Which of the following is considered a traditional input and output device?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
Which of the following would be considered the BEST method of securely distributing medical records?
Within a database, which of the following would be the best access method to use to display a subset of a table?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?
A user is trying to set up a new wireless access point. Which of the following should the user do first?
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
Which of the following network protocols will MOST likely be used when sending and receiving Internet email?
(Select TWO.)
Which of the following is the best reason to implement a software token instead of a hardware token?
A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?
A building has two legacy APs. A new AP was recently installed within 30ft (9m) of the legacy APs. Multiple users have been reporting intermittent internet connectivity since the new AP was installed. Which of the following explains what is happening?
Which of the following database types would be best in which to place financial data?
A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?
Which of the following best describes the process of comparing MD5 values after downloading software?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).
A company wants to provide encrypted remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would best fulfill these requirements?
Which of the following elements is most important in order for data reports to have value?
A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?
A technician wants to reset the boot order on a computer. Which of the following would the technician most likely use?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing
inventory. Which of the following offers the BEST assistance in generating reports?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exeâ€. Which of the following statements BEST represents what the “…x86.exe†means in the installation file?
An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?
Which of the following file extensions is used for a consolidated group of files?
Which of the following would work BEST stored as a flat file rather than stored in a database?
Which of the following storage devices have a spinning disk? (Choose two.)
A technician has been asked to install a video interface that can support both high bandwidth digital video and audio on a single cable. Which of the following should the technician use?
A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is best for this requirement?
Given the following pseudocode:
If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
Which of the following troubleshooting steps happens before establishing a theory of probable cause?
Which of the following is a quality of solutions created by web browsers?
A Proprietary
B. Cross-platform
C. Single platform
D. Site licensed
A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?
The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the las six passwords used.
Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Select TWO).
Which of the following describes something in a database that refers to the unique identifier in the parent
table?
Which of the following business continuity concepts is the best example of fault tolerance?
A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which
of the following devices is a user MOST likely to configure to allow this?
Which of the following tasks is typically performed during the identification phase of the troubleshooting
methodology?
A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
Which of the following filesystems is compatible with the greatest number of operating systems?
Which of the following notational systems uses the most characters to represent the decimal number 10?
Which of the following allows wireless devices to communicate to a wired network?
A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?
Which of the following is best used to store many integers in one container?
A developer is writing a program to process a long list of employees and apply a cost-of-living increase of 3.2% to all employees making less than $15 per hour. Which of the following pseudocode snippets provides the best solution?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during
a MITM attack. Which of the following should the technician enable to reduce the risk?
Which of the following should privacy expectations on a company intranet be limited to?
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is
confirmed. Which of the following should be the technician’s NEXT step?
A user logs into a laptop using a username and complex password. This is an example of:
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?
A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?
During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?
Which of the following methods of cooling is most commonly used for desktops?
An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?
Which of the following filesystems would a Linux computer MOST likely use?
A company requires several reports that analyze related information from sales, inventory, marketing, and
compensation data. Which of the following is the BEST place to store this data?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
Which of the following requires the MOST frequent updating to remain effective?
Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click
a link to continue to the site. Which of the following would MOST likely identify the issue?
After purchasing a flash drive, the buyer notices that the packaging had already been opened. Which of the following is this is an example of?
Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?
A technician is troubleshooting an error message and tests the same program on a separate, identical
machine. Which of the following troubleshooting methodology steps is this an example of?
Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?
Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?
Which of the following interfaces is best for viewing database performance information?
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access. Which of the following protocols would be the MOST secure?
A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.
Which of the following is the most likely cause?
Which of the following protocols is used to relay email from a user's mail server?
A company wants an application to be accessed by concurrent users and store company information securely.
Which of the following would be the BEST option for storing the information?
Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following
is the MOST likely cause?
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?