Which of the following tasks is typically performed during the identification phase of the troubleshooting
methodology?
Which of the following BEST describes the purpose of a vector in programming?
A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?
A game developer is purchasing a computing device to develop a game and recognizes the game engine
software will require a device with high-end specifications that can be upgraded. Which of the following
devices would be BEST for the developer to buy?
Which of the following creates multifactor authentication when used with something you have?
Which of the following best practices can be used to mitigate password reuse?
Which of the following best describes the differences between data and information?
A company wants an application to be accessed by concurrent users and store company information securely.
Which of the following would be the BEST option for storing the information?
Which of the following network protocols will MOST likely be used when sending and receiving Internet email?
(Select TWO.)
The IT department has established a new password policy for employees. Specifically, the policy reads:
Which of the following practices are being employed? (Select TWO).
A company wants its employee to use an email client that downloads and removes messages from the email
server. Which of the following protocols must be configured in the email client to facilitate this?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click
a link to continue to the site. Which of the following would MOST likely identify the issue?
A database administrator finds that a table is not needed in a relational database. Which of the following
commands is used to completely remove the table and its data?
Which of the following scripting languages is most likely to be used in a Linux command-line environment?
Which of the following would be used to send messages using the SMTP protocol?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?
Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?
Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?
Which of the following BEST describes the physical location of the data in the database?
A small company wants to set up a server that is accessible from the company network as well as the Internet.
Which of the following is MOST important to determine before allowing employees to access the server
remotely?
When following the troubleshooting methodology, which of the following should be performed last?
A global variable called “age†will be created in a program and incremented through the use of a function.
Which of the following data types should be defined with the age variable?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).
A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Which of the following internet service types is most susceptible to weather disruptions?
When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?
Which of the following terms best describes the outcome of a text message that is encrypted from its original form?
Which of the following BEST describes the practice of providing user credentials when logging onto the
network?
Which of the following commands can be used to remove a database permanently?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
Which of the following data types should a database administrator use to store customer postal codes?
Which of the following programming concepts uses properties and attributes?
A business would like to create an employee portal that employees will have access to when they are at work.
The employees will not be able to connect to the portal from home without a VPN connection. Which of the
following types of application does this describe?
A user needs an interface that supports both video and data. Which of the following will meet this requirement?
An application is hosted on a local network. Which of the following descriptions is correct?
A technician has successfully verified full system functionality after implementing the solution to a problem.
Which of the following is the NEXT troubleshooting step the technician should do?
A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?
A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
Which of the following requires the MOST frequent updating to remain effective?
Which of the following allows wireless devices to communicate to a wired network?
Given the following pseudocode:
If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
In which of the following situations should there be come expectation of privacy?
Which of the following describes something in a database that refers to the unique identifier in the parent
table?
Which of the following operating systems do not require extensions on files to execute a program? (Select
TWO).
A systems administrator wants to return results for a time range within a database. Which of the following
commands should the administrator use?
Which of the following file extensions is used for a consolidated group of files?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?