Which of the following is a wireless communication that requires devices to be within 6in of each other to
transfer information?
Given the following pseudocode:
Which of the following is the output of the code?
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
A company desires to implement a six-month survey site within a remote location. Which of the following is the
BEST option for Internet service?
Which of the following is most appropriate to list on a social media site about an employer?
Which of the following are benefits of a security awareness training program9 (Select two).
An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.
Which of the following types of Internet service connections would BEST meet the user’s needs?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is
confirmed. Which of the following should be the technician’s NEXT step?
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access. Which of the following protocols would be the MOST secure?
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following
is the MOST likely cause?
Which of the following would work BEST stored as a flat file rather than stored in a database?
A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client
device?
Employee information is stored in a database. Which of the following BEST describes where all of an
employee’s information is stored?
Which of the following software license models allows a developer to modify the original code and release its own version of the application?
A business would like to create an employee portal that employees will have access to when they are at work.
The employees will not be able to connect to the portal from home without a VPN connection. Which of the
following types of application does this describe?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?
For which of the following is a relational database management system MOST commonly used?
Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?
Which of the following is an advantage of installing an application to the cloud?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
Which of the following best describes the differences between data and information?
Which of the following BEST describes the physical location of the data in the database?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
Within a database, which of the following would be the best access method to use to display a subset of a table?
Which of the following requires the MOST frequent updating to remain effective?
Which of the following programming languages would most likely include tables and the select command?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?
A database administrator finds that a table is not needed in a relational database. Which of the following
commands is used to completely remove the table and its data?
Which of the following notational systems uses the most characters to represent the decimal number 10?
Which of the following network protocols will MOST likely be used when sending and receiving Internet email?
(Select TWO.)
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the
following would be the BEST choice to accomplish this task?
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Which of the following would be the most cost-effective method to increase availability?
Which of the following file extensions is used for a consolidated group of files?
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?
In which of the following situations should there be come expectation of privacy?
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently
released new device. After configuring the new device utilizing the old SSID and key, some light switches are
no longer communicating. Which of the following is the MOST likely cause?