Practice Test Flashcards
What is an example of a company prioritizing the recovery of customer data before operational
data in a disaster recovery exercise?
Prioritization
If you need to verify whether a particular application is installed on your new company-issued
macOS computer, which search tool should you use?
Spotlight
Which of the following is the MOST possible to be regarded as private personal information that
needs to be kept confidential?
Medical records
After setting up a new computer and personalizing it, Beth attempts to activate the operating
system and realizes that the computer is not linked to the internet. What steps should she take
next?
Check the Ethernet cable
What type of encryption would provide the highest level of protection for a laptop computer in
case it gets stolen, among the following options?
HTTPS
Which of these features must a computer possess to fulfill the request of James’ boss for a
computer with an optical drive?
DVD-ROM drive
When Evan bought a software program on eBay, it arrived shrink-wrapped and installed without
any issues. However, when he attempted to activate the program, it failed. What could be the
reason for activation failure?
Counterfeit program
Where is the most suitable location to store data that is required to produce several reports
analyzing information from sales, inventory, marketing, and compensation data?
Database
Which of the following security issues can compromise confidentiality?
Dumpster diving
What is the recommended action that Stephen should take to prevent unauthorized changes
while configuring his new wireless router?
Change the administrator password
Which of the following actions was taken when an administrator provided authorization for a
user to access data within a database?
Data definition
What measures can Alma take to increase her safety when using one of the computers at a
public library?
Log out of any website when she finishes, Use strong passwords, Select No when prompted to save password at websites
How could Cynthia explain ransomware to her boss?
Ransomware is a type of malicious software that infects a computer system and restricts access to its files
and data, typically by encrypting them. The attacker then demands payment in exchange for a decryption
key to restore access to the a!ected data.
Which type of architecture is being used by an application that only requires a workstation to
operate, as installed by a company?
One-tier
This is an instance of which of the following concepts, where new applicants are required to
provide a scan of their retinas to address any potential legal issues regarding their application in
the future?
Authentication
As the person responsible for selecting and purchasing computer equipment for the small
company he works for, Piere needs to decide on the operating system for a new graphics
workstation for their recently added graphics designer. Which operating system would be MOST
suitable for this purpose?
macOS
In order to verify whether port 3389 is open for remote desktop on a PC, which of the following
options should the user choose to perform this task?
Host firewall
After Katherine made a passing comment about Jill’s new computer having both permanent and
temporary data storage components, Jill wants to know what the short-term data storage
component is, given that she is aware that the hard drive stores data for a long period?
RAM
Which programming concept is represented by the ability of a boss object to jump, as created
by a game developer during game development?
Attribute
What security measures would be most e!ective in addressing a worm infection in a network,
from the options provided below?
Update the malware definitions, Quarantine the network
Which device is the most responsive when it comes to disk reads and writes?
Solid State Drive (SSD)
Which of these programming languages are generally considered to be interpreted rather than
compiled?
Python
Suppose Benedict’s employer has tasked him with procuring productivity software upgrades
for three personnel at Luther Corp. Which particular software should he purchase?
Word-processing programs
Stan, the receptionist at Bayland Widgets Corporation, has been using an older Windows
computer that has been functioning well for over three years. However, the computer has recently
started shutting down unexpectedly. What is the probable cause of this issue?
Dust accumulation
What data type should you choose for a variable that stores information about whether a
customer is eligible for a discount if you are building an application that will handle orders from a
website?
Boolean
The web development team receives report from the marketing department on inconsistent
values in a recently launched form. What is the MOST probable cause of this issue?
Client-side scripting has been deactivated on some clients visiting the site
Which of the following best practices would be MOST beneficial for a web developer to
implement in order to prevent brute-force attacks on a new web application?
Password lockout
Which programming structure would you use to run a statement repeatedly for a total of 100
times?
WHILE
Which of the following actions would be the MOSTe!ective in enhancing the signal strength of
a wireless access point that has recently been installed and is not as strong as expected?
Ensure sources of EMI are removed.
Which type of application architecture did the employee employ when generating a report on a
student information system by utilizing spreadsheet software and connecting to a remote
database to extract the necessary data for the report?
Client-server application
Suppose Penny makes use of a company laptop to create a presentation and notes that the
mouse pointer keeps moving across the computer screen even when she is not operating the
mouse. What initial measure should she take to troubleshoot and fix the problem?
Check Mouse options in the Control Panel.
What is the sign that a computer has been infected with adware?
Pop-up ads appearing frequently and unexpectedly
What would be the MOST probable solution to a problem where a user reports low resolution on
the display after a technician has replaced the video card, and the operating system prevents the
user from increasing it?
Install new video drivers
What is the best approach to meet the needs of a scenario where a company’s cloud-hosted
website uses a database to store product documentation, with the web server and database server
on di!erent networks and employees creating and updating product documents that are available
through the website?
Place a writable replica in the cloud-based data tier, Place a readable replica on-premises
What file system should you select when configuring a second disk in your Windows computer,
if you require encryption and compression support during formatting?
NTFS
What technology provides the fastest data transfer rate and the shortest delay, among the
options listed below?
Ethernet
If a programmer is developing a program that relies on user input to make decisions and has
opted to use a branching statement, what would be the MOST appropriate command for the
programmer to use?
IF statement
Which device is a user most likely to configure to allow inbound connectivity on a home
network for chat functions on a gaming console?
Wireless router
What can a programmer modify using DML?
Data
What type of license is it when a company purchases a software program with an End User
License Agreement (EULA) stating that the software can be installed on an unlimited number of
computers, but restricts usage to only four concurrent users?
Concurrent license
What is the MOST suitable type of Internet service to be used for Ann, the president of a
company, who needs assistance in choosing appropriate Internet connectivity for her remote
home with no connectivity to existing infrastructure?
Satellite
What would be used to send messages utilizing the SMTP protocol among the following
options?
Email software
Which of the following terms is most closely associated with evaluating the disk performance of
a database?
Latency
Which option is the MOST suitable approach for handling a lengthy list of products stored in an
array variable in your software code?
Loop through the array
What type of network security involves analyzing deviations from historical connection patterns
and identifying new threats in order to implement e!ective mitigation responses?
Behavior security
Which statement provides the most accurate description of a kilobyte?
A kilobyte is a measurement of storage (e.g 100KB)
What should be the next troubleshooting step for a technician after they have confirmed the full
system functionality following the implementation of a solution to a problem?
Document lessons learned
Which of the options includes precisely four copper wires?
RJ11
Which of the following technologies o!ers the HIGHEST level of security?
Wired
When a custom application that searches through a massive database encounters decline
performance issues during peak usage, what steps should be taken to address the problem?
Scale horizontally, Scale out
Which of the given choices is a characteristic that can be used to distinguish a specific record
in a database from all other records?
Primary key
What are the key roles of an operating system among the options listed below?
Provide structure for file and data management, Provide structure for file and data management
Among these computing devices, which one is MOST probable to be equipped with an internal
wireless antenna?
Mobile phone
What is the meaning of the “drop table” command that your colleague Liam has executed on a
customer table?
The customer table has been deleted
What would be the byte of an IP address if it were converted from its original 32-bit format?
4 bytes
Before allowing employees to access a server remotely from both the company network and the
Internet, what is the MOST important factor to determine for a small company?
A security method of allowing connections
What is the term for when a user accesses a laptop by entering a complex password along with a
username?
Single-factor authentication
Which printing method uses iron-based powder instead of ink, and provides the LEAST costly
per-page printing?
Impact
Which of the following options provides the MOST accurate definition for the practice of
supplying user credentials during the process of logging into a network?
Input
What type of Internet service connection would be most suitable to meet the needs of a remote
user who requires significant bandwidth to connect to corporate systems while working from home?
Fiber optic
Which of the following troubleshooting methodologies is being employed when one technician
investigates network issues in the server room while another technician troubleshoots the user’s
workstation in order to establish a theory of probable cause?
Divide and conquer
Before downloading an update for an important system, an IT administrator performs a hash of
the download to confirm that the results are consistent with the published hash for the file. What is this called?
Integrity concerns
Which protocol facilitates secure communication between two computers?
SSL
What is the most e!ective method for a systems administrator to schedule the execution of a
script at a specific time every day?
Perform task scheduling
Tamara wonders what common security error can result in multiple accounts getting
compromised, after discovering that her Facebook, email, and Twitter accounts have been hacked.
Which one is the answer?
Reusing credentials
Your assignment is to devise a solution for running the maximum number of virtual machines on
a single on-premises host in an e”cient manner. What steps would you take to accomplish this?
Use high-end hardware with multiple CPU cores and a large amount of RAM
What is the issue that the CEO is facing as a result of receiving multiple emails that do not have
attachments?
Email service outage
What would provide the FASTEST transfer rate when transferring a file across the network from
the following options?
1.22Gbps
What has the longest range among the following options?
WiFi
What would be the most suitable option for a developer who wants to store the months of a year
while prioritizing performance?
Array
Which of the following is primarily associated with worries regarding the protection of private
information?
Eavesdropping
The provided code creates a variable. What is the variable type? $stock codes=”MSFT”, “APPL”,
“GOOGL”
Array
After resolving the issue with the word processing software that was preventing the computer’s
end user from accessing it, what would be the appropriate NEXT step for the IT technician?
Document the findings