After creating a database, which of the following would a developer most likely use to put data in the database?
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access. Which of the following protocols would be the MOST secure?
A company wants its employee to use an email client that downloads and removes messages from the email
server. Which of the following protocols must be configured in the email client to facilitate this?
Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?
A company desires to implement a six-month survey site within a remote location. Which of the following is the
BEST option for Internet service?
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
In which of the following situations should there be come expectation of privacy?
A company wants an application to be accessed by concurrent users and store company information securely.
Which of the following would be the BEST option for storing the information?
A company requires several reports that analyze related information from sales, inventory, marketing, and
compensation data. Which of the following is the BEST place to store this data?
In an effort to reduce costs, a company decides not to renew its contract for a secure shredding service. Which of the following risks should the management team most likely be concerned with if employees fail to properly dispose of documents according to security protocols?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the
same time?
An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following commands would most likely be used to add data to an existing database table?
Which of the following elements is most important in order for data reports to have value?
Which of the following creates multifactor authentication when used with something you have?
Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?
A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?
of the following would most likely be used to protect the intellectual property of printed materials?
Which of the following describes the ability to recover access to a specific account if a credential is forgotten?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client
device?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
Which of the following utilities has the ability to remove drivers and scan for hardware changes?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of
application architectures did the employee use?
A systems administrator wants to return results for a time range within a database. Which of the following
commands should the administrator use?
Which of the following is a wireless communication that requires devices to be within 6in of each other to
transfer information?
Which of the following would most likely be used to verify a user is following an AUP?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a
business?
A programmer is tasked with providing a human-readable rough draft of output. Which of the following techniques would be used?
Which of the following protocols is used to relay email from a user's mail server?
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A technician is troubleshooting an important application that is crashing every hour. The technician suspects that the installation is corrupt and needs to be reinstalled. Which of the following steps should be performed next?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during
a MITM attack. Which of the following should the technician enable to reduce the risk?
Which of the following language types would a web developer MOST likely use to create a website?
Which of the following shows how many results are possible when evaluating Boolean data types?
An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A network technician is working on the configuration of a SOHO router. After entering the IP address of the router, the technician uses a GUI to complete the final configuration steps. Which of the following configuration types is this an example of?
A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?
Which of the following types of encryptions would BEST protect a laptop computer in the event of theft?
Which of the following tasks is typically performed during the identification phase of the troubleshooting
methodology?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing
inventory. Which of the following offers the BEST assistance in generating reports?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
Which of the following network protocols will MOST likely be used when sending and receiving Internet email?
(Select TWO.)
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
The IT department has established a new password policy for employees. Specifically, the policy reads:
Which of the following practices are being employed? (Select TWO).
A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?
A company is concerned with ensuring its databases are highly available. Which of the following can be used to
increase database availability?
A user is trying to set up a new wireless access point. Which of the following should the user do first?