Which of the following language types would a web developer MOST likely use to create a website?
Multiple users need to access the same data simultaneously. Which of the following is the best place to store the data?
A systems administrator wants to return results for a time range within a database. Which of the following
commands should the administrator use?
Which of the following intellectual property concepts BEST represents a legally protected slogan of a
business?
A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).
Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?
A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?
A company desires to implement a six-month survey site within a remote location. Which of the following is the
BEST option for Internet service?
A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following
programming concepts does jump represent?
Given the following pseudocode:
If the Breakfast program ran on Sunday, which of the following would be the output?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following is an advantage of installing an application to the cloud?
A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?
A user logs into a laptop using a username and complex password. This is an example of:
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click
a link to continue to the site. Which of the following would MOST likely identify the issue?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
A technician wants to reset the boot order on a computer. Which of the following would the technician most likely use?
Given the following pseudocode:
arduino
Copy code
WHILE X < 12
print "Counting"
X += 1
If X=7, which of the following is the number of times the message will be displayed?
Which of the following describes the ability to recover access to a specific account if a credential is forgotten?
A network technician is working on the configuration of a SOHO router. After entering the IP address of the router, the technician uses a GUI to complete the final configuration steps. Which of the following configuration types is this an example of?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Employee information is stored in a database. Which of the following BEST describes where all of an
employee’s information is stored?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
After a patch of an enterprise server, applications were unable to load. The server administrator was able to resolve the issue. Which of the following is the next step the administrator should take?
A database administrator wants to populate a database with large amounts of data from an external source.
Which of the following actions should be used to get the database populated?
After creating a database, which of the following would a developer most likely use to put data in the database?
An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?
A company wants its employee to use an email client that downloads and removes messages from the email
server. Which of the following protocols must be configured in the email client to facilitate this?
Given the following pseudocode:
If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
Which of the following allows network traffic to pass through it and filters specific packets?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this
document for public use. Which of the following should the developer use to BEST protect the document?
Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?
A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?
Consider the following statements:
Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?
A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?
Which of the following data types should a database administrator use to store customer postal codes?
A technician has verified full system functionality. Which of the following actions should the technician take next?
Which of the following units of storage would be used to measure the amount of RAM on a desktop computer?
Which of the following interfaces is best for viewing database performance information?
Which of the following BEST describes the physical location of the data in the database?
Which of the following data types should a developer use when creating a variable to hold a postal code?
A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?
Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?
Which of the following BEST describes the practice of providing user credentials when logging onto the
network?
Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?
Which of the following troubleshooting steps happens before establishing a theory of probable cause?
A user needs an interface that supports both video and data. Which of the following will meet this requirement?
A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
Which of the following tasks is typically performed during the identification phase of the troubleshooting
methodology?
A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during
a MITM attack. Which of the following should the technician enable to reduce the risk?
Which of the following backup types is most likely to allow restoration of a fully bootable computer on new hardware?
The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the las six passwords used.
Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Select TWO).
Which of the following should privacy expectations on a company intranet be limited to?
Which of the following is the best reason to implement a software token instead of a hardware token?
A database administrator finds that a table is not needed in a relational database. Which of the following
commands is used to completely remove the table and its data?
An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing
inventory. Which of the following offers the BEST assistance in generating reports?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following
is the MOST likely cause?
A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?
Which of the following describes something in a database that refers to the unique identifier in the parent
table?
A user is selecting software to visually display information in a marketing meeting. Which of the following software types should the user select?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of
application architectures did the employee use?
A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?
Which of the following internet service types is most susceptible to weather disruptions?
Which of the following best describes the technology utilized in digital wallets?
A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?
Which of the following best describes the differences between data and information?
Which of the following should a technician do to fix stability issues on a workstation?
An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?
Which of the following filesystems is compatible with the greatest number of operating systems?