A user is logged in but unable to access a shared folder on the network. Which of the following security concepts is in place?
A user wants to purchase a portable device that can be used exclusively for viewing books. Which of the following devices would be the best option?
A company is using data to provide senior leaders with information to drive company decision-making. Which of the following best describes this process?
An employee is working on a database and wants to retrieve specific information. Which of the following should the employee use?
A user is reviewing the following data set:

Which of the following is this data set an example of?
Which of the following can best protect a computer when an infected file has been downloaded?
Which of the following concepts is represented by the sale of customer email addresses to potential product vendors?
A user attempts to log in to a website and receives a prompt to update their password. Which of the following is this an example of?
Which of the following network devices permits and restricts network traffic as its primary function?
A user purchases a new router and wants to configure it. Which of the following should the user change first?
An application is unresponsive. Which of the following will close the application?
A user is testing new speakers on a laptop, but the user does not hear any sounds. The speakers are plugged in and turned on, and the correct driver is updated. Which of the following would most likely cause the issue?
Users are discussing the birthdays and home addresses of notable public figures in a public chat room. Which of the following security concepts is being compromised?
Which of the following types of programming languages allows for the best hardware optimization?
A technician needs to install input devices while setting up a new desktop PC. Which of the following should the technician install? (Choose two.)
Which of the following is an advantage of using a flat file for a small amount of data?
Which of the following notational systems uses the numbers 0–9 and letters A–F?
Which of the following is used to terminate a Cat 6 cable to an RJ45 connector?
A user moves to a new desk that is located next to the kitchen. Now, the user can no longer log in to the wireless network. Which of the following is causing this issue?
A systems administrator requires access to a user’s laptop over a VPN for troubleshooting. Which of the following software types should the systems administrator use?
A user receives a notification about a new software vulnerability. Which of the following is the best way to secure the software?
An application stops working after 30 days and then prompts the user to input some information. Which of the following will fix this issue?
Which of the following best describes a group of computers that are in close proximity to each other on the same network?
An administrator wants to convert a large spreadsheet to a database. Which of the following is the best reason for doing so?
A help desk technician is installing an application for a user who is in a different state. Which of the following best describes the software the technician is using for the installation?
A user's internet speed is slow. The user logs in to the router's administrator portal and sees that unauthorized devices are connected to the network. Which of the following actions should the user take to prevent unauthorized use of the network?
Which of the following is the last tool that should be used when creating a custom-length network cable?
A user is unable to load the most recent version of a web page. The old page loads each time the screen is refreshed. Which of the following would the user most likely do to resolve the issue?
A manager wants to provide information to employees during a company meeting. Which of the following types of software is the best solution?
A user wants to use virtualization on a local workstation. Which of the following best describes the technology that will be used?