirmed the full
system functionality following the implementation of a solution to a problem?

A

Document lessons learned

47
Q

Which of the options includes precisely four copper wires?

48
Q

Which of the following technologies o!ers the HIGHEST level of security?

49
Q

When a custom application that searches through a massive database encounters decline
performance issues during peak usage, what steps should be taken to address the problem?

A

Scale horizontally, Scale out

50
Q

Which of the given choices is a characteristic that can be used to distinguish a specific record
in a database from all other records?

A

Primary key

50
Q

What are the key roles of an operating system among the options listed below?

A

Provide structure for file and data management, Provide structure for file and data management

51
Q

Among these computing devices, which one is MOST probable to be equipped with an internal
wireless antenna?

A

Mobile phone

52
Q

What is the meaning of the “drop table” command that your colleague Liam has executed on a
customer table?

A

The customer table has been deleted

53
Q

What would be the byte of an IP address if it were converted from its original 32-bit format?

54
Q

Before allowing employees to access a server remotely from both the company network and the
Internet, what is the MOST important factor to determine for a small company?

A

A security method of allowing connections

55
Q

What is the term for when a user accesses a laptop by entering a complex password along with a
username?

A

Single-factor authentication

55
Q

Which printing method uses iron-based powder instead of ink, and provides the LEAST costly
per-page printing?

56
Q

Which of the following options provides the MOST accurate definition for the practice of
supplying user credentials during the process of logging into a network?

57
Q

What type of Internet service connection would be most suitable to meet the needs of a remote
user who requires significant bandwidth to connect to corporate systems while working from home?

A

Fiber optic

58
Q

Which of the following troubleshooting methodologies is being employed when one technician
investigates network issues in the server room while another technician troubleshoots the user’s
workstation in order to establish a theory of probable cause?

A

Divide and conquer

58
Q

Before downloading an update for an important system, an IT administrator performs a hash of
the download to confirm that the results are consistent with the published hash for the file. What is this called?

A

Integrity concerns

59
Q

Which protocol facilitates secure communication between two computers?

60
Q

What is the most e!ective method for a systems administrator to schedule the execution of a
script at a specific time every day?

A

Perform task scheduling

60
Q

Tamara wonders what common security error can result in multiple accounts getting
compromised, after discovering that her Facebook, email, and Twitter accounts have been hacked.
Which one is the answer?

A

Reusing credentials

60
Q

Your assignment is to devise a solution for running the maximum number of virtual machines on
a single on-premises host in an e”cient manner. What steps would you take to accomplish this?

A

Use high-end hardware with multiple CPU cores and a large amount of RAM

61
Q

What is the issue that the CEO is facing as a result of receiving multiple emails that do not have
attachments?

A

Email service outage

62
Q

What would provide the FASTEST transfer rate when transferring a file across the network from
the following options?

63
Q

What has the longest range among the following options?

64
Q

What would be the most suitable option for a developer who wants to store the months of a year
while prioritizing performance?

65
Q

Which of the following is primarily associated with worries regarding the protection of private
information?

A

Eavesdropping

66
Q

The provided code creates a variable. What is the variable type? $stock codes=”MSFT”, “APPL”,
“GOOGL”

67
Q

After resolving the issue with the word processing software that was preventing the computer’s
end user from accessing it, what would be the appropriate NEXT step for the IT technician?

A

Document the findings