test q's Flashcards

1
Q
  1. What option can you configure on your workstation to increase security when you leave your desk?
    A. File encryption
    B. Multifactor authentication
    C. Single sign-on
    D. Screensaver password
A

D. Screen Saver password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Claire, a co-worker, is browsing the Internet and wants to know whether it’s safe to enter her credit card information into a website. What do you tell her to look for?
    A. HTTPS
    B. HTTP
    C. SSL
    D. TLS
A

A. Https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which type of software will help protect your computer from malicious network traffic?
    A. Software firewall
    B. Password complexity tool
    C. Antispyware
    D. Antivirus
A

A. Software Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. You have remotely logged into your corporate network. Which of the following is used to ensure encryption of data in transit between your laptop and corporate servers?
    A. HTTPS
    B. Email encryption
    C. VPN
    D. Host firewall
A

C.VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When troubleshooting a computer problem, which of the following are steps you can take to identify the problem? (Choose two.)
A. Use external resources such as the Internet.
B. Talk to end users.
C. Isolate the issue.
D. Attribute it to user error.

A

B. Talk to end users C.Isolate the issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When providing computer support and testing solutions, what should you always do first?
A. Assume user error.
B. Test the simple stuff.
C. Check Internet resources for solutions.
D. Establish a plan of action

A

b. Test the simple stuff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your computer has been running backups for a year. Today, you make a change from backing it up to an external optical drive to backing it up to the cloud. What should you do next?
A. Secure the cloud backup location.
B. Schedule regular cloud backups.
C. Destroy the old optical discs.
D. Verify that the cloud backup works.

A

Verify that the cloud backup works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are troubleshooting a computer problem. After testing the solution, what should you do next?
A. Establish a plan of action.
B. Verify functionality.
C. Document the work.
D. Identify the problem.

A

Establish plan of action

I Eat Tacos Every Veterans Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the last step in the process of troubleshooting a computer?
A. Verify Internet functionality.
B. Document the work.
C. Clean up the mess. 803
D. Retest the solution.

A

Document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have been asked to design a backup solution for your manager’s workstation. Which option will be the fastest?
A. Cloud storage
B. Network storage
C. Local storage
D. They are all the same speed.

A

local storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have just installed a new printer on your computer, and while it seems to be recognized by the operating system, it will not print. What is the first source to check for information on the problem?
A. The OS manufacturer’s website
B. The printer manufacturer’s website
C. Google search
D. Internet technical community groups

A

Printer Manu website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Someone was recently caught sifting through your company’s trash looking for confidential information. What is this an example of?
A. Trash snooping
B. Dumpster diving
C. Phishing
D. Social engineering

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following security terms best describes the process of determining what a user can do with a resource?
A. Authentication
B. Authorization
C. Accounting
D. Nonrepudiation

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your network’s security model requires that the administrator configure permissions based on a user’s job within the company. What does this describe?
A. Rule-based access control
B. Role-based access control
C. Discretionary access control
D. Mandatory access control

A

Role-based Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your friend Michael is setting up a wireless network and asks you which security option he should choose to make the network the most secure. What do you suggest?
A. WEP
B. WPA
C. WPA2
D. NAT

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are configuring a computer to participate on a network. Which of the following are mandatory? (Choose two.)
A. IP address
B. Default gateway
C. DHCP server 621
D. Subnet mask

A

IP address D. Subnet mask

16
Q

Which one of these connection types has the longest delay?
A. Wireless
B. Infrared
C. Wired
D. Cellular

A

Cellular

17
Q

Of your internal network connection options, which one can provide the fastest speeds?
A. UTP
B. Fiber
C. Infrared
D. 802.11n

A

Fiber = fastest

18
Q

Which of the following consists of columns and rows of numerical or text data?
A. Document database
B. Key/value database
C. Database dump 539
D. Relational database

A

Relational Database

19
Q

Michael, an administrator, needs to add a column to an existing table. Which command should he use?
A. INSERT
B. UPDATE
C. CREATE
D. ALTER

A

Alter

20
Q

Which of the following numbers is written in hexadecimal format?
A. 100101
B. 3268
C. 18AF
D. 100101.11

A

18AF

21
Q

A programmer wants to write code that directly accesses the computer’s hardware. Which is the best type of language for the programmer to use?
A. Complied
B. Query
C. Interpreted
D. Assembly

A

Assembly

22
Q

What type of programming language is designed to retrieve data from a database?
A. Query
B. Assembly
C. Interpreted
D. Compiled

A

Query

23
Q

You want to understand the sequence of a program, from start to finish. Which of the following is the best to use for this purpose?
A. Pseudocode
B. Function
C. Flowchart
D. Object

A

Flowchart

24
Q

Word processing, spreadsheets, and presentation software are examples of what?
A. Productivity software
B. Collaboration software
C. Utility software
D. Operating system add-ins

A

Productivity software

25
Q

Which of the following application delivery methods requires Internet access?
A. Cloud hosted
B. Locally installed
C. Local network hosted
D. Three tier

A

A. Cloud hosted

26
Q

You want to visit a web page and make sure that the website does not steal any information about your identity. In that scenario, which of the following should you use?
A. Script blocker
B. Certificate validator
C. Extension disabler
D. Private browsing

A

Script blocker

27
Q

1,000,000MB can also be represented as what?
A.0.01PB
B. 1TB
C. 100GB
D. something else

A

1 terabyte (TB)

28
Q

A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
A. Word processing document
B. Flat file
C. Database
D. Spreadsheet

A

Answer: C

29
Q

A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?
A. Change the SSID.
B. Change the default password.
C. Change to WEP security.
D. Create a guest network.

A

Change the default password

30
Q

which OS type is most likely to be used by a public cloud service provider? ITF +
A. Hypervisor
B. Embedded
C. Workstation
D. Mobile

A

Hypervisor

31
Q

which of the following does a No SQL database use to organize?
A. Primary Keys
B. Schemas
C. Keys/Values
D. Tables

A

Keys/Values

32
Q

Which of the following operating system components would MOST likely be involved when an application needs
to save data?

A. Process scheduler
B. Disk management
C. Memory management
D. Task scheduler

A

Disk management

33
Q

Which of the following data types should a developer use when creating a variable to hold a postal code?
A. Integer
B. String
C. Float
D. Boolean

A

String

34
Q

Which of the following security concepts reduces the chance of an on-path attack?

A. Availability
B. Integrity
C. Performance
D. Confidentiality

A

Integrity

35
Q

An application is hosted on a local network. Which of the following descriptions is correct?
A LAN access is required
B The application exists locally
C Files are saved in the cloud
D Internet access is required

A

A LAN access is required

36
Q

Which is an example of a compiled language?
A Perl
B HTYML
C Java
D. Python

A

C Java

37
Q

A developer needs to add a table to a database. WHich of the following database activites should the user perform?
A. Update
B. Alter
C. Create
D. Report

A

C. Create

38
Q

A database administrator would like to create a visual diagram of the layout of a new residential database. Which of the following should the administrator use?

A. flowchart schema
B. Physical Schema
C. Logical schema
D. Table Schema

A

Logical Schema