3 Months Free Update
3 Months Free Update
3 Months Free Update
A systems administrator wants to return results for a time range within a database. Which of the following
commands should the administrator use?
A technician has verified full system functionality. Which of the following actions should the technician take next?
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
Within a database, which of the following would be the best access method to use to display a subset of a table?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
A user needs an interface that supports both video and data. Which of the following will meet this requirement?
A company wants its employee to use an email client that downloads and removes messages from the email
server. Which of the following protocols must be configured in the email client to facilitate this?
A company has installed an application that only requires a workstation to function. Which of the following
architecture types is this application using?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the
same time?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
Which of the following protocols is used to relay email from a user's mail server?
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
Which of the following tasks is typically performed during the identification phase of the troubleshooting
methodology?
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?
Which of the following is most likely to disclose the data collection practices of an application?
A technician has successfully verified full system functionality after implementing the solution to a problem.
Which of the following is the NEXT troubleshooting step the technician should do?
Which of the following are benefits of a security awareness training program9 (Select two).
An application is hosted on a local network. Which of the following descriptions is correct?
Which of the following are the primary functions of an operating system? (Choose two.)
Which of the following is MOST likely used to represent international text data?
A game developer is purchasing a computing device to develop a game and recognizes the game engine
software will require a device with high-end specifications that can be upgraded. Which of the following
devices would be BEST for the developer to buy?
Consider the following statements:
Given the input (userin) of“analyst”, to which of the following would the clearance variable be set?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the
workspace, the employee requests that the laptop be installed with the cover closed. Which of the following
would be required to satisfy this request? (Choose two.)
Which of the following filesystems would a Linux computer MOST likely use?
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
Which of the following BEST describes the practice of providing user credentials when logging onto the
network?
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Which of the following concerns does installing cross-platform software address?
A technician is troubleshooting an error message and tests the same program on a separate, identical
machine. Which of the following troubleshooting methodology steps is this an example of?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST
way to achieve this?
Which of the following is a value that uniquely identifies a database record?
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
Given the following pseudocode:
If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the
following would be the BEST choice to accomplish this task?
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
Which of the following network protocols will MOST likely be used when sending and receiving Internet email?
(Select TWO.)
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,
the data is stored on another drive, preventing data loss. Which of the following business continuity concepts
does this explain?
An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of
application architectures did the employee use?