Practice Test 2 - Incorrect Flashcards

Correct mistakes from Practice Tests

1
Q

Which type of address can be configured by DHCP?

🫥 ASCII
🫥 Unicode
🫥 IP
🫥 MAC

A

✅ IP

🧠 This software address uniquely identifies a host on a TCP/IP network and allows network packet transmissions addressed to the IP address to be received. The Dynamic Host Configuration Protocol (DHCP) contains a pool of configured IP addresses that can be provisioned to DHCP client systems automatically without administrative intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of legal mechanism protects creative digital works?

🫥 Trademark
🫥 Copyright
🫥 PII
🫥 Patent

A

✅ Patent

🧠 Intellectual property is a digital creative work that can be protected from copycats through patents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Developers in your organization plan to use virtualization to test code changes. Windows 10 is already installed on their machines. What should you configure to enable code change testing locally?

🫥 Type 1 hypervisor
🫥 Type 2 hypervisor
🫥 Cloud connectivity
🫥 Virtual machine cluster

A

✅ Type 2 hypervisor

🧠 This type of hypervisor is an application that runs on top of an existing operating system such as Windows 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

While vacationing on a Caribbean cruise, you connect to the ship’s Wi-Fi network to check e-mail. What type of connectivity allows ship passengers to connect to the Internet?

🫥 Fiber optic
🫥 GPS
🫥 Twisted-pair copper
🫥 DSL

A

✅ GPS

🧠 Global Positioning System uses Earth-orbiting satellites to allow communication from anywhere on the planet’s surface, including while at sea

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which printing technology offers the lowest cost per page and uses iron-based powder rather than ink?

🫥 Impact
🫥 Inkjet
🫥 Laser
🫥 Thermal

A

✅ Laser

🧠 Laser printers use toner, a relatively inexpensive iron-based powder, to print.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are involved with providing input in the design of a new small office facility in a rural setting. The fastest possible Internet connection over long distances is required. What should you recommend?

🫥 Fiber optic
🫥 DSL
🫥 Satellite
🫥 Bluetooth

A

✅ Fiber optic

🧠 This cable type transmits light instead of electricity using plastic fibers over longer distances than is possible with copper-based cables. Some rural areas may not have the infrastructure in place for fiber-optic connectivity. Generally speaking, fiber provides the most network throughput in the order of gigabits per second (Gbps) or even terabits per second (Tbps), where giga implies billions and tera implies trillions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Erin got a gift of a new inkjet printer, and she wants to make sure her computer has a compatible port to plug it in. When she looks at the back of her printer, she sees a lot of port types. Which ones will most likely work for her printer? (Choose two.)

🫥 DVI
🫥 Parallel
🫥 PS/2
🫥 USB
🫥 VGA

A

✅ Parallel
✅ USB

🧠 Although every modern printer today connects via USB or Wi-Fi, CompTIA remembers the ancient days that included other ports, such as FireWire, parallel, and serial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your software development team recommends building a new custom software application as an n-tiered application. Which of the following are benefits that will be realized from this design strategy? (Choose all that apply.)

🫥 Developers can change code in one tier without changing code in other tiers.

🫥 One compromised tier does not mean other tiers are also compromised.

🫥 Each tier can have updates applied independently of other tiers.

🫥 All tiers must be backed up together for enhanced availability.

A

✅ Developers can change code in one tier without changing code in other tiers.
✅ One compromised tier does not mean other tiers are also compromised.
✅ Each tier can have updates applied independently of other tiers.

🧠 Developers can change code in one tier without changing code in other tiers, One compromised tier does not mean other tiers are also compromised, Each tier can have updates applied independently of other tiers. Because each tier is a separate piece of the overall application, each tier can be managed separately of other tiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have been tasked with coming up with a solution to efficiently run the highest density of virtual machine on a single host on-premises. What should you do?

🫥 Run a type 1 hypervisor.
🫥 Run a type 2 hypervisor.
🫥 Host the virtual machines in the cloud.
🫥 Configure an on-premises virtualization cluster.

A

✅ Run a type 1 hypervisor

🧠 This type of hypervisor does not require an existing operating system; it is the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are configuring a second disk in your macOS computer. What should you choose?

🫥 HFS
🫥 EXT4
🫥 FAT32
🫥 NTFS

A

✅ HFS

🧠 This is an Apple file system type that is commonly used with macOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which document outlines expected uptime and performance details for cloud services?

🫥 SLA
🫥 DRP
🫥 GPS
🫥 DSL

A

✅ SLA

🧠 Service level agreements are contracts between cloud customers and providers that specify expected uptime and performance when using a specific cloud service.el Agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Eve purchased a software program on eBay. The package was shrink-wrapped when it arrived and installed just fine. When she clicked the option to activate the program, however, activation failed. What could cause activation to fail?

🫥 Counterfeit program
🫥 Previously installed program
🫥 Invalid operating system
🫥 Virus attack

A

✅ Previously installed program

🧠 Previously installed program. Although it’s easy to make digital copies of software, activation requires a genuine, not previously activated copy. This is an example of license theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of testing ensures that software code changes hasn’t broken unrelated code that worked previously?

🫥 Unit testing
🫥 Regression testing
🫥 Sandbox testing
🫥 Performance testing

A

✅ Regression testing

🧠 This type of test makes sure unrelated functionality has not been adversely affected by new code changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following terms is most closely related to measuring database disk performance?

🫥 Kbps
🫥 Caching
🫥 IOPS
🫥 Scale horizontally

A

✅ IOPS

🧠 Input/output operations per second is a measurement for disk throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You have configured an in-memory database cache to improve database query performance. What type of storage is this?

🫥 Persistent storage
🫥 IOPS storage
🫥 Nonpersistent storage
🫥 Network storage

A

✅ Nonpersistent storage

🧠 Database cached content is stored in RAM, and RAM is nonpersistent storage; when the caching server is shut down, cache contents are normally lost unless configured otherwise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your colleague Lain has issued the “drop table” command against a customer table. What does this mean?

🫥 The customer table is not accessible over the network.
🫥 The customer table is accessible over the network.
🫥 The customer table has been exported.
🫥 The customer table has been deleted.

A

✅ The customer table has been deleted.

🧠 DROP TABLEremoves tables from the database. Only the table owner, the schema owner, and superuser can drop a table. To empty a table of rows without destroying the table, use DELETE or TRUNCATE . DROP TABLE always removes any indexes, rules, triggers, and constraints that exist for the target table.

17
Q

What could cause a browser to fail to display a web page, displaying only plug-ins and search bars?

🫥 The computer has too many toolbars downloaded and installed.
🫥 The computer has too many apps downloaded and installed.
🫥 Malware has infected the computer.
🫥 Shareware has infected the computer.

A

✅ The computer has too many toolbars downloaded and installed.

🧠 This answer wins by default because the others are wrong. In reality, if Maria had that many toolbars, her browser wouldn’t do much at all.

18
Q

Of the following types of personally identifiable information (PII), which should you protect the most?

🫥 Email address
🫥 Last name
🫥 Mother’s maiden name
🫥 Phone number

A

✅ Mother’s maiden name

🧠 In the 20th century in the United States, it was common for a wife to adopt her husband’s last name. This obscured the maiden name and made for a nice PII for any of her children.