Given the following pseudocode:
Which of the following is the output of the code?
Which of the following shows how many results are possible when evaluating Boolean data types?
Which of the following is the exact number of bytes in a gigabyte?
Which of the following database types would be best in which to place financial data?
Which of the following can a company use to protect its logo?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
Which of the following would be used to send messages using the SMTP protocol?
Consider the following statements:
Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?
Which of the following data types should a developer use when creating a variable to hold a postal code?
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).
Privacy expectations on a company intranet should be limited to:
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?
Which of the following BEST describes the purpose of a vector in programming?
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access. Which of the following protocols would be the MOST secure?
A database administrator has created a primary table and must ensure the date column in the table only accepts date values. Which of the following does the administrator need to set?
Which of the following should privacy expectations on a company intranet be limited to?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A database administrator wants to populate a database with large amounts of data from an external source.
Which of the following actions should be used to get the database populated?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of
application architectures did the employee use?
Which of the following should a technician do to fix stability issues on a workstation?
Which of the following programming languages would most likely include tables and the select command?
Which of the following filesystems would a Linux computer MOST likely use?
Which of the following BEST describes the physical location of the data in the database?
A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating
system functions would the term BEST apply?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a
business?
Which of the following computer components allows for communication over a computer network?
Which of the following allows network traffic to pass through it and filters specific packets?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Which of the following is most appropriate to list on a social media site about an employer?
Which of the following can transmit graphics but not sound?
NO: 56
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
Given the following pseudocode:
arduino
Copy code
WHILE X < 12
print "Counting"
X += 1
If X=7, which of the following is the number of times the message will be displayed?
Which of the following is an example of a compiled language?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
Which of the following is MOST likely used to represent international text data?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
A user is trying to set up a new wireless access point. Which of the following should the user do first?
In an effort to reduce costs, a company decides not to renew its contract for a secure shredding service. Which of the following risks should the management team most likely be concerned with if employees fail to properly dispose of documents according to security protocols?
A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?
A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?
To establish a theory of probable cause, one technician investigates network issues in the server room while
another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies
is being performed?
A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?
A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is best for this requirement?
A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.
Which of the following is the most likely cause?
Which of the following BEST describes an application running on a typical operating system?
Which of the following creates multifactor authentication when used with something you have?
A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?
The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the las six passwords used.
Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Select TWO).
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
Which of the following is the slowest processing speed?
Which of the following concerns does installing cross-platform software address?
Which of the following is a logical structure for storing files?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
A software developer has created a program for the accounting department. The finance department requests the same program but requires some changes to the code to meet its needs. Which of the following should be performed?
Which of the following is the largest storage capacity?
Which of the following would MOST likely use an ARM processor?
Which of the following are benefits of a security awareness training program9 (Select two).
Which of the following scripting languages is most likely to be used in a Linux command-line environment?
Which of the following is an example of PI I? (Select two).
A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?
Which of the following availability concerns is mitigated by having a business continuity site?
Which of the following is required for a cloud network?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
A user has an HDD that is almost at full capacity. Which of the following operating system features should be used to free up some space without deleting any files?
A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?
Which of the following explains the concept of database scalability?
An administrator wants to block application traffic on specific ports from entering into the local area network. Which of the following devices would be the best choice to perform this task?
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
Which of the following is the equivalent of 1 KB?
A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?
A UPS provides protection against:
Which of the following would most likely be used to verify a user is following an AUP?
A technician is installing an MFD. After installation, all functions work except faxing. Which of the following interfaces is required to enable faxing functionality?
In which of the following situations should there be come expectation of privacy?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.
Which of the following types of Internet service connections would BEST meet the user’s needs?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
An administrator is preparing a workstation for deployment. Which of the following is the first step the administrator should take in this process?
A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
Which of the following is required to view videos stored on a DVD?
A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?
Which of the following statements BEST describes binary?
Which of the following is an advantage of using locally saved files?
Which of the following best practices can be used to mitigate password reuse?
Which of the following is a compiled language?
For which of the following is a relational database management system MOST commonly used?
A user opens an application that is installed locally on a PC. The application connects directly to a database that is located on a server in a data closet in the same building. Which of the following application architecture models does this describe?
Which of the following troubleshooting steps happens before establishing a theory of probable cause?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?
A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years. Which of the following would the administrator most likely choose for the project?
An IP address is 32 bits long. If converted to bytes, it would be:
Which of the following security concerns is a threat to confidentiality?
A technician is troubleshooting an important application that is crashing every hour. The technician suspects that the installation is corrupt and needs to be reinstalled. Which of the following steps should be performed next?
Which of the following would be the most cost-effective method to increase availability?
The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Which of the following should be done first when working on a potential issue?